Token authentication method for wireless sensor network based on Restful architecture
A wireless sensor and token authentication technology, applied in the field of computer networks, can solve the problems of high computing, communication and storage overhead of asymmetric encryption system, and achieve the effect of preventing damage and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The wireless sensor network token authentication method based on the Restful architecture of the present invention self-organizes the sensor node sensor and the sink node into a network, connects the sink node to the Web server based on the Restful architecture, and the sink node and the Web Challenge response authentication is used between servers, SSL authentication is used between Web server and client user, and token authentication is used between client user and sink node. The above three authentications are two-way authentication, and the user passes the client user. Access the web server to obtain the sensor data of the wireless sensor node.
[0046] The full name of REST is RepresentationalStateTransfer, which refers to a set of architectural constraints and principles. If an architecture meets the constraints and principles of REST, it is called a Restful architecture. Currently HTTP is the only instance related to REST.
[0047] The Restful architecture follows th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


