Identity authentication method for low-rate wireless network

A wireless network and identity authentication technology, applied in the field of wireless network data processing, can solve problems such as ineffective identity authentication

Inactive Publication Date: 2016-06-01
FOSHAN BLACK BOX TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides an identity authentication method for low-rate wireless networks, which solves the technical problem that identity authentication cannot be effectively performed in e...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for low-rate wireless network
  • Identity authentication method for low-rate wireless network
  • Identity authentication method for low-rate wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] In Example 1, please refer to figure 1 , provide a kind of identity authentication method for low rate wireless network, described method is applied in ZigBee wireless network, described method comprises:

[0039] S1: Node A sends a function failure command to node B. The function failure command includes: node A's MAC address, node A's permission information, and a mixed sequence of random numbers;

[0040] S2: Node B receives the function failure command and analyzes it, and confirms that the command is a function failure command. Node B selects a column from the polynomial group to encrypt the MAC of node A, and sends the encrypted information in the identity authentication request to Node A;

[0041] S3: Node A receives the identity authentication request, finds out the corresponding encryption polynomial bit by bit, and returns the MAC address of node B to node B after encrypting;

[0042] S4: Node B receives the encrypted result and matches the received encrypte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an identity authentication method for a low-rate wireless network. The method is applied to a ZigBee wireless network. Identity authentication involves two nodes: a node A and a node B. The node A has a command for disabling the Node B. In order to execute the command, identity authentication has to be performed, to determine the node A has the right to execute the operation. A feasible identity authentication mechanism is added to a low-rate low-overhead wireless network, thereby achieving the technical effects that identity authentication can be effectively performed on a low-rate wireless network, and the operation can be performed normally by using a low-bit micro control unit.

Description

technical field [0001] The invention relates to the field of wireless network data processing, in particular to an identity authentication method for low-rate wireless networks. Background technique [0002] ZigBee is a low-power LAN protocol based on the IEEE802.15.4 standard. According to international standards, ZigBee technology is a short-distance, low-power wireless communication technology. It is characterized by close range, low complexity, self-organization, low power consumption, and low data rate. It is mainly suitable for the fields of automatic control and remote control, and can be embedded in various devices. In short, ZigBee is a cheap, low-power short-range wireless networking communication technology. [0003] The mature wireless communication protocol Zigbee protocol has an encryption function in the protocol, but there is no authentication mechanism. In this case, once the destroyer cracks the encryption key of AES, the network function is transparent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L29/06
CPCH04L63/0876H04W12/06
Inventor 施友岚钱超
Owner FOSHAN BLACK BOX TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products