A Hash Tree-based Security Data Discovery and Propagation Method for Wireless Sensor Networks
A wireless sensor and network security technology, applied in network topology, wireless communication, public key for secure communication, etc., can solve problems such as ignoring data discovery and dissemination security, and achieve the effect of ensuring efficiency and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0037] like figure 1 As shown, SeDrip is divided into three stages: system initialization, packet preprocessing and data packet verification.
[0038] In the system initialization phase, the base station obtains the private key SK and the public parameters {PK, Q, p, q, H(.)} by performing the following operations, where PK is the public key, thereby establishing an elliptic curve cryptosystem: the base station first selects a One-way hash function H(.), such as SHA-1, and choose an elliptic curve E about GF(p), where p is a large prime number. Use Q to represent the origin of E, and use another large prime number q to represent the order of Q. Furthermore, select the private key SK∈GF(q), and use the formula PK=SK*Q to generate the public key. Finally, each public parameter is preloaded into each node of the network. For example: in the 160-bit elliptic curve encryption, PK and Q are both 320-bit long, and p and q are both 160-bit long.
[0039] In SeDrip, a quadruple (ro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com