A broadcast authentication method for wireless sensor networks based on ecdsa algorithm

A wireless sensor and sensor network technology, which is applied in the field of communication technology and information security, can solve the problem of large amount of calculation, etc., and achieve the effect of less memory usage, good real-time performance, and reduced memory usage

Inactive Publication Date: 2016-04-06
HENAN UNIV OF SCI & TECH
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem of large amount of calculation in the existing wireless sensor network broadcast authentication method and propose a wireless sensor network broadcast authentication method based on ECDSA algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A broadcast authentication method for wireless sensor networks based on ecdsa algorithm
  • A broadcast authentication method for wireless sensor networks based on ecdsa algorithm
  • A broadcast authentication method for wireless sensor networks based on ecdsa algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The concrete steps of a kind of wireless sensor network broadcast authentication method based on ECDSA algorithm of the present invention are as follows:

[0045] 1. Divide the lifetime T of the sensor network into t time periods T i (1≤i≤t), each time period T i For several minutes or several hours, for security authentication within several hours or several minutes, here we choose the key length of ECDSA as 80 bits.

[0046] 2. Generate a parameter set for the ECDSA algorithm. The generation algorithm of the parameter set is as follows:

[0047] 1). Input: the order of the domain is q, F q The domain of represents FR, and the security level L meets the requirements;

[0048] 2). Output: parameter group 2;

[0049] 3). If F q Is prime field, binary field or OEF, randomly select a, b∈F q , let S be the generated seed, if F q is prime field or OEF then let E be y 2 =x 3 +ax+b; if F q is a binary field, then y 2 +xy=x 3 +ax 2 +b

[0050] 4). Calculate N=#E(F...

Embodiment 2

[0101] In the ECDSA-BA algorithm, in order to achieve a higher security level, let T i = 10 minutes, t = 1000, then after reaching p e =1.36e-21 Under the condition of false alarm rate, the system can work for one week, occupying 12.2kbyte of memory, and the working time is relatively short. When the lifetime t of the sensor network increases, in order to achieve the same error rate, the amount of memory occupied increase, when t=5000, it takes up 61kbyte of memory, which is not suitable for sensor network systems with limited resources, so we improved the ECDSA-BA algorithm and proposed the PECDSA-BA algorithm, using this algorithm The specific steps of the wireless sensor network broadcast authentication method are as follows:

[0102] 1. Divide the lifetime T of the sensor network into t time periods T i (1≤i≤t), each time period T i for several days; then T i Divided into smaller time slice

[0103] 2. Every time period corresponding to generate a key pair The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a wireless sensor network broadcast authentication method based on an ECDSA algorithm, belonging to the fields of communication technology and information security. The present invention utilizes ECDSA algorithm and Bloom? filter, by dividing the survival time of the wireless sensor network into several small time periods, a key pair is generated for each time period according to the ECDSA signature algorithm, and the public key set is mapped to a bit string by hash operation, and the bit string The string is loaded into the network node, and then public key authentication, message signature and message authentication are performed. This method has good real-time performance, low calculation cost, and can tolerate data packet loss. Compared with the ShortPK algorithm, it occupies less memory. Lifetime PECDSA-BA, this method has the advantages of real-time performance, computing performance, security performance, tolerance to data packet loss and so on.

Description

technical field [0001] The invention relates to a wireless sensor network broadcast authentication method based on an ECDSA algorithm, belonging to the fields of communication technology and information security. Background technique [0002] The existing wireless sensor network broadcast authentication methods are divided into authentication code-based broadcast authentication methods and digital signature-based authentication methods. Perrig et al. proposed a sensor network broadcast authentication algorithm μTESLA based on authentication codes in the SPIN security model. μTESLA uses the Hash chain to implement broadcast authentication by using a symmetric key through a delayed release key mechanism during broadcasting. This algorithm has low energy consumption. , the implementation is simple, but it needs the support of loose time synchronization protocol between nodes. At the same time, due to the introduction of authentication delay, it is vulnerable to selective forwar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W12/04H04W84/18H04W12/041H04W12/06
Inventor 张聚伟陈媛张海涛普杰信吴庆涛李世伟李强懿
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products