Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Hash Tree-based Security Data Discovery and Propagation Method for Wireless Sensor Networks

A wireless sensor and network security technology, applied in network topology, wireless communication, public key for secure communication, etc., can solve problems such as ignoring data discovery and dissemination security, and achieve the effect of ensuring efficiency and security

Active Publication Date: 2016-07-06
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These existing wireless sensor network discovery and dissemination methods can ensure the reliability of data transmission, but they ignore the security of the data discovery and dissemination process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hash Tree-based Security Data Discovery and Propagation Method for Wireless Sensor Networks
  • A Hash Tree-based Security Data Discovery and Propagation Method for Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] like figure 1 As shown, SeDrip is divided into three stages: system initialization, packet preprocessing and data packet verification.

[0038] In the system initialization phase, the base station obtains the private key SK and the public parameters {PK, Q, p, q, H(.)} by performing the following operations, where PK is the public key, thereby establishing an elliptic curve cryptosystem: the base station first selects a One-way hash function H(.), such as SHA-1, and choose an elliptic curve E about GF(p), where p is a large prime number. Use Q to represent the origin of E, and use another large prime number q to represent the order of Q. Furthermore, select the private key SK∈GF(q), and use the formula PK=SK*Q to generate the public key. Finally, each public parameter is preloaded into each node of the network. For example: in the 160-bit elliptic curve encryption, PK and Q are both 320-bit long, and p and q are both 160-bit long.

[0039] In SeDrip, a quadruple (ro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless sensor network security data discovery and dissemination method based on a Hash tree. The method comprises the following steps that: (1) in the initialization phase of a system, a base station constructs an elliptic curve cryptosystem and generates a public key, a private key as well as public parameters; (2) the base station constructs data packets aiming at small data needing distribution, carries out digital signature on the data packets, and then sends the data packets to all sensor nodes of a network; and (3) after the data packets are received by all the sensor nodes, the sensor nodes judge whether the received data packets are legal data packets or not, receive the data packets and update if the received data packets are legal, and directly give up the data packets if the received data packets are illegal. According to the method, the condition that sensor node resources are limited is taken into account, and the security is guaranteed on the basis that the efficiency of a data discovery and dissemination process is guaranteed. The method has the advantages that the node compromise is resisted, the robustness for packet loss and packet transmission disorder is high, no time synchronization between the base station and the sensor nodes exists, and the like.

Description

technical field [0001] The invention relates to a wireless communication technology, in particular to a hash tree-based wireless sensor network security data discovery and dissemination method. Background technique [0002] Wireless sensor networks have been widely used in many fields involving monitoring and controlling the physical environment, including industrial monitoring and military operations. After the wireless sensor network is deployed, in order to adjust the configuration parameters of sensor nodes or distribute management commands and request information to sensor nodes, it is often necessary to transmit data through wireless links. [0003] In the existing wireless sensor network discovery and dissemination method, the sensor node will periodically broadcast the data summary stored by itself, and adjust the broadcast cycle by comparing the received data summary with its own data summary. When the data summary received by the node is older than the data summar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06H04L29/08H04W84/18
Inventor 何道敬唐韶华陈仕乾
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products