A Token Authentication Method for Wireless Sensor Networks Based on Restful Architecture
A wireless sensor and token authentication technology, applied in the field of computer networks, can solve the problems of high computing, communication and storage overhead of asymmetric encryption system, and achieve the effect of preventing damage and ensuring security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The wireless sensor network token authentication method based on the Restful architecture of the present invention self-organizes the sensor node sensor and the sink node into a network, connects the sink node to the Web server based on the Restful architecture, and the sink node The challenge response authentication is adopted between the node and the web server, SSL authentication is adopted between the web server and the client user, and token authentication is adopted between the client user and the sink node of the sink node. The above three authentications are all two-way authentication. Access the web server through the client user to obtain the data of the wireless sensor node sensor.
[0046] The full name of REST is Representational State Transfer, which refers to a set of architectural constraints and principles. If an architecture meets the constraints and principles of REST, it is called the Restful architecture. Currently HTTP is the only instance related to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


