Dynamic certificate authentication key negotiation method for wireless sensor network

An authentication key negotiation and wireless sensor technology, which is applied in wireless communication and key distribution, can solve problems such as inapplicability and high computing cost, and achieve the effects of reducing computational complexity, improving computational efficiency, and reducing cache consumption

Active Publication Date: 2019-04-09
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the high computational cost...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic certificate authentication key negotiation method for wireless sensor network
  • Dynamic certificate authentication key negotiation method for wireless sensor network
  • Dynamic certificate authentication key negotiation method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to better understand the present invention, the implementation process of the present invention will be described in detail below based on the above-mentioned technical solution, and the implementation scope of the present invention is a general scenario, not limited to the situation described below.

[0049] Such as figure 1 As shown, the present invention provides a novel wireless sensor network dynamic credential authentication key agreement protocol, including the following steps:

[0050] Step 1: U i (User) Select Identity ID i and long-term authentication key lk i , generate a random number r i , to calculate the median lp i =h(r i ||lk i ), summarizing user confidential information m rg Send to GW.

[0051] Step 2: GW chooses a random number r i ' and rk GW , calculate pseudonym TI i =h(r' i ||ID i ) with dynamic authentication credentials ss i,t :=h(TI i ||rk GW ||t), save the confidential information to GW, and save the smart card conte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic certificate authentication key negotiation method for a wireless sensor network, belongs to the field of sensor network information security, and only adopts a Hash function as a construction block and provides mutual identity verification and perfect forward confidentiality attribute based on a new DAC. In the method, each node is configured with one new DAC, andonce the session key is successfully established based on the current key, the DAC is updated, so that specific DAC value is only limited to one session key. Thus, the compromised authentication keydoes not affect other previously established session keys. In addition to having basic security attributes (e.g., mutual authentication and PFS, etc.), the method may also detect previously simulatedattacks to a user/sensor by comparing its current DAC with respective DACs stored at a gateway node. In addition, according to the scheme, only the hash function and the XOR operation are used, so that the calculation efficiency of the method is comprehensively improved.

Description

technical field [0001] The invention belongs to the field of sensor network information security, and mainly relates to a new wireless sensor network dynamic credential authentication key negotiation method used to replace public key encryption primitives in the wireless sensor network, so as to improve protocol execution efficiency and reduce hardware cost. Background technique [0002] Wireless sensor networks (WSN) have become the infrastructure in many practical applications. They are deep network systems of low-power wireless sensor nodes with a small amount of CPU and memory. The data collected by the sensors may involve a lot of sensitive information, such as personal physiological information, and Battlefield information, which can only be accessed by authorized users. Authenticated Key Agreement (AKA) protocols are ideal for protecting critical information in WSNs. [0003] When designing a lightweight AKA protocol for WSN, the following security properties need to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04L9/08H04L9/06H04L9/00H04W12/0431
CPCH04L9/002H04L9/0643H04L9/0844H04W12/04
Inventor 赖俊宇杨铮何辞肖翰张亚生
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products