Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure communication method for wireless sensor network

A wireless sensor and network security technology, applied in wireless communication, public key for secure communication, secure communication device, etc., can solve problems such as secret key escrow, achieve strong security, avoid delayed verification problems, and avoid replay attacks Effect

Active Publication Date: 2021-08-24
STATE GRID SICHUAN ELECTRIC POWER CORP ELECTRIC POWER RES INST
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identity-based key agreement protocol can avoid such problems, but the identity-based agreement protocol has the key escrow problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method for wireless sensor network
  • Secure communication method for wireless sensor network
  • Secure communication method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0082] This embodiment proposes a method for secure communication in a wireless sensor network. The method in this embodiment is implemented based on a wireless sensor network system. The wireless sensor network system includes: KGC (Key Generation Center, secret key generation center), the trust center of the entire network , is used to establish the basis of the authentication system, and all nodes trust the signature of KGC. KGC creates a partial key for each node for identity authentication and key negotiation; nodes, participants in sessions in the network, and executive entities of the key negotiation scheme. When executing the negotiation plan, the process of generating signature and verifying signature will be executed separately. After the identity is confirmed, it will enter the generation stage of the session key. After the session key is generated, the node will use the session key to encrypt the message. The service object of KGC is as follows: figure 1 shown.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure communication method for a wireless sensor network. The method comprises the following steps of: initializing a sensor node based on KGC; and by the initialized sensor node, negotiating a session key. According to the method, a certificateless key negotiation protocol is used, so that a series of complicated work such as certificate management and certificate confirmation can be avoided, the key trusteeship problem can also be avoided, and high safety is achieved.

Description

technical field [0001] The invention belongs to the technical field of node identity authentication and key negotiation in a wireless sensor network, and in particular relates to a method for secure communication of a wireless sensor network. Background technique [0002] Due to its low power consumption, easy deployment, and long standby time, wireless sensors make wireless sensor networks a powerful tool for people's smart life. Nowadays, wireless sensor networks have been widely used in smart cars, smart medical care, smart homes, smart transportation and smart grids. However, wireless sensor networks are also more vulnerable to attacks because of their low computation and deployment in unattended environments. Once the wireless sensor network is breached, it will have a serious impact on people's production and life. [0003] Public-key cryptography and symmetric cryptography have been widely used in securely-required networks to securely transmit transmitted informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/38H04W12/0431H04W12/122H04L9/32H04L9/30H04L9/08
CPCH04W4/38H04L9/0838H04L9/0861H04L9/3066H04L9/3247H04W12/0431H04W12/122Y02D30/70
Inventor 张凌浩唐超唐勇梁晖辉桂盛霖向思屿邓东
Owner STATE GRID SICHUAN ELECTRIC POWER CORP ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products