Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless sensor network system and method based on CPK

A wireless sensor and network technology, applied in the field of sensor networks, can solve the problems of instability, denial of service attacks, communication protocols are vulnerable to various attacks, etc., to improve stability and reliability, ensure reliability, and ensure security. Effect

Pending Publication Date: 2021-06-29
重庆富民银行股份有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the same time, with the application and development of wireless sensor networks, sensor networks are also facing more and more complex security threats; due to the unreliability of wireless sensor network communication channels and unstable network topology, communication protocols are vulnerable to various attacks, such as Man-in-the-middle attack, Sybil attack, denial of service attack, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network system and method based on CPK
  • Wireless sensor network system and method based on CPK
  • Wireless sensor network system and method based on CPK

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0092] Such as figure 1 As shown, the CPK-based wireless sensor network system in this embodiment is mainly composed of three types of equipment: base station, cluster head node, and intra-cluster node. The main function of the base station BS (Bass Station) is to manage the entire wireless sensor network, including identification management, public and private key management, data summary processing and sending to observers, etc. The cluster head node CH (ClusterHead) is equivalent to a router, and its main function is to realize message reception, processing, forwarding between nodes in the sensor network, and direct communication with the base station. Sensor node (Node) is the largest type of equipment in the network. It undertakes different tasks according to the functions of its sensors, and collects, processes, and sends relevant data of sensing objects cooperatively and autonomously.

[0093] The CPK-based wireless sensor network method disclosed in this embodiment in...

Embodiment 2

[0199] The difference between this embodiment and Embodiment 1 is that, in this embodiment, the clustering step and the intra-cluster communication step also include a node position detection step before performing node identity verification, and detect nodes to be verified through nodes in the cluster that have passed the authentication According to the signal strength information, the position of the node to be verified is calculated according to the signal strength information, and compared with the position of the node in the historical record, it is judged whether the position of the node to be verified has changed. If so, the verification fails and the connection is terminated. If so, the verification passes , to proceed with node authentication.

[0200] In this embodiment, the signal strength of the node to be verified is detected through the authenticated nodes in the cluster, and the location is detected and verified based on the signal strength. In this embodiment, s...

Embodiment 3

[0202] The difference between this embodiment and Embodiment 2 is that in this embodiment, if it is detected that the position of the node to be verified has changed, the server is requested to determine whether there is a maintenance change record, if so, the verification is passed, and the node identity verification is continued, otherwise, the connection is terminated .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of sensor networks, in particular to a CPK-based wireless sensor network system and method. The method comprises the following steps: a secret key generation and distribution step: generating a secret key matrix which comprises a private key matrix and a public key matrix, and enabling each node to obtain a private key and a public key matrix; a clustering step: the cluster head competitive node communicates with other nodes to complete key negotiation, all node information is mapped to a Bloom filter, and the cluster head competitive node sends the Bloom filter to each node; and an intra-cluster communication step: when the intra-cluster node receives communication requests of other nodes, verification is carried out through a Bloom filter, key negotiation is completed, and communication is carried out through a negotiated session key. According to the wireless sensor network system and method based on the CPK, self-organization of the wireless sensor network can be achieved, the stability of the wireless sensor network is improved, the safety of sensor node communication can be guaranteed, and the reliability of data is guaranteed.

Description

technical field [0001] The invention relates to the technical field of sensor networks, in particular to a CPK-based wireless sensor network system and method. Background technique [0002] Wireless Sensor Network WSN (Wireless Sensor Network) is considered to be one of the most important technologies in this century. It is widely used in supply chain management and is the core technology to realize supply chain data perception. Wireless sensor network is a wireless network composed of a large number of stationary or mobile wireless sensor nodes in a self-organizing manner. It is the core component of the Internet of Things. Its technical characteristics are mainly manifested in: large-scale, self-organizing, dynamic and robust And the network structure of the data center. The wireless sensor network is composed of a large number of sensor nodes deployed in the observation area, which is used for cooperative and autonomous perception, collection and processing of the sensin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/041H04W12/06H04L9/30H04L9/08
CPCH04W12/06H04L9/3066H04L9/0816H04L9/0838
Inventor 刘思源
Owner 重庆富民银行股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products