Check patentability & draft patents in minutes with Patsnap Eureka AI!

Sensor network authentication key establishment method based on light certificate and implementation device thereof

A sensor network and authentication key technology, applied in the field of authentication key establishment, can solve the problem of negotiating packet loss without considering the solution, reducing security, not considering and other problems, achieving high security, low reliability, and improving reliability Effect

Active Publication Date: 2020-03-24
WUHAN UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1), all assume that the lower layer is reliable, so that the existing methods do not consider solving the problem of loss of negotiation packets;
[0004] 2), all do not consider the limitation of the maximum transmission unit (MTU, Maximum Transmission Unit) of the lower layer, such as IEEE802. class case)
Existing schemes either exceed this limit, or implement authentication-less key establishment (such as EPKI)
When the limit is exceeded, the key establishment package will be fragmented at the bottom layer, so that an attacker can destroy the entire key agreement process as long as one of them is destroyed, reducing security
The key agreement without authentication will lead to various attacks, such as impersonation attack, MITM attack, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensor network authentication key establishment method based on light certificate and implementation device thereof
  • Sensor network authentication key establishment method based on light certificate and implementation device thereof
  • Sensor network authentication key establishment method based on light certificate and implementation device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The technical solutions of the present invention will be further specifically described below through the embodiments and in conjunction with the accompanying drawings.

[0037] The authentication key establishment method provided by the present invention includes the following two stages:

[0038] Phase 1: Key pre-distribution

[0039] This stage is divided into two steps:

[0040] Step 1, initialization.

[0041] Assuming that the security requirement of the application scenario of this method is 80-bit level, if we choose the public key primitive used as ECC, then the security parameter λ=160 can be selected.

[0042] Take the curve as E:y 2 =x 3 +ax+b(a, b is a constant, 4a 3 +27b 2≠0), select a large prime number p of λ bits, based on E / F p Construct a cyclic Abelian group G with order q (q is also a sufficiently large λ-bit prime number), from which a generator P can be determined.

[0043] Choose a suitable hash function: Because the hash function in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method aims to solve the problems that an authentication key establishment method based on a public key in an existing sensor network does not consider the limitation of a maximum transmission unit and is low in reliability. The invention discloses a sensor network authentication key establishment method based on a light certificate and an implementation device thereof, public key authentication, private key authentication and secret value authentication are realized by adopting the light certificate and a digital signature mode, and the confidentiality for calculating a session key secretvalue is realized through a public key encryption / decryption mechanism. The invention further provides an implementation device based on ECC public key primitive ECIES, ECDSA and other operations. The device is realized by using TinyECC based on a TinyOS platform on a TelosB node, and the result shows that when the method disclosed by the invention is applied to ECC primitives, the key establishment of the two nodes takes 66.5 seconds, and in order to improve the reliability, a repeated negotiation parameter is set to be 1 as the most cost-effective way.

Description

technical field [0001] The invention belongs to the technical field of authentication key establishment in network security, in particular to an authentication key establishment (or negotiation, distribution, exchange) method for a sensor network, which can be used for safely and efficiently negotiating a shared session key between nodes in a sensor network . Background technique [0002] As a part of the Internet of Things and fog computing, sensor networks have been extensively studied over the years, and providing security in their resource-constrained network environments has always been a research hotspot. Early researchers focused on using symmetric key mechanism to provide security, but because of the inherent characteristics of symmetric key mechanism, key agreement has not been perfectly solved. Until the feasibility of the public key mechanism in the sensor network was certified later, the public key mechanism based on ECC has been widely used in the key agreement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0838H04L9/083H04L9/0822H04L9/3263H04L9/3268H04L9/3271H04L9/3247
Inventor 孙发军何炎祥张晓曈李清安
Owner WUHAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More