Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pair secret key management method suitable for clustering wireless sensor network model

A technology of wireless sensor and network model, applied in the direction of public key of secure communication, network topology, wireless communication, etc., can solve the problem of not realizing the legality authentication of the key update command of group member nodes, and not fully testing the wireless sensor network. Dynamic changes, hidden security risks of key management mechanisms, etc.

Active Publication Date: 2020-07-24
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the current research on key management in sensor networks has achieved a variety of secure unicast communications to a certain extent, they have not fully considered the dynamic changes of wireless sensor networks (for example, due to the limited resources of sensor nodes, the Exhaustion of energy consumption makes it necessary to exit the network, such a process will inevitably lead to dynamic changes in the network), so that the entire scheme lacks a key update mechanism; although some key management schemes have a key update mechanism, they have not been implemented. Mutual authentication between the network access node and the cluster head node does not realize the legitimacy authentication of the key update command issued by the cluster head by the group member nodes, so there is a certain security risk in the key management mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pair secret key management method suitable for clustering wireless sensor network model
  • Pair secret key management method suitable for clustering wireless sensor network model
  • Pair secret key management method suitable for clustering wireless sensor network model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic concept of the present invention, and the following embodiments and the features in the embodiments can be combined with each other in the case of no conflict.

[0055] Wherein, the accompanying drawings are for illustrative purposes only, and represent only schematic diagrams, rather than physical drawings, and should...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a pair secret key management method suitable for a clustering wireless sensor network model, and belongs to the technical field of wireless communication. The method employs acombined public key-based algorithm to generate a pair secrete key. In the process of mutually authenticating identity identifiers of two parties, identity identification authentication between a cluster head and an intra-group node is completed by utilizing a combined private key generated by the identity identifiers, a ciphertext formed by encrypting the identity identifiers and an authentication code generated by system time; in secret key updating, updating of the combination matrix of the intra-group nodes is dynamically distributed by each group of cluster head nodes. The intra-group node completes the identification of the legality of the key updating command by utilizing the hidden witness in the key updating message. According to the method, the calculation overhead and the storage overhead of the whole network are reduced, the pair secret key management of the clustering wireless sensor network model in the true sense is realized, the forward security and the backward security of the whole network are ensured, and the security and the reliability of the wireless sensor network during operation are improved.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a key management method suitable for a clustered wireless sensor network model. Background technique [0002] The wireless sensor network is composed of a large number of wireless sensor nodes deployed to the monitoring area, mainly for sensing and collecting information. At present, sensor networks have been widely used in data collection, military monitoring, environmental monitoring, medical applications, intelligent transportation, robot control, remote control of dangerous areas and other fields. In WSN, except for some special cases that require multicast communication, wireless sensor networks are more point-to-point unicast communication. There are problems such as replay attack, forgery attack and message hijacking in unicast communication, so the problem of secure unicast has become one of the key issues restricting the development of WSN. [0003] Althou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04L9/30H04W84/18
CPCH04W12/04H04L9/3066H04L9/3073H04W84/18H04W12/041H04W12/0433
Inventor 王浩刘中亚王明存
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products