Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless sensor network key management method based on key table

A wireless sensor and network key technology, applied in the field of wireless sensor networks, can solve the problems such as the inability to guarantee the balance between the calculation overhead and the communication overhead, the lack of a pair key and a group key key management system scheme, etc., so as to reduce the communication overhead. , the effect of alleviating resource constraints and resisting network attacks

Active Publication Date: 2016-09-07
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing key management schemes based on wireless sensor networks focus on a single construction method for key or group key, and lack a complete key management system solution integrating key pair and group key
At the same time, the existing schemes are deficient in the key strength, even if there is a high key strength, it cannot guarantee the balance of the relationship between it and the calculation overhead and communication overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network key management method based on key table
  • Wireless sensor network key management method based on key table
  • Wireless sensor network key management method based on key table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Hereinafter, the preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0042] In this embodiment, the network adopts a clustered topology, such as figure 1 As shown, the nodes can be safely clustered in the initial stage of network establishment (the number of nodes in each cluster is about 5-20), in which the sensor nodes are responsible for data collection, and send to the cluster head node by encrypting the key, and the cluster head node sends the data After being aggregated, it is encrypted and forwarded to the base station in the form of single-hop or multi-hop. That is, the nodes in the cluster only communicate with the corresponding cluster head node, and the cluster head node communicates with neighbor nodes or base stations, and the message is sent in a broadcast mode. The base station is unbreakable, has unlimited energy and storage capabilities, and the base station can obtain the status of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a wireless sensor network key management method based on a key table. An N order key table matrix is generated by a random function in a networking stage in a wireless sensor network based on clustering, the order of the key table matrix is voluntarily configured by a network manager, the larger the order is, the higher the strength of the generated key is, and elements in the key table are extracted to serve as key materials to construct a pair key and a group key for node communication, wherein the key table limits the elements in the matrix by modular operation, and the diversity of the generated keys is improved; and the pair key and the group key are updated in a network operation stage. The method specifically comprises the following steps: 1, establishing a pair key material; 2, establishing the pair key; 3, establishing and allocating the group key; 4, updating the pair key; and 5, updating the group key. By adopting the method, the strength of the generated keys is improved, the calculation, storages and communication overheads of the nodes can be reduced, meanwhile the forward / backward safety of the network is guaranteed, and the ability of defending replay attack, forgery attack and other common network attacks are available.

Description

Technical field [0001] The invention belongs to the technical field of wireless sensor networks, and relates to a key management method for wireless sensor networks based on a key table. Background technique [0002] A wireless sensor network (Wireless Sensor Network, WSN) is composed of a large number of small and low-cost wireless sensor nodes. This network is a typical distributed mobile network and can be used in many different application scenarios such as military and medical. Because of the limited hardware characteristics of wireless sensor networks, more and more researches are focused on the security of WSN, and are dedicated to developing a security solution with high network security and low computing overhead for sensor nodes. As an important means of network security, key management often plays an important role in the process of information encryption and authentication. Research on key management schemes suitable for WSN will promote the development of WSN and pav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/0433
CPCH04W12/04H04W84/18
Inventor 王浩刘洋陈瑞祥王平
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products