Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless sensor communication method and system based on asymmetric key pool and implicit certificate

A wireless sensor and implicit certificate technology, applied in the field of secure communication, can solve the problems of key storage pressure, information leakage, inability to store key cards, etc., and achieve the effect of improving security and ensuring communication security.

Active Publication Date: 2022-08-09
RUBAN QUANTUM TECH CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The capacity of the symmetric key pool is huge, and there are the following problems: it puts pressure on the key storage of the server; Backup and online updates of keys cause trouble
Since all group members have the same group key pool, the communication within the group has no privacy at all, and other group members can also monitor the point-to-point communication encrypted by the group key, resulting in unnecessary information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor communication method and system based on asymmetric key pool and implicit certificate
  • Wireless sensor communication method and system based on asymmetric key pool and implicit certificate
  • Wireless sensor communication method and system based on asymmetric key pool and implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0099] In the authentication and key negotiation process between the client node CU and another client node CV, it is assumed that the public information of both parties is UINFO=U||PU||rkSU and VINFO=V||PV||rkSV. Flow chart such as Figure 4 The specific steps are described as follows:

[0100] Step 0:

[0101] The client CV generates a random number NU according to the random number generator in the matched key fob, and sends it to the client CU together with VINFO.

[0102] step 1:

[0103] After the client CU receives NU and VINFO, it generates a random number NV according to the random number generator in the matched key fob. The client CU obtains CertV according to VINFO, further obtains the public key QV of the client CV, and calculates KUV=HASH(dU*QV||NU||NV).

[0104] Use KUV to calculate the message authentication code MACU=MAC for the identity information U of CertU, NU and client CU KUV (CertU, NU, U). Send the message authentication code together with UINFO ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a wireless sensor communication method and system based on an asymmetric key pool and an implicit certificate. At the same time, this patent uses the implicit certificate to implicitly trust the public key for the confidential communication method based on the implicit certificate. The identity of the user is proved by the use of asymmetric keys and digital signatures. The sender and receiver of the confidential communication can clarify the identity of the other party, and no one else can interfere or counterfeit the confidential communication. Since none of the asymmetric keys are disclosed, and the keys cannot be obtained from the public user information, the asymmetric keys used in this paper are resistant to quantum computing.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a wireless sensor communication method and system based on an asymmetric key pool and an implicit certificate. Background technique [0002] Wireless Sensor Network (WSN) is a distributed sensor network whose extremities are sensors that can perceive and inspect the outside world. WSN is widely used in environmental monitoring, health care, industrial automation and other directions that require high security and confidentiality. Sensors in WSN communicate wirelessly, so network settings are flexible and device locations can be changed at any time. The decentralized nature of devices requires secure management of identity information and verification of the identity of connected users. [0003] In most IoT applications, multiple entities (such as sensing nodes, service providers, and message processors) should first establish a trusted network by authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/38H04W12/0431H04W12/069H04L9/32H04L9/08
CPCH04W4/38H04L9/3263H04L9/3247H04L9/0869H04W12/069Y02D30/70
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD