Wireless sensor network broadcast identity authentication method based on chaos

A wireless sensor and identity authentication technology, applied in the field of wireless sensor network broadcast identity authentication based on chaos, can solve the problems of reducing wireless sensor network overhead, initial parameter overhead, limited wireless sensor network hardware resources, etc.

Inactive Publication Date: 2018-04-17
GUANGXI NORMAL UNIV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After that, many further improvements of the μTESLA-based schemes were proposed by many researchers, but due to the propagation delay of the public key and the delayed authentication of broadcast messages, these schemes suffered from several active attacks
The broadcast authentication scheme based on symmetric key secrecy has indeed obtained the advantages of low communication overhead and energy consumption, but there are still some defects in these schemes, such as: the maintenance of time synchronization in wireless sensor networks is a very complicated task, the initial parameter Distribution also brings serious overhead, and certification delays are unavoidable;
[

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network broadcast identity authentication method based on chaos
  • Wireless sensor network broadcast identity authentication method based on chaos
  • Wireless sensor network broadcast identity authentication method based on chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0072] A chaos-based wireless sensor network broadcast identity authentication method, comprising the steps of:

[0073] 1) System initialization: In this example, the base station acts as a private key generation center and is a trustworthy entity. The system initialization phase is completed in the base station. The base station randomly selects two different large prime numbers P and Q, which have The same number of digits, then calculate N=P·Q according to P and Q, and L=(P 2 -1)(Q 2 -1), select the private key SK of the base station BS , (0BS BS , the calculation result needs to satisfy the condition: SK BS ·PK BS ≡1(mod L), master key SK BS Only stored in the base station, the system parameters SP(PK BS , N) public;

[0074] 2) Key generation: In this stage, a secure hash function h( ) is selected, and the base station uses the master key SK BS Through the identity information ID corresponding to the node S To calculate the respective private keys of all sensor n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network broadcast identity authentication method based on chaos, which is characterized by comprising the following steps: 1) system initialization, 2) secretkey generation, 3) message broadcasting, 4) identity authentication, 5) sender revocation. According to the method, the security of identity authentication of the wireless sensor network can be ensured; furthermore, the resource consumption of the wireless sensor network can be reduced, and various attacks can be resisted.

Description

technical field [0001] The invention is a wireless sensor network broadcast identity authentication scheme, in particular a chaos-based wireless sensor network broadcast identity authentication method. Background technique [0002] Identity authentication is the process by which one party in the network determines the identity of the other party according to a certain network protocol and algorithm, and it is also a security access mechanism for the network. Due to the small storage capacity, poor computing power and limited network bandwidth of sensor nodes in wireless sensor networks, the current traditional Internet authentication technology is not suitable for wireless sensor networks. In recent years, through continuous research by domestic and foreign scholars, the broadcast authentication technology of wireless sensor network is mainly divided into symmetric key encryption (SKC) and public key encryption (PKC). [0003] The first is symmetric key encryption, and a we...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W84/18H04L9/00H04L9/06H04L9/32H04W12/041
CPCH04L9/001H04L9/0643H04L9/3247H04L9/3297H04W12/04H04W12/06H04W84/18
Inventor 罗玉玲刘运琪刘俊秀丘森辉闭金杰廖志贤彭慧玲
Owner GUANGXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products