Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security key setting method for partitioned wireless sensor network

A wireless sensor and security key technology, applied in the field of wireless sensor network settings, can solve problems such as low computing power, limited energy, and poor balance between security and resource overhead

Inactive Publication Date: 2014-10-08
FOSHAN DIXINGWEI AUTOMATION EQUIP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited storage space, low computing power, limited transmission range, and limited energy of sensor nodes, complex security algorithms cannot be implemented. How to design a reasonable security algorithm to protect nodes under limited energy requirements and transmission range The security of inter-personal information is a hot research topic at present.
[0003] How to achieve the balance among the connectivity, security and energy consumption of the network is the focus and difficulty of the current wireless sensor network key management research. Through the comprehensive analysis and comparison of the existing wireless sensor network key management, the currently reported The key pre-distribution management method mainly has the following problems: (1) The connectivity performance of the network can be improved through deployment, but the security performance is not high; (2) By introducing a similar single-key space key pre-distribution scheme, it can Ensure that any two nodes in the network can directly establish a pairing key, and no confidential information will be leaked when the damaged node does not exceed the threshold, but the resource overhead is huge; (3) Documents [1]~[3] have been extended And in-depth research, but still can't balance the relationship between security and resource overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security key setting method for partitioned wireless sensor network
  • Security key setting method for partitioned wireless sensor network
  • Security key setting method for partitioned wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Now in conjunction with accompanying drawing and embodiment the present invention is described in further detail:

[0029] Step 1: Divide the wireless sensor network deployment area into p×p square grids of the same size, each grid is called the deployment area (i, j), i=1,2,3,...p, j=1, 2,3,...p, p≥2; for example figure 1 The 3×3 square grid shown,

[0030] Step two:

[0031] 1. Generate the key matrix space: by indivual( , ) matrix pair element matrix space ( is a lower triangular matrix, is an upper triangular matrix, , The product of is a symmetric matrix, which is called the key matrix space. Each matrix pair element corresponds to a unique ID value. The generation process is as follows:

[0032] ① First generate a large key pool,

[0033] ②Randomly select m(m+1) / 2 keys from the key pool to form an m-order symmetric matrix K h ,application Matrix factorization method takes the matrix K h decomposed into an m × m lower triangular matrix L h and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The security key setting method of the partitioned wireless sensor network is characterized in that step 1: dividing the wireless sensor network deployment area into p×p square grids of the same size, and step 2: generating a key matrix space: consisting of (,) The matrix space composed of matrix pair elements (the lower triangular matrix, the upper triangular matrix, and the product of which is a symmetric matrix is ​​called the key matrix space, and each matrix pair element corresponds to a unique ID value. Step 3: information pre-distribution method And the establishment method of key.Compared with the prior art, the present invention has the relation between further balancing wireless sensor network energy consumption and security, guarantees the connectivity rate of network, effectively improves the communication efficiency and computational efficiency of node, simultaneously The advantages of enhancing the node's ability to resist capture attacks.

Description

technical field [0001] The invention relates to a setting method of a wireless sensor network. Background technique [0002] With the continuous development and integration of electronic technology, computer technology and wireless communication technology, wireless sensor network technology is more and more widely used in various fields such as production, life, military, etc. information. Compared with traditional sensor nodes, wireless sensor network nodes are characterized by small size, low price and intelligence, so they are usually arranged in large numbers in open areas. However, due to the limited storage space, low computing power, limited transmission range, and limited energy of sensor nodes, complex security algorithms cannot be implemented. How to design a reasonable security algorithm to protect nodes under limited energy requirements and transmission range Information security is a hot research topic at present. [0003] How to achieve the balance among th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W76/02H04W84/18H04W12/041
CPCY02B60/50Y02D30/70
Inventor 张彩霞
Owner FOSHAN DIXINGWEI AUTOMATION EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products