Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-way link security authentication method for wireless relay network

A wireless relay network and two-way security authentication technology, which is applied in the field of network communication, can solve the problems of not being able to fully utilize the security of relay devices and consume a lot of time, and achieve the effect of solving asynchronization problems and increasing security

Inactive Publication Date: 2012-10-10
SHANGHAI JIAO TONG UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When considering the security of the devices at both ends, the traditional solution only regards the relay device as a pure information forwarding device, which cannot make full use of the resources of the relay device to improve the overall security of the system.
[0005] In addition, in the traditional relay network, when the terminal node and the platform authenticate each other, the relay device rarely participates in the authentication process, but some methods regard the relay device as a node-by-hop authentication that is as important as the identity security of the terminal node , this process takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way link security authentication method for wireless relay network
  • Two-way link security authentication method for wireless relay network
  • Two-way link security authentication method for wireless relay network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The concept, specific structure and technical effects of the present invention will be further described below in conjunction with the accompanying drawings, so as to fully understand the purpose, characteristics and effects of the present invention.

[0026] The bidirectional security authentication method of the link in the wireless relay network of the present invention adds the relay device to the security authentication process of the link, shares the computing burden of some terminal nodes, and at the same time only verifies the validity of the final information on the terminal nodes. Verification is performed to determine the legitimacy of the entire link.

[0027] Each node on the entire link has its own private information SKey, Mark, Seed and (a n , a (n-1) ,...a 2 , a 1 ), where SKey is the key; Mark is reserved extended private information, which can be user authentication password, dynamic password, etc.; Seed is the seed; (a n , a (n-1) ,...a 2 , a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-way link security authentication method for a wireless relay network. The wireless relay network comprises a terminal node, M relay equipment and a processing platform. The method is a solution to the problems of low operational capability and low security of the terminal node in a link with the relay equipment in a wireless sensor network. By the participation of the relay equipment, a part of computational load of two authentication parties is transferred to the relay equipment, so that the complexity of an authentication process is improved, and difficulty in the cracking of an attacker is greatly improved along with the addition of the relay equipment. Moreover, the relay equipment participates in the update of an authentication information flow by using own private information, so that the processing platform and the terminal node also can indirectly authenticate the legality of the identity of the relay equipment.

Description

technical field [0001] The invention relates to network communication, in particular to a link bidirectional security authentication method in a wireless relay network, which can realize bidirectional identity authentication and key update of a processing platform and a terminal node in a multi-hop link, and is suitable for relay equipment In the wireless sensor network environment with limited computing power of terminal nodes, the security of mutual authentication can be improved. Background technique [0002] In the IoT environment, the information collection devices used in terminals are mostly micro-sensors with limited processing capabilities, such as RFID tags that have been put into use in the field of intelligent transportation, remote monitoring, and biological monitoring of patients' vital signs information in the medical field. sensors, etc. The computing processing power of these devices is usually relatively limited, but their security is very important. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04H04W12/06H04W12/069
Inventor 王景成胡霆赵广磊隆笑
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products