Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for key management and node authentication of sensor network

一种传感器网络、密钥管理的技术,应用在传感器网络密钥管理和节点鉴别领域,能够解决传感器网络无法抵抗攻击、密钥网络节点鉴别服务等问题

Active Publication Date: 2010-04-28
CHINA IWNCOMM
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the network adopts the existing random key pre-distribution method, the generated key cannot provide end-to-end authentication services for network nodes. In this case, it can only verify the legitimacy of the other party, but cannot confirm the specific identity of the other party. , the sensor network cannot resist attacks against nodes such as capture, copy or forgery, resulting in a great security risk in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for key management and node authentication of sensor network
  • Method for key management and node authentication of sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The invention provides a sensor network key management and node authentication method, the method includes the following steps:

[0042] 1) Key pre-distribution. Before network deployment, the deployment server pre-distributes the communication key used to establish a secure connection between nodes to all nodes. The specific implementation method is:

[0043] 1.1) Before network deployment, the deployment server initializes the key pool to generate the key pool KP, which contains multiple keys and their key identifiers. The number of keys in the key pool is recorded as |KP|, |KP| is large enough, and it is assumed that the deployment server is safe;

[0044] 1.2) Assume that the preset network connectivity is P c , the number of nodes in the network is n, and each node has a corresponding identification ID. According to the classical random graph theory, calculate the degree d=(n-1)*(lnn-ln(-lnP c )) / n. In order to ensure good scalability, usually the preset number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for key management and node authentication of a sensor network. The method comprises the following steps: 1) key pre-distribution, wherein a deployment server is used for establishing communication keys for the secure connection between nodes and distributing the communication keys to all the nodes before network deployment; 2) key establishment, wherein key pairs for the secure connection are established between nodes after the network deployment; and the step of key establishment further comprises the following steps: 2.1) the establishment of shared keys, wherein key pairs are established between adjacent nodes having the shared keys; and 2.2) the establishment of path keys, wherein key pairs are established between nodes having no shared keys but multi-hop secure connection; and 3) the authentication of node identities, wherein the identity authentication is carried out before the formal communication between nodes, so as to confirm the validity and effectiveness of the identity of the other party. The invention is capable of effectively resisting the attack on network communication, such as eavesdropping, tampering and resetting, achieving the secure communication between nodes, effectively saving the node resources of the sensor network and prolonging the service life of the sensor network.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a sensor network key management and node identification method. Background technique [0002] The sensor network is composed of a large number of small, cheap, battery-powered sensor nodes with wireless communication and monitoring capabilities. These nodes are densely deployed in the monitoring area to achieve the purpose of monitoring the physical world. Wireless sensor network is a new research direction in information technology, and has broad application prospects in environmental monitoring, military affairs, homeland security, traffic control, community security, forest fire prevention, and target positioning. [0003] Since sensor networks are usually deployed in unattended or even enemy areas, the communication between nodes is vulnerable to eavesdropping, tampering or replay, and the nodes themselves are vulnerable to attacks such as capture, repli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W84/18H04W12/0431
CPCH04L67/12H04L63/1441H04W12/04H04W84/18H04L29/08558H04L63/062H04L63/08H04L63/061H04W12/06H04W12/041H04W12/069H04L9/32H04L9/08
Inventor 杜志强曹军黄振海铁满霞
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products