Method for secure communication of wireless sensor network based on combined password

A wireless sensor and network security technology, applied in wireless communication, network topology, security devices, etc., can solve the problems of reducing computing cost, no data confidentiality protection, and no solution to the problem of message confidentiality in wireless sensor networks. Confidentiality, the effect of reducing the amount of storage

Active Publication Date: 2015-12-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme only implements authentication, and does not implement confidentiality protection for data.
[0007] (4) The identity-based offline and online signature scheme solves the security problems of wireless sensor networks. The offline and online methods can greatly reduce the computing cost, which is suitable for resource-constrained environments in wireless sensor networks, but it does not solve the problem of message signatures in wireless sensor networks. confidentiality issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secure communication of wireless sensor network based on combined password
  • Method for secure communication of wireless sensor network based on combined password
  • Method for secure communication of wireless sensor network based on combined password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0018] The specific realization of the present invention is as follows, this specific embodiment realizes the present invention based on the encryption scheme (BF encryption) of Boneh and Franklin and the signature scheme (CC signature) of Choon and Cheon, and its specific steps are as follows:

[0019] Step (1). System initialization, generate system parameters:

[0020] Step (1.1): see figure 1 , select a security parameter q (in order to ensure the security of the system, the security parameter q is preferably set to a large prime number not less than 160bit long), and based on the security parameter q, select the additive cyclic group G with prime number p as the order 1 and the multiplicative cyclic group G T , choose P as the gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for secure communication of a wireless sensor network based on a combined password, belonging to the field of secret communication. The method comprises the following steps that a base station sets and exposes system parameters and respectively generates public and private key pairs (QU, SU) and (QI, SI) for a user U and a node I; when the user is communicated with the sensor node, the user utilizes SU and QI to carry out signature and encryption on K1 in sequence based on a preset session key K1, and then the user sends a ciphertext to a receiving end, and the receiving end utilizes SI and QU to carry out decryption and verification in sequence; and lastly, the user utilizes the session key K1 to realize secure communication. When the sensor node needs to be communicated with the user, the node still utilizes SI and QU to carry out signature and encryption on a selected session key K2 in sequence, and then the user sends the ciphertext to the receiving end, and the receiving end still utilizes SU and QI to carry out decryption and verification. According to the method, secure communication of the wireless sensor network is realized by utilizing a combined public key password, so that the storage requirements for identity information and the cost for the base station to produce a private key are greatly reduced.

Description

technical field [0001] The invention belongs to the technical field of secure communication, and in particular relates to a method for secure communication of a wireless sensor network based on a combined cipher. Background technique [0002] Wireless sensor network (WSN) is composed of a large number of micro-sensor nodes deployed in the monitoring area. It is a multi-hop self-organizing network system formed by wireless communication. The main purpose is to perceive, collect and process the perceived objects in the network coverage area. information and send it to observers. The Internet of Things finally perceives the entire material world through sensors spread all over every corner and objects and the wireless sensor network composed of them. A sensor network system usually includes sensor nodes and aggregation nodes, where the sensor nodes have relatively weak computing and storage capabilities, and are powered by small-capacity batteries. The aggregation node has re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W84/18H04W12/00H04W12/03
CPCH04W12/02H04W12/06H04W84/18
Inventor 李发根郑朝慧洪姣姣韩亚楠
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products