An underwater node authentication method based on symmetric polynomial and ECC algorithm

A symmetric polynomial and authentication method technology, applied in the field of underwater node authentication based on symmetric polynomial and ECC algorithm, can solve problems such as high communication overhead, achieve the effect of less communication overhead, easy management, and reduction of communication conflicts and collisions

Active Publication Date: 2022-02-18
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide an underwater node authentication method based on symmetric polynomial and ECC algorithm, which solves the problem of high communication overhead of underwater node authentication and effectively reduces the probability of data collision

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An underwater node authentication method based on symmetric polynomial and ECC algorithm
  • An underwater node authentication method based on symmetric polynomial and ECC algorithm
  • An underwater node authentication method based on symmetric polynomial and ECC algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Such as figure 1 , figure 2 As shown, an underwater node authentication method based on symmetric polynomial and ECC algorithm includes the following steps:

[0034] (1) Initialization

[0035]1) The base station selects and generates security parameters required for network authentication and stores them in all network nodes. Network nodes include gateway nodes, cluster head nodes and common nodes.

[0036] 2) The base station assigns unique IDs to all physical components in the network.

[0037] 3) The base station calculates the public-private key pair (PU) for all network nodes i , PR i ) and stored in the corresponding node. After the calculation is completed, the base station deletes the private keys of all nodes, and only saves the identity public key pair of the node (ID i , PU i ). After calculating the public and private keys of all nodes, the unique identity key pair (ID i , PU i , PR i ) is stored in the identity identifier as ID i in the node. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an underwater node authentication method based on a symmetrical polynomial and an ECC algorithm, comprising the following steps: initialization, authentication, key exchange for a pair, and group key exchange. Initialization means that the base station in the network assigns security parameters and algorithms to member nodes such as buoys, cluster heads, and ordinary nodes, including symmetric polynomial shares, public and private keys, encryption algorithms, and message authentication code functions. Authentication and key exchange refers to the two-way authentication between the cluster head and the ordinary nodes through three communications, and the successful exchange of symmetric session keys. This authentication method can effectively resist man-in-the-middle attacks. Group key exchange means that after the authentication of the cluster head and all member nodes in the cluster is successful, the cluster head needs to generate a unique symmetric group key shared with all member nodes to realize the encrypted transmission of the cluster head broadcast message, which is convenient for the cluster head to communicate with the member nodes. management. The invention solves the problem of relatively high communication overhead for underwater node authentication, and effectively reduces the probability of data conflicts.

Description

technical field [0001] The invention relates to the technical field of node authentication, in particular to an underwater node authentication method based on a symmetrical polynomial and an ECC algorithm. Background technique [0002] Abundant marine resources and a large number of marine application scenarios have made researchers around the world increasingly keen on the development of marine resources and the research on underwater acoustic communication network technology. Scientific researchers around the world are more widely involved in marine technology research, and countries are paying more and more attention to the acquisition and processing of marine information. Ocean data is the key basis for all ocean technology applications, including data generation, collection, storage, transmission, and processing. Therefore, key technologies of underwater acoustic communication networks have gradually become key research topics for major oceanic countries. Designing and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/041H04W12/0471H04W12/03H04W12/106H04L9/32H04L9/08H04L9/40H04B13/02H04B11/00H04W12/0431
CPCH04W12/02H04L9/3242H04L9/0866H04L63/0435H04L63/123H04B13/02H04B11/00H04W12/03H04W12/043H04W12/041H04W12/106
Inventor 王大宇张锦灿王志欣唐立赫黄杰黄亮平
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products