Entity identification method and system of energy-constrained network

A resource-constrained, entity-based technology, applied in transmission systems, digital transmission systems, security devices, etc., can solve the problems of increasing the burden on network entities and the inability to execute authentication protocols, etc., to achieve computational cost savings, low overhead, and high operational efficiency Effect

Inactive Publication Date: 2010-12-22
CHINA IWNCOMM
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current authentication methods are generally based on cryptographic calculations, requiring entities in the network to preset corresponding cryptographic algorithms, otherwise the authentication protocol cannot be executed; moreover, even if the entities preset cryptographic algorithms, such authentication protocols will also give Entities in the network cause computational overhead, such as authentication methods based on symmetric and asymmetric cryptographic algorithms, which require entities to perform encryption and decryption operations, thus increasing the resource burden on network entities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entity identification method and system of energy-constrained network
  • Entity identification method and system of energy-constrained network
  • Entity identification method and system of energy-constrained network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] See figure 1 , the present invention provides a resource-constrained network entity identification method, the method comprising the following steps:

[0034] Step S0: A pre-shared key (Pre-Shared key, PSK) has been shared between entity A and entity B;

[0035] Step S1: Please refer to image 3 , entity A sends an authentication request message 10 to entity B. The authentication request message 10 includes SN1. SN1 is obtained by the following method: Entity A generates a random number N1, calculates Among them, the symbol Indicates a bit-by-bit XOR operation, the same below.

[0036] Step S2: Please refer to Figure 4 , after entity B receives the authentication request message 10 sent by entity A, it first calculates Invert N1 bit by bit to get RN1, and calculate Then, entity B generates a random number N2 and calculates Entity B constructs an authentication response message 20 and sends it to entity A. The authentication response message 20 includes SR...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an entity identification method and system of an energy-constrained network. The method comprises the following steps: 1) an entity A sends an identification request message to an entity B; 2) after receiving the identification request message from the entity A, the entity B sends an identification response message to the entity A; and 3) the entity A judges the legality of the entity B according to the identification response message received in the step 2), thus the entity A completes the identification of the entity B; if the entity B is judged to be legal, an identification request confirming message is sent to the entity B, the session key of the entity B is calculated; and if the entity B is judged to be illegal, the identification response message is discarded. The system of the invention is suitable for the energy-constrained network and has the advantages of low cost, high computational efficiency, safe and reliable operation and the like.

Description

technical field [0001] The invention belongs to the application field of network security in information security technology, and in particular relates to an entity authentication method and system of a resource-limited network. Background technique [0002] Resource-constrained wireless networks, including sensor networks, magnetic domain networks, and RFID networks, have broad application prospects in military, environmental monitoring, forest fire prevention, health care, logistics, and other fields, and are playing an increasingly important role in these fields. effect. Due to the wireless and broadcast characteristics of this type of network during communication, it is vulnerable to attacks such as eavesdropping, tampering, forgery, and entity capture and duplication. It is necessary to introduce low-overhead authentication and message confidentiality mechanisms to ensure Entity legality and confidentiality and integrity of communication messages. The current authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/10H04W12/041H04W12/06
CPCH04L63/0884H04L63/08H04L9/3273H04L2209/805G06F21/30
Inventor 杜志强铁满霞胡亚楠黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products