A Reauthentication Method for Underwater Mobile Nodes Based on Trust Chain

A mobile node and re-authentication technology, applied in the transmission system, electrical components, etc., can solve the problems of high computational complexity, high communication overhead and storage overhead of underwater mobile node re-authentication, achieve less communication overhead and reduce communication conflicts and collision, the effect of low computational complexity

Active Publication Date: 2021-09-07
SOUTHEAST UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a trust chain-based underwater mobile node re-authentication method, which solves the problems of high computational complexity, high communication overhead and storage overhead for underwater mobile node re-authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Reauthentication Method for Underwater Mobile Nodes Based on Trust Chain
  • A Reauthentication Method for Underwater Mobile Nodes Based on Trust Chain
  • A Reauthentication Method for Underwater Mobile Nodes Based on Trust Chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Such as figure 1 As shown, a trust chain-based underwater mobile node re-authentication method includes the following steps:

[0022] (1) The cluster head broadcasts periodically to check whether the member nodes have left the communication range of the node;

[0023] (2) ctr is a special character string specified by the cluster head for broadcast query, and the cluster head broadcast ciphertext M 0 , member nodes receive M 0 A response message M will be generated 1 And send it to the cluster head, after receiving the response from the member nodes, the cluster head thinks that the node is still in the communication coverage area of ​​the cluster at this time; once the cluster head does not receive the feedback from the member nodes, the cluster head thinks that the node has moved ;

[0024] (3) The member node has moved and left the communication range of the cluster head. At this time, the cluster head will send a message to its neighbor cluster head to notify th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trust chain-based underwater mobile node re-authentication method, which includes the following steps: the cluster head broadcasts periodically, and inquires whether the member nodes have left the communication range of the node; the cluster head broadcasts ciphertext, and the member nodes A response message M is received 1 And send it to the cluster head. After receiving the response from the member nodes, the cluster head thinks that the node is still in the communication coverage area of ​​the cluster at this time. Once the cluster head does not receive the feedback from the member nodes, the cluster head thinks that the node has moved ;The member node has moved and left the communication range of the cluster head. At this time, the cluster head will send a message to its neighbor cluster head, and distribute the key information for the re-authentication of the mobile node to the neighbor cluster head; the new cluster head 3 receives After receiving the message M and broadcasting the ciphertext M, the original cluster head 2 will delete all information related to the mobile node in the memory. The invention solves the problems of higher calculation complexity, higher communication overhead and storage overhead of underwater mobile node re-authentication.

Description

technical field [0001] The invention relates to the technical field of authentication protocols, in particular to a trust chain-based underwater mobile node re-authentication method. Background technique [0002] Abundant marine resources and a large number of marine application scenarios have made researchers around the world increasingly keen on the development of marine resources and the research on underwater acoustic communication network technology. Scientific researchers around the world are more widely involved in marine technology research, and countries are paying more and more attention to the acquisition and processing of marine information. Ocean data is the key basis for all ocean technology applications, including data generation, collection, storage, transmission, and processing. Therefore, key technologies of underwater acoustic communication networks have gradually become key research topics for major oceanic countries. Designing and developing a low-cost,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/061H04L63/08H04L63/10
Inventor 黄杰黄亮平
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products