Cooperative identity verification method for large-scale wireless sensor network

An identity verification method and wireless sensor technology are applied in the field of Internet of Things security to achieve the effect of reducing storage space requirements, less memory consumption, and meeting the needs of collaborative verification

Active Publication Date: 2021-06-18
DALIAN UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The present invention provides a large-scale wireless sensor network cooperative identity verification method. The technical problem to be solved is how to perform fast certificate verification in the wireless sensor network and solve the consumption of storage and communication resources caused by certificate storage and transmission; at the same time, Protect network security and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative identity verification method for large-scale wireless sensor network
  • Cooperative identity verification method for large-scale wireless sensor network
  • Cooperative identity verification method for large-scale wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific implementation manner of the present invention will be described in detail below in combination with the technical scheme and accompanying drawings.

[0029] The structure of the locator CLoc based on the cuckoo hash designed by the present invention is as follows figure 1 As shown, similar to the basic cuckoo hash, CLoc first constructs a hash table for storing key values. Second, two hash functions h are required 1 (·), h 2 (·) is used to determine the two possible positions of the inserted value.

[0030] The insertion operation of the CLoc locator is as follows:

[0031] (1) Perform CRC-32 function calculation on the public key value attached to the verified certificate: CRC 32 (PK cer ).

[0032] (2) Calculate the Key:CRC to be stored in the locator 32 (PK cer )||CRC 32 (IDX ver )>>24||IDX ver .

[0033] (3) Input the obtained 32-bit check code into a hash function to obtain the first possible storage position of the K...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of Internet of Things security, and relates to a large-scale wireless sensor network collaborative identity verification method. Based on a distributed thought, a cooperative strategy is adopted, and storage spaces on all nodes in a network are regarded as a large pool to cache a verified public key certificate. All sensor devices construct a CLoc locator, and a cold start improved algorithm is executed after network initialization; and when the equipment needs to verify the public key certificate, firstly querying the cuckoo hash-based locator, and if cache information is obtained, communicating with the equipment to complete verification. In addition, a sensor trust model for evaluating the credibility of the equipment in the dynamic network is also designed. The method has the advantages that the average verification time is greatly shortened, the calculation and space complexity is remarkably reduced, and safe identity verification can be achieved on the basis of maintaining long-term operation of the wireless sensor network.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to a locator structure (CLoc, Cuckoo Locator) for mapping sensors and their verifiers, a collaborative verification protocol, an improved cold start algorithm, and a trust model technology, specifically a large-scale A collaborative authentication method for wireless sensor networks that can be used for device authentication in the massive Internet of Things. Background technique [0002] In recent years, the Internet of Things has drawn a lot of attention due to emerging applications in industrial automation, smart devices, and smart cities. The perception layer of the Internet of Things is composed of a group of spatially dispersed and dedicated sensors, which are used to monitor and record physical data in the environment and organize the collected data in the center. These sensory data have extremely high utilization value and require Safe and ef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/069H04W4/38H04L29/08
CPCH04W4/38H04L67/12
Inventor 李凤岐范永刚迟宗正张璐鹏王平川
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products