Method for accelerating vBNN-IBS authentication in wireless sensor network

A wireless sensor and authentication method technology, applied in the field of vBNN-IBS authentication mechanism, can solve the problems of large energy consumption and slow authentication speed, and achieve the effect of reducing authentication time and improving life cycle

Inactive Publication Date: 2017-09-15
HEILONGJIANG UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problem of slow node authentication speed and large energy consumption in the existing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accelerating vBNN-IBS authentication in wireless sensor network
  • Method for accelerating vBNN-IBS authentication in wireless sensor network
  • Method for accelerating vBNN-IBS authentication in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031]Specific implementation mode one: a method for accelerating vBNN-IBS authentication in a wireless sensor network is implemented in the following steps:

[0032] System parameter establishment phase:

[0033] Give the security parameter k.

[0034] PKG specifies E / F q and a point P of order n. Among them, PKG refers to a trusted third party of Private Key Generator. We will define in the finite field F q The elliptic curve E in: y 2 =x 3 +ax+b is called E / F q , where q is a fairly large prime and both a and b are in the field F q middle. P is a point in the elliptic curve E, and its order is n.

[0035] in Z p randomly select a system private key x, and calculate the system public key P 0 =xP. where Z p Represents the field consisting of positive integers from 0 to p-1.

[0036] Defines the elliptic curve "add" and "multiply" operations. Take point P and point Q on elliptic curve E, l is a straight line passing through point P and point Q, and l intersects ...

Example Embodiment

[0064] Specific embodiment two: the difference between this embodiment and specific embodiment one is: the difference between this embodiment and the specific embodiment is that this embodiment is in the topological structure of 4*4 grid, and the simulation analysis is carried out from the function of the nodes of. The specific content is as follows:

[0065] In order to get the energy value and time savings that AvBNN-IBS can reduce, we execute the NesC application in TinyOS system to send and receive 802.15.4 packets. Since the MICAz node can transmit up to 128 bytes at the physical layer, we need to split the data packet to transmit the 139 bytes data packet with intermediate calculation results. The first packet contains the user's information and the generated signature, represented by Sig, and the second data packet contains the intermediate calculation result, represented by INTER. We can conclude that the energy consumed when sending and receiving the data packet Sig...

Example Embodiment

[0069] Specific embodiment three: the difference between this embodiment and specific embodiment one or two is: the difference between this embodiment and specific embodiment one or two is that this embodiment is in the topological structure of 4*4 grid, the slave nodes The simulation analysis of the status is carried out. The specific content is as follows:

[0070] The state of the node is different, and the energy consumed is also different. A node in an active state means that the node sends, receives and transmits data packets; a node in an idle state keeps the radio transceiver on and is responsible for listening and authenticating data packets; a node in a dormant state cannot send, receive, or process any data packets. Initially, the nodes are idle. When it receives the authentication data packet, it is in an active state and waits for the node to complete the authentication work. It will be in a dormant state to reduce energy consumption until all nodes have complet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for accelerating vBNN-IBS authentication in a wireless sensor network. The problem that the public key encryption system is slow in node authentication speed and large in energy consumption under the existing wireless sensor network environment can be solved. The method comprises the following steps: one, performing key extraction for a user to obtain a private key of the user; two, producing the signature of the user by using the private key of the user obtained in the step one; and three, verifying the produced signature of the user. In the wireless sensor network, the authentication speed is accelerated by transmitting a computing result to a neighbor node through one node; the neighbor node can reduce the computation amount as long as the node transmits the computing result, thereby lowering the energy expenditure of the sensor node and effectively accelerating the authentication efficiency; the authentication time is reduced, and the life cycle of the network is improved. The method disclosed by the invention is used for the technical field of the wireless sensor network node authentication.

Description

technical field [0001] The invention relates to the technical field of wireless sensor network node authentication, in particular to an accelerated vBNN-IBS authentication mechanism in the wireless sensor network. Background technique [0002] Wireless sensor network is a large-scale distributed network, nodes are arranged in various ways, and the topology structure after deployment also changes from time to time. Compared with ordinary networks, wireless sensor networks are more vulnerable to various attacks due to the limited computing power and energy resources of the nodes themselves. The security solution must take into account factors such as security and system performance. Node authentication is an important part of security in wireless sensor networks, and it is the basis for the implementation of secure routing protocols and key management protocols. [0003] Due to their own limitations and the multifunctionality of their tasks, modern wireless sensor networks re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04W52/02H04W84/18
CPCH04L9/3252H04W52/0248H04W52/0274H04W84/18Y02D30/70
Inventor 秦丹阳张岩马静雅杨松祥纪萍丁群
Owner HEILONGJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products