Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A key management and identity authentication method based on wireless sensor network

A wireless sensor and key management technology, which is applied in the field of key management and identity authentication based on wireless sensor networks, can solve the problems of large resource storage consumption, lack of node authentication mechanism, overlapping of shared keys and reduced network scalability, etc. , to achieve the effect of ensuring privacy

Active Publication Date: 2018-12-21
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key pre-distribution scheme based on random probability needs to store a large number of invalid keys, which consumes a lot of resource storage; the key pre-distribution scheme based on location identity information requires a large amount of computing consumption and lacks a node authentication mechanism
[0006] The existing wireless sensor-based key management scheme still needs to consume a large amount of storage space to store useless keys in the key pre-distribution stage, and the overlapping of shared keys reduces the scalability of the network; when generating session keys / pairing When using keys, the authentication mechanism is not considered in time. The premise of generating paired keys between nodes is the legitimacy of the nodes; most key management solutions are based on static networks, and the efficiency of dynamic networks is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key management and identity authentication method based on wireless sensor network
  • A key management and identity authentication method based on wireless sensor network
  • A key management and identity authentication method based on wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0055] Such as figure 1 As shown, the authentication process between the two nodes is described in detail by taking node A as the requested node and node B as the requesting node as an example.

[0056] S1. Establish a matrix M containing quintuple information of multiple adjacent nodes. The specific steps are as follows:

[0057] S11. The system dynamically sets the communication threshold of node A, which is the communication range set based on the power supply energy and communication capability of node A, and ensures that the communication radius between nodes is r. Set the neighbor node threshold q of node A, which means that each node can communicate with q neighbor nodes at most.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key management and identity authentication method based on a wireless sensor network, which comprises the following steps: S1, establishing a matrix M containing five-tuple information of a plurality of neighboring nodes; S2, establishing a matrix M containing five-tuple information of a plurality of neighboring nodes; S3, establishing a matrix M containing five-tuple information of the neighboring nodes. 2, judging whether that req node is included in the matrix M, if so, turning to S3, otherwise turning to S5; S3, judging whether the quintuple information of the requesting node is valid, if so, turning to S4, otherwise refusing communication; S4, the requested node and the requesting node authenticate through the key distribution center to generate a pairing key; S5, searching the relay node according to the respective communication areas of the requesting node and the requested node, and then repeating S3 to S4 between the relay node and the requesting node, and repeating S3 and S4 between the relay node and the requested node. The invention can achieve the purposes of reducing node resource storage consumption, improving forward and backward safety between nodes and resisting replay attack.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a key management and identity authentication method based on a wireless sensor network. Background technique [0002] Wireless sensor network is composed of a group of sensor nodes with limited resources. They cooperate with each other through wireless communication network in the form of ad hoc network, and have been widely used in many fields. The wireless sensor network integrates multiple technologies including sensor technology and wireless communication technology, and can realize real-time perception, collection, aggregation, and processing of various monitoring information in the distributed area collaboratively, and send them to users who need this information, thereby It enables users to realize the dynamic intelligent perception of the physical environment. [0003] In wireless sensor networks, the physical particularity of wireless communic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L9/32H04L9/08H04W12/0431H04W12/0433
CPCH04L9/0861H04L9/3297H04W12/02H04W12/04H04W12/06
Inventor 张洁张文
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products