Supercharge Your Innovation With Domain-Expert AI Agents!

A key negotiation method for dynamic credential authentication in wireless sensor networks

An authentication key agreement, wireless sensor technology, applied in wireless communication, key distribution, can solve problems such as inapplicability and high computational cost

Active Publication Date: 2021-09-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the high computational cost, this protocol cannot be applied to WSN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key negotiation method for dynamic credential authentication in wireless sensor networks
  • A key negotiation method for dynamic credential authentication in wireless sensor networks
  • A key negotiation method for dynamic credential authentication in wireless sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to better understand the present invention, the implementation process of the present invention will be described in detail below based on the above-mentioned technical solution, and the implementation scope of the present invention is a general scenario, not limited to the situation described below.

[0049] Such as figure 1 As shown, the present invention provides a novel wireless sensor network dynamic credential authentication key agreement protocol, including the following steps:

[0050] Step 1: U i (User) Select Identity ID i and long-term authentication key lk i , generate a random number r i , to calculate the median lp i =h(r i ||lk i ), summarizing user confidential information m rg Send to GW.

[0051] Step 2: GW chooses a random number r i ' and rk GW , calculate pseudonym TI i =h(r' i ||ID i ) with dynamic authentication credentials ss i,t :=h(TI i ||rk GW ||t), save the confidential information to GW, and save the smart card conte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless sensor network dynamic credential authentication key negotiation method, which belongs to the field of sensor network information security. The method only uses a hash function as a building block and provides mutual authentication and perfect forward secrecy attributes based on a new DAC. In the method of the invention, each node configures a new DAC, and once the session key is successfully established based on the current key, the DAC is updated, so the specific DAC value is limited to only one session key. Therefore, a compromised authentication key does not affect other previously established session keys. In addition to having basic security properties (such as mutual authentication and PFS, etc.), the present invention can also detect previous simulated attacks on users / sensors by comparing their current DAC with the corresponding DAC stored at the gateway node. In addition, the solution of the present invention only uses a hash function and an XOR operation, thereby comprehensively improving the calculation efficiency of the present invention.

Description

technical field [0001] The invention belongs to the field of sensor network information security, and mainly relates to a new wireless sensor network dynamic credential authentication key negotiation method used to replace public key encryption primitives in the wireless sensor network, so as to improve protocol execution efficiency and reduce hardware cost. Background technique [0002] Wireless sensor networks (WSN) have become the infrastructure in many practical applications. They are deep network systems of low-power wireless sensor nodes with a small amount of CPU and memory. The data collected by the sensors may involve a lot of sensitive information, such as personal physiological information, and Battlefield information, which can only be accessed by authorized users. Authenticated Key Agreement (AKA) protocols are ideal for protecting critical information in WSNs. [0003] When designing a lightweight AKA protocol for WSN, the following security properties need to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/0431H04L9/08H04L9/06H04L9/00
CPCH04L9/002H04L9/0643H04L9/0844H04W12/04
Inventor 赖俊宇杨铮何辞肖翰张亚生
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More