Lightweight wireless sensor network security small data distribution method

A wireless sensor and network security technology, applied in security devices, network topology, wireless communication, etc., can solve problems such as high computing and storage overhead, incompatibility, and achieve low storage overhead and resist malicious attacks.

Active Publication Date: 2017-04-19
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, digital signature verification techniques result in high computational and storage overhead, thus, this method is not suitable for resource-constrained sensor nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight wireless sensor network security small data distribution method
  • Lightweight wireless sensor network security small data distribution method
  • Lightweight wireless sensor network security small data distribution method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0048] like figure 1 As shown, this protocol is divided into three stages: system initialization, pre-processing of data packets, and data packet verification, as follows:

[0049] The first stage: the system initialization stage, the base station generates a one-way key chain, and adds the key chain commitment value to the sensor node before the deployment of each sensor node;

[0050] The second stage: the pre-processing stage of the data packet, the base station uses the hash function to construct a legal data packet of a specific data item;

[0051] The third stage: the data packet verification stage, the sensor node verifies the received data packet, if the received data packet is a legal data packet, then accept the data packet and update the sensor node, otherwise directly discard the data packet .

[0052] During the system initialization phase, such as figure 2 As shown, the base station picks a random number K b , and then generate a one-way key chain, by K 0 ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a light-weight wireless sensor network security small data distribution method, which includes the following stages: the first stage: the system initialization stage, the base station generates a one-way key chain, and before each sensor node deploys the key chain The commitment value is added to each sensor node; the second stage: the pre-processing stage of the data packet, the base station uses the hash function to construct a legal data packet for a specific data item; the third stage: the data packet verification stage, the sensor node The data packet is verified, if the received data packet is legal, the data packet is accepted and the sensor node is updated, otherwise the data packet is discarded directly. The present invention considers the limited resources of commonly used sensor nodes, has the advantages of being able to resist sensor node compromise, having high robustness in terms of packet loss and out-of-sequence data packet transmission, and no need for time synchronization between base stations and sensor nodes. It has excellent features such as high efficiency and energy saving, low storage overhead, and resistance to malicious attacks.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a lightweight wireless sensor network security small data distribution method. Background technique [0002] At present, the distribution of wireless sensor networks is very wide, and the applications are also diverse, including environmental monitoring, battlefield surveillance and data acquisition in harsh geographical environments. In wireless sensor networks, being able to distribute small amounts of data across the network is a useful operational feature. It allows the base station to write some small programs, commands, queries and configuration parameters to the sensor nodes. It should be emphasized that the small data distribution protocol is different from the code distribution (sometimes also called data distribution or reprogramming) protocol that has been studied intensively. Code distribution is the distribution of new binaries across the network, en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/08H04W84/18H04W12/00H04W12/041
CPCY02D30/70
Inventor 何道敬黄子超林涛
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products