Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for secure communication of wireless sensor network based on combined cipher

A wireless sensor and network security technology, applied in wireless communication, network topology, security devices, etc., can solve the problems of reducing computing costs, not having data confidentiality protection, and not solving the problem of message confidentiality in wireless sensor networks. Confidentiality, storage reduction effect

Active Publication Date: 2019-02-15
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme only implements authentication, and does not implement confidentiality protection for data.
[0007] (4) The identity-based offline and online signature scheme solves the security problems of wireless sensor networks. The offline and online methods can greatly reduce the computing cost, which is suitable for resource-constrained environments in wireless sensor networks, but it does not solve the problem of message signatures in wireless sensor networks. confidentiality issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for secure communication of wireless sensor network based on combined cipher
  • A method for secure communication of wireless sensor network based on combined cipher
  • A method for secure communication of wireless sensor network based on combined cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0018] The specific realization of the present invention is as follows, this specific embodiment realizes the present invention based on the encryption scheme (BF encryption) of Boneh and Franklin and the signature scheme (CC signature) of Choon and Cheon, and its specific steps are as follows:

[0019] Step (1). System initialization, generate system parameters:

[0020] Step (1.1): see figure 1 , select a security parameter q (in order to ensure the security of the system, the security parameter q is best set to a large prime number not less than 160bit long), based on the security parameter q, select the additive cyclic group G with prime number p as the order 1 and the multiplicative cyclic group G T , choose P as the group G 1 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for secure communication of a wireless sensor network based on a combined cipher, which belongs to the field of secure communication. The invention includes: the base station sets and discloses system parameters, and the base station generates public and private key pairs (QU, SU) and (QI, SI) for the user U and the node I respectively. When the user communicates with the sensor node, based on the preset session key K1, the user uses SU and QI to sign and encrypt K1 in turn, and then sends the ciphertext to the receiving end, which uses SI and QU to decrypt and verify in turn. Finally, the user can use the session key K1 to realize secure communication. When the sensor node needs to communicate with the user, the node still uses SI and QU to sign and encrypt the selected session key K2 in turn, and then sends the ciphertext to the receiving end, which still uses SU and QI to decrypt and verify. The invention realizes the secure communication of the wireless sensor network by using the combined public key cipher, and greatly reduces the storage requirement of the identity information and the cost of producing the private key by the base station.

Description

technical field [0001] The invention belongs to the technical field of secure communication, and in particular relates to a method for secure communication of a wireless sensor network based on a combined cipher. Background technique [0002] Wireless sensor network (WSN) is composed of a large number of micro-sensor nodes deployed in the monitoring area. It is a multi-hop self-organizing network system formed by wireless communication. The main purpose is to perceive, collect and process the perceived objects in the network coverage area. information and send it to observers. The Internet of Things finally perceives the entire material world through sensors spread all over every corner and objects and the wireless sensor network composed of them. A sensor network system usually includes sensor nodes and aggregation nodes, where the sensor nodes have relatively weak computing and storage capabilities, and are powered by small-capacity batteries. The aggregation node has re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/06H04W84/18H04W12/00H04W12/03
CPCH04W12/02H04W12/06H04W84/18
Inventor 李发根郑朝慧洪姣姣韩亚楠
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA