Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based wireless sensor network security trust method

A wireless sensor and network security technology, applied in wireless communication, security devices, network topology, etc., can solve problems such as poor network operability, no multi-hop operation and solutions, trust information without considering message security and authentication, etc.

Inactive Publication Date: 2009-12-09
XIDIAN UNIV
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this security framework also has some defects: First, the transmission of trust information in nodes does not consider the security and authentication of messages, which leads to the fact that attackers can pretend to be some high-trust nodes to mislead other nodes, or tamper with trust information. As a result, even if there is a trust management mechanism, the problem of network security cannot be completely solved.
Secondly, the initialization process of trust is not carried out, which leads to poor operability of the network and is not suitable for actual network applications
Finally, the security framework itself has flaws and deficiencies in its functions. It does not consider the influence of the characteristics of the sensor nodes on trust and the problem of re-updating according to the communication situation, which makes the designed framework structure not perfect.
In addition, there is no multi-hop operation and solution, which is difficult to meet the needs of large-scale self-organizing network applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based wireless sensor network security trust method
  • Identity-based wireless sensor network security trust method
  • Identity-based wireless sensor network security trust method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] figure 2 The example topology structure of the identity-based wireless sensor network of the present invention is given, combined with figure 2 An implementation example of the topological structure, describing the working process of establishing a trust system;

[0068] 1. Build a network of trust

[0069] All nodes broadcast their IDs to surrounding neighbor nodes i , the node receiving the information knows the identity of its neighbor node, and uses its own private key and the identity of the neighbor node to calculate the shared key K ij Stored in the key management module, the node only saves the reputation of its neighbor nodes within one hop range;

[0070] In the first step, when node A tries to communicate with node B, it first broadcasts the information ID of the destination node B A ||ID B ;

[0071] In the second step, the next hop node of the neighbor nodes C, D, E of node A is the destination node B, then nodes C, D, E send query response informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based wireless sensor network security trust method. In the method, firstly each node in the network is loaded with a trust management structure; wherein the trust management structure is composed of a secret key management module, a receiving credit module, a storage credit module, a credit calculating module, an application selecting module, a route management module, a decision making module, a credit management module and a monitoring module. On the basis of the trust management structure, a trust communication network is established by broadcasting query node information among nodes, receiving query respond and updating node credit and by identity-based public key password encryption and authentication among nodes, so as to realize safe communication of credit information among nodes. The invention reduces complexity of credit calculation in the wireless sensor network, improves security of communication of the wireless sensor network trust system, solves communication problem of a source node and a destination node under multi-hop condition, and can meet the requirement of large-scale self-organized network application.

Description

technical field [0001] The invention relates to the field of wireless sensor network security communication, and trust security management in the wireless sensor network. Specifically, it is a security method for establishing a network trust system based on a public key cryptography system based on network node identities, and realizes secure communication on a trust network. Background technique [0002] In the wireless sensor network, to solve the security problems caused by the limited energy of the nodes, prone to failure and easy to be physically captured by the attacker, relying solely on cryptography is not enough to solve the problem, among many methods to solve communication security , by increasing the trust mechanism of nodes and building a trust network to solve the security of wireless sensor networks has attracted the attention of researchers in the industry. [0003] The document "A Security Framework with Trust Management for Sensor Networks, Security and Pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W12/02H04W40/02H04W84/18H04W12/03H04W12/06
CPCY02D30/70
Inventor 庞辽军刘思伯裴庆祺焦李成李慧贤李茹赵晓辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products