Elliptic curve digital signature algorithm (ECDSA)-algorithm-based wireless sensor network broadcast authentication method

A wireless sensor and sensor network technology, which is applied in the field of communication technology and information security, can solve the problem of large amount of calculation, and achieve the effects of less memory usage, good real-time performance, and tolerance to data packet loss

Inactive Publication Date: 2012-09-19
HENAN UNIV OF SCI & TECH
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem of large amount of calculation in the existing wireless sensor network broadcast authentication method and propose a wireless sensor network broadcast authentication method based on ECDSA algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve digital signature algorithm (ECDSA)-algorithm-based wireless sensor network broadcast authentication method
  • Elliptic curve digital signature algorithm (ECDSA)-algorithm-based wireless sensor network broadcast authentication method
  • Elliptic curve digital signature algorithm (ECDSA)-algorithm-based wireless sensor network broadcast authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The concrete steps of a kind of wireless sensor network broadcast authentication method based on ECDSA algorithm of the present invention are as follows:

[0045] 1. Divide the lifetime T of the sensor network into t time periods T i (1≤i≤t), each time period T i For several minutes or several hours, for security authentication within several hours or several minutes, here we choose the key length of ECDSA as 80 bits.

[0046] 2. Generate a parameter set for the ECDSA algorithm. The generation algorithm of the parameter set is as follows:

[0047] 1). Input: the order of the domain is q, F q The domain of represents FR, and the security level L meets the requirements;

[0048] 2). Output: parameter group 2;

[0049] 3). If F q Is prime field, binary field or OEF, randomly select a, b∈F q , let S be the generated seed, if F q is prime field or OEF then let E be y 2 =x 3 +ax+b; if F q is a binary field, then y 2 +xy=x 3 +ax 2 +b

[0050] 4). Calculate N=#E(F...

Embodiment 2

[0101] In the ECDSA-BA algorithm, in order to achieve a higher security level, let T i = 10 minutes, t = 1000, then after reaching p e =1.36e-21 Under the condition of false alarm rate, the system can work for one week, occupying 12.2kbyte of memory, and the working time is relatively short. When the lifetime t of the sensor network increases, in order to achieve the same error rate, the amount of memory occupied increase, when t=5000, it takes up 61kbyte of memory, which is not suitable for sensor network systems with limited resources, so we improved the ECDSA-BA algorithm and proposed the PECDSA-BA algorithm, using this algorithm The specific steps of the wireless sensor network broadcast authentication method are as follows:

[0102] 1. Divide the lifetime T of the sensor network into t time periods T i (1≤i≤t), each time period T i for several days; then T i Divided into smaller time slice

[0103] 2. Every time period corresponding to generate a key pair The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an elliptic curve digital signature algorithm (ECDSA)-algorithm-based wireless sensor network broadcast authentication method, and belongs to a communication technology and the field of information security. The method comprises the following steps of: dividing the life time of a wireless sensor network into a plurality of small time buckets by utilizing an ECDSA and a Bloomfilter, generating a key pair for each time bucket according to the ECDSA, mapping a public key set into a bit string by utilizing Hash operation, placing the bit string into a network node, and performing public key authentication, message signature and message authentication. The method is high in real-time performance, low in computing cost and tolerant to data packet loss; compared with a ShortPK algorithm, the method has the advantage of occupying a small memory; in order to reduce the memory occupation of an ECDSA-BA scheme when the life time is long, s PECDSA-BA applied to the long life time is disclosed; and the method are advanced in terms of real-time performance, computing performance, safety performance, tolerance to the data packet loss and the like.

Description

technical field [0001] The invention relates to a wireless sensor network broadcast authentication method based on an ECDSA algorithm, belonging to the fields of communication technology and information security. Background technique [0002] The existing wireless sensor network broadcast authentication methods are divided into authentication code-based broadcast authentication methods and digital signature-based authentication methods. Perrig et al. proposed a sensor network broadcast authentication algorithm μTESLA based on authentication codes in the SPIN security model. μTESLA uses the Hash chain to implement broadcast authentication by using a symmetric key through a delayed release key mechanism during broadcasting. This algorithm has low energy consumption. , which is simple to implement, but requires the support of a loose time synchronization protocol between nodes. At the same time, due to the introduction of authentication delay, it is vulnerable to selective forw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04W12/04H04W84/18H04W12/041H04W12/06
Inventor 张聚伟陈媛张海涛普杰信吴庆涛李世伟李强懿
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products