Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for predistributing and establishing key of sensor network

A sensor network and establishment method technology, applied in key distribution, can solve the problems of sensor nodes being vulnerable to capture attacks, not supporting new nodes to join, and node A cannot be determined, so as to enhance the ability to resist capture attacks, resist node replication attacks, Realize the effect of node cancellation

Inactive Publication Date: 2011-06-01
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Since sensor nodes are vulnerable to capture attacks, once captured, the secret information loaded in the nodes will be leaked, so the key management method that all nodes share a master key can no longer meet the security requirements of sensor networks
The key management method in which each pair of nodes shares a key can provide identity authentication services while providing confidential communication between nodes, but this method does not support the addition of new nodes, so it does not have scalability, and for a network with n nodes For large-scale networks, this method requires each node to store n-1 keys, which consumes a large amount of node storage space and is difficult to apply to large-scale sensor networks.
At present, the key management method of random key pre-distribution is widely used in sensor networks. This method only produces small overhead and is more practical, but the distributed key does not support point-to-point identity authentication between nodes. Because the key in the key pool of this method may be distributed to different nodes multiple times, even if the key is shared between two nodes, the point-to-point identity authentication based on the pre-shared key cannot be realized.
For example, assuming that node A and node B share the key K, since the same key in the key pool in the random key pre-distribution method may be taken out and distributed to different nodes multiple times, then node C may also be distributed Key K, at this time, node A cannot determine the identity of the other node based on key K
The consequence of this is that during communication, node A cannot determine whether to communicate with node B or node C, and there is a great security risk in communicating with the other party without confirming the identity of the other party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Based on the classical random graph theory, the present invention combines two sensor network key management methods of sharing a key for each pair of nodes and random key pre-distribution, and adopts the method of binding the key with the node identifier to propose a method that can Key predistribution and key establishment methods for large-scale sensor networks. According to a preferred embodiment of the present invention, the method comprises the following steps:

[0051] 1) Key pre-distribution

[0052] Before network deployment, the deployment server pre-distributes the communication keys used to establish secure connections between nodes to all nodes. The specific implementation method is:

[0053] 1.1) Before network deployment, the deployment server generates a key pool KP, which includes several keys and key identifiers. The number of keys in the key pool is recorded as |KP|, |KP| is large enough, and it is assumed that the deployment server is safe;

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for predistributing and establishing a key of a sensor network, which comprises the following steps: (1.1) generating a key pool KP by a deployment server before network deployment, wherein the key pool KP comprises a plurality of keys and key marks thereof, the number of the keys in the key pool is marked as |KP|, the |KP| is large enough, and the deployment server is assumed to be safe; (1.2) assuming that the preset network communication degree is Pc, the node number in a network is n and all nodes are provided with corresponding mark IDs and calculating the node degree d=(n-1)*(1nn-1n(-1nPc)) / n according to a classic random graph theory; (1.3) calculating the probability p=d / n' of pairs of pre-shared keys between adjacent nodes according to the node degree d and the neighbor node number n' of the nodes after the expected network deployment; (1.4) predistributing keys to the nodes by the deployment server; (2.1) establishing the keys; and (2.2) establishing a group key. The invention provides a method for predistributing and establishing the key, which supports identity authentication, has relatively lower cost and good damage resistance and expansibility and can be adapted to a large-scale sensor network.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a sensor network key predistribution and key establishment method, which can be applied to large-scale sensor networks. Background technique [0002] The sensor network is composed of a large number of small, cheap, battery-powered sensor nodes with wireless communication and monitoring capabilities. These nodes are densely deployed in the monitoring area to achieve the purpose of monitoring the physical world. Wireless sensor network is a new field in information technology, and has broad application prospects in environmental monitoring, military affairs, homeland security, traffic control, community security, forest fire prevention, and target positioning. [0003] The key management mechanism is the basis of sensor network security and should have the following characteristics: [0004] 1) Scalability. As the scale of sensor network nodes expands, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W84/18H04L9/08H04W12/041H04W12/0431
CPCH04L9/08H04L2209/805H04L9/0838H04L9/0833
Inventor 杜志强曹军铁满霞黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products