Safe clustering method and device based on wireless sensor network

A wireless sensor and clustering technology, which is applied in the computer field, can solve the problems of node attacks and the inability to guarantee the communication security of sensor nodes, and achieve the effects of preventing masquerade attacks, facilitating deployment, and improving security

Pending Publication Date: 2020-03-24
SHENZHEN TECH UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a secure clustering method and device based on wireless sensor networks, aiming at solving the problem that all nodes in the prior art have the same set of keys shared by the entire network. Once the keys are attacked, the Most of the nodes are attacked, and the communication security between sensor nodes cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe clustering method and device based on wireless sensor network
  • Safe clustering method and device based on wireless sensor network
  • Safe clustering method and device based on wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] figure 1 It shows the implementation flowchart of the secure clustering method based on the wireless sensor network provided by Embodiment 1 of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are shown, and the details are as follows:

[0028] In step S101, after a node is bootstrapped as a cluster head node, a clustering request is sent through a supervisory node within a preset communication range.

[0029] In the embodiment of the present invention, when a node in the wireless sensor network is bootstrapped as a cluster head node, the cluster head node broadcasts a clustering request to non-cluster head nodes within the preset communication range, and the clustering request is sent via The supervisory node sends to the non-cluster head node within the preset communication range to invite the non-cluster head node within the preset communication range to become the intra-cluster node of the c...

Embodiment 2

[0055] Figure 5 A schematic structural diagram of a wireless sensor network-based security clustering device provided by Embodiment 2 of the present invention is shown. For convenience of description, only parts related to the embodiment of the present invention are shown. In the embodiment of the present invention, the secure clustering device based on the wireless sensor network includes: a clustering request sending unit 51, a first authentication unit 52, a second authentication unit 53 and a third authentication unit 54, wherein:

[0056] The clustering request sending unit 51 is configured to send the clustering request through the supervisory node within the preset communication range after the node is bootstrapped as the cluster head node.

[0057] In the embodiment of the present invention, when a node in the wireless sensor network is bootstrapped as a cluster head node, the cluster head node broadcasts a clustering request to non-cluster head nodes within the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of computers, and provides a safe clustering method and device based on a wireless sensor network, and the method comprises the steps: a clustering request in a preset communication range is transmitted through a monitoring node after a node is bootstrapped as a cluster head node; when a non-cluster-head node responds to the clustering request, a supervision node performs first authentication on an identity identifier of the non-cluster-head node to form first authentication information; after the first authentication is passed, a cluster headnode performs second authentication on the first authentication information sent by the supervision node to form second authentication information; and after the second authentication is passed, the non-cluster head node performs third authentication on the second authentication information sent by the supervision node to authenticate the non-cluster head node as an intra-cluster node of the cluster head node. The monitoring nodes are responsible for monitoring communication between the cluster head nodes and the non-cluster-head nodes, repeated authentication of the authenticated non-cluster-head nodes and illegal node camouflage attacks are prevented, and therefore communication safety between the sensor nodes is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a secure clustering method and device based on a wireless sensor network. Background technique [0002] The information security problem of the perception layer of the Internet of Things is a new problem gradually accompanied by the emergence and development of the Internet of Things, and it is the core content of the Internet of Things security. Trust management is emphasized in wireless sensor networks to ensure the authenticity and validity of collected data. Currently, secure clustering and secure data fusion in wireless sensor networks are very vulnerable to node tracking, cloning and counterfeiting attacks. Therefore, it is necessary to Find a safe and effective node information exchange method in the sensor network. Secure Clustering Algorithm (SCA) In order to ensure the secure organization and management of complex IoT sensor nodes and the realization of e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/06H04W12/12H04L9/32H04W4/38H04W12/122
CPCH04W12/009H04W12/06H04L9/3236H04W4/38H04L2209/805H04W12/55H04W12/122Y02D30/70
Inventor 张俊杰何轩叶青松肖志勇汪香君
Owner SHENZHEN TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products