Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-way link security authentication method in wireless relay network

A technology of wireless relay network and two-way security authentication, which is applied in the field of network communication, can solve the problems of time-consuming and inability to make full use of the security of relay equipment, and achieve the effect of increasing security and solving asynchronization problems

Inactive Publication Date: 2015-08-12
SHANGHAI JIAOTONG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When considering the security of the devices at both ends, the traditional solution only regards the relay device as a pure information forwarding device, which cannot make full use of the resources of the relay device to improve the overall security of the system.
[0005] In addition, in the traditional relay network, when the terminal node and the platform authenticate each other, the relay device rarely participates in the authentication process, but some methods regard the relay device as a node-by-hop authentication that is as important as the identity security of the terminal node , this process takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way link security authentication method in wireless relay network
  • Two-way link security authentication method in wireless relay network
  • Two-way link security authentication method in wireless relay network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The idea, specific structure and technical effects of the present invention will be further described below in conjunction with the accompanying drawings, so as to fully understand the purpose, features and effects of the present invention.

[0026] In the link two-way security authentication method in the wireless relay network of the present invention, the relay device is added to the security authentication process of the link to share the calculation burden of part of the terminal nodes, and at the same time, the validity of the final verification information is only verified on the terminal nodes Verify to determine the legitimacy of the entire link.

[0027] Each node on the entire link has its own private information SKey, Mark, Seed and (a n , a (n-1) ,...a 2 , a 1 ), wherein, SKey is the key; Mark is reserved extended private information, which can be user authentication password, dynamic password, etc.; Seed is the seed; (a n , a (n-1) ,...a 2 , a 1 ) i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-way link security authentication method for a wireless relay network. The wireless relay network comprises a terminal node, M relay equipment and a processing platform. The method is a solution to the problems of low operational capability and low security of the terminal node in a link with the relay equipment in a wireless sensor network. By the participation of the relay equipment, a part of computational load of two authentication parties is transferred to the relay equipment, so that the complexity of an authentication process is improved, and difficulty in the cracking of an attacker is greatly improved along with the addition of the relay equipment. Moreover, the relay equipment participates in the update of an authentication information flow by using own private information, so that the processing platform and the terminal node also can indirectly authenticate the legality of the identity of the relay equipment.

Description

technical field [0001] The present invention relates to network communication, in particular to a method for link bidirectional security authentication in a wireless relay network, which can realize bidirectional identity authentication and key update of a processing platform and a terminal node in a multi-hop link, and is suitable for relay equipment The wireless sensor network environment with limited computing power of terminal nodes can improve the security of two-way authentication. Background technique [0002] Most of the information collection devices applied to terminals in the Internet of Things environment are micro-sensors with relatively limited processing capabilities, such as RFID tags that have been put into use in the field of intelligent transportation, remote monitoring, and biological sensors used to collect and monitor patients’ vital sign information in the medical field. sensors etc. The computing and processing capabilities of these devices are usual...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/04H04W12/06H04W12/069
Inventor 王景成胡霆丁承刚赵广磊隆笑
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products