Wireless sensor communication method and system based on asymmetric key pool and implicit certificate
A wireless sensor and implicit certificate technology, applied in the field of secure communication, can solve the problems of key storage pressure, information leakage, inability to store key cards, etc., and achieve the effect of improving security and ensuring communication security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0099] In the authentication and key negotiation process between the client node CU and another client node CV, it is assumed that the public information of both parties is UINFO=U||PU||rkSU and VINFO=V||PV||rkSV. Flow chart such as Figure 4 The specific steps are described as follows:
[0100] Step 0:
[0101] The client CV generates a random number NU according to the random number generator in the matched key fob, and sends it to the client CU together with VINFO.
[0102] step 1:
[0103] After the client CU receives NU and VINFO, it generates a random number NV according to the random number generator in the matched key fob. The client CU obtains CertV according to VINFO, further obtains the public key QV of the client CV, and calculates KUV=HASH(dU*QV||NU||NV).
[0104] Use KUV to calculate the message authentication code MACU=MAC for the identity information U of CertU, NU and client CU KUV (CertU, NU, U). Send the message authentication code together with UINFO ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


