Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless sensor network key distribution and management protocol based on multiple hash chains

A wireless sensor and network key technology, which is applied in the field of wireless sensor network key distribution and management protocols based on multi-hash chains, can solve the problems of low ability to resist capture attacks, high update communication overhead, and reduce storage overhead.

Inactive Publication Date: 2011-07-20
SHANGHAI DIANJI UNIV
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies in the design of traditional wireless sensor network key management algorithms, and the node-wise key (pair-wise key) established by multiple hash chains can provide deterministic security for the network while significantly reducing storage overhead. Security: based on polynomial factorization, one broadcast to complete the secure distribution and update of cluster keys, solving the problems of low ability to resist capture attacks and high communication overhead of cluster key distribution and update based on the cluster security algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network key distribution and management protocol based on multiple hash chains
  • Wireless sensor network key distribution and management protocol based on multiple hash chains
  • Wireless sensor network key distribution and management protocol based on multiple hash chains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The calculation of the hash function is simple and the one-way key chain is very secure. In order to meet the requirements of sensor node resource constraints, in recent years, the one-way key chain generated by the hash function has become a main method for distributing node keys in wireless sensor networks. ways and means. However, the finiteness of hash chain elements will inevitably lead to the problem of key reuse in multiple links in the network. Therefore, once a node is compromised, the security of all links using the same key in the network will be greatly reduced. In order to eliminate the problem of using the same key in different links in the network, this paper conducts a In addition, the present invention establishes the source of the node key on multiple key chains, and then calculates the keys from the multiple key chains according to a predetermined algorithm to finally determine the node pair key. Theory proves that under this method, the probability ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless sensor network key distribution and management protocol based on multiple hash chains. The protocol can overcome design defects of a traditional wireless sensor network key management algorithm, and provides confirmed safety for a network through pair-wise keys established by multiple hash chains while obviously reducing storage overhead. Based on factorization of polynomials, safe distribution and updating of cluster keys can be completed through primary broadcasting, and the problems which comprise low capability of physical capture attack resistance and large overheads for cluster key distribution and communication updating, and are generated on the basis of a clustering safety algorithm, are solved.

Description

technical field [0001] The invention relates to a dual key establishment and distribution protocol in a wireless sensor network, which can be applied to the fields of ad hoc network, wireless sensor network, wireless communication and the like. Background technique [0002] Wireless sensor network (WSN) is dedicated to the monitoring and information collection of a specific environment. It has two characteristics: the communication medium is open and it is deployed in an unattended environment. The insecurity of WSN communication is doomed, and the special application environment of WSN network determines the importance of its secure communication. So far, there are many research theories and results on the security algorithm of WSN network, especially the key establishment and distribution algorithm. Key management, SPINS, etc. Some are based on polynomial technology, such as the establishment of dual keys in distributed sensor networks. But no matter which method, becau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W48/10H04W12/0431H04W12/0433
CPCH04W84/18H04W12/0433H04W12/0431H04W12/041
Inventor 熊鹏
Owner SHANGHAI DIANJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products