Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authentication of elements of a group

A component and verification request technology, which is applied in the field of component verification to achieve the effect of reducing time and storage space

Inactive Publication Date: 2006-04-12
NEC CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although in many respects the asymmetric scheme is problematic with respect to the enormous computational intensity, it often exceeds the capabilities usually available e.g. in adhoc networks or sensor networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authentication of elements of a group
  • Method for authentication of elements of a group
  • Method for authentication of elements of a group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] refer to figure 1 , shows the initialization phase before the actual verification process. The group shown includes a leading element D and a total of m components N i (here, i=1,...,m), where, for clarity, only three elements N are shown 1 , N 2 and N m . It should be appreciated that initialization occurs in a protected environment where potential attacks can be excluded. In the case of wireless sensor networks, the initialization phase can be performed in the ensemble, or in parts thereof, before configuring the individual sensor nodes.

[0025] During the initialization phase, the component N i First of all, they are all unified to the shared hash function h(). In addition, each component N i (where i=1,...,m) defines a key x known only to the component itself i . For example, key x i Can be component N i generated random number. According to the key x i , each component N i Perform the hash function iteratively, that is, for the first pair of keys xi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authentication of elements of a group, especially for authentication of sensor nodes in a preferably wireless sensor network is disclosed. The group has one specific element—leading element—with which each of the group elements can exchange information and wherein the authentication of the group elements takes place with regard to the leading element. The leading element sends an authentication request to the group elements wherein the authentication request is the same for all the group elements. The group elements each send authentication responses—based on the authentication request—to the leading element, with the authentication responses being different for each group element.

Description

technical field [0001] The present invention relates to a method of authenticating components, more particularly to a method of authenticating preferably sensor nodes in a wireless sensor network, wherein said group has a specific element in it - a bootstrap element, with which the group Each element in can exchange information and verify components against the bootstrap element. Background technique [0002] In fact, different verification methods have been disclosed for a long time. In these cases, authentication is used to provide identity and to prevent unauthorized entities from being able to generate information that should only be generated by defined groups. In order to prove its authorization, a party must prove certain characteristics to a second party during the verification process. Once the required proof is given, ie, the verification process is successful, a party identified as authorized may be allowed access to information that is not publicly accessible. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/06H04W84/18
CPCH04L9/3271H04L2209/805H04L63/08H04W84/18H04L2209/38H04L9/3236H04W12/06H04L63/065H04W12/50H04L9/50
Inventor 韦斯特霍夫·德克吉朗·若昂
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products