Underwater mobile node re-authentication method based on trust chain

A mobile node and re-authentication technology, applied in electrical components, transmission systems, etc., can solve the problems of high computational complexity, high communication overhead and storage overhead of underwater mobile node re-authentication, and achieve less communication overhead and reduce communication conflicts. and collision, the effect of low computational complexity

Active Publication Date: 2019-10-29
SOUTHEAST UNIV
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a trust chain-based underwater mobile node re-authentication method, which solves the problems of high computational complexity, high communication overhead and storage overhead for underwater mobile node re-authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Underwater mobile node re-authentication method based on trust chain
  • Underwater mobile node re-authentication method based on trust chain
  • Underwater mobile node re-authentication method based on trust chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Such as figure 1 As shown, a trust chain-based underwater mobile node re-authentication method includes the following steps:

[0022] (1) The cluster head broadcasts periodically to check whether the member nodes have left the communication range of the node;

[0023] (2) ctr is a special character string specified by the cluster head for broadcast query, and the cluster head broadcast ciphertext M 0 , member nodes receive M 0 A response message M will be generated 1 And send it to the cluster head, after receiving the response from the member nodes, the cluster head thinks that the node is still in the communication coverage area of ​​the cluster at this time; once the cluster head does not receive the feedback from the member nodes, the cluster head thinks that the node has moved ;

[0024] (3) The member node has moved and left the communication range of the cluster head. At this time, the cluster head will send a message to its neighbor cluster head to notify th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an underwater mobile node re-authentication method based on a trust chain, and the method comprises the following steps that a cluster head carries out the periodic broadcasting, and inquires whether a member node is separated from the communication range of the node or not; the cluster head broadcasts a ciphertext, the member node receives a response generation message M1and sends the response generation message M1 to the cluster head, the cluster head considers that the node is still in the communication coverage area of the cluster at the moment after receiving theresponse of the member node, and once the cluster head does not receive the feedback of the member node, the cluster head considers that the node has moved; when the member node moves and breaks awayfrom the communication range of the cluster head, the cluster head sends a message to the neighbor cluster head and distributes key information for re-authentication of the mobile node to the neighborcluster head; and after the new cluster head 3 receives the message M and broadcasts the ciphertext M, the original cluster head 2 deletes all information related to the mobile node in the memory. According to the invention, the problems of relatively high computation complexity, relatively high communication overhead and relatively high storage overhead of underwater mobile node re-authentication are solved.

Description

technical field [0001] The invention relates to the technical field of authentication protocols, in particular to a trust chain-based underwater mobile node re-authentication method. Background technique [0002] Abundant marine resources and a large number of marine application scenarios have made researchers around the world increasingly keen on the development of marine resources and the research on underwater acoustic communication network technology. Scientific researchers around the world are more widely involved in marine technology research, and countries are paying more and more attention to the acquisition and processing of marine information. Ocean data is the key basis for all ocean technology applications, including data generation, collection, storage, transmission, and processing. Therefore, key technologies of underwater acoustic communication networks have gradually become key research topics for major oceanic countries. Designing and developing a low-cost,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/061H04L63/08H04L63/10
Inventor 黄杰黄亮平
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products