Bridge-type-based wireless sensing network key management scheme
A key management and scheme technology, applied in the field of network communication security, can solve the problems of lack of flexibility, high calculation and communication overhead, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0136] The preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings.
[0137] In this embodiment, the system is composed of multiple clusters and a base station, and each cluster is independent and autonomous, such as Figure 8 shown. Each cluster is composed of a cluster head node and multiple sensor nodes. The cluster head node is responsible for receiving the information transmitted from the sensor nodes and forwarding the information to the base station. The sensor nodes are responsible for collecting and collecting information, and transmitting the information to the cluster head nodes. The base station is responsible for receiving the information transmitted from the cluster head node and forwarding it to the client.
[0138] In the wireless sensor network, each cluster is mutually independent and has the same mode, so the present invention uses the key management of a cluster as an example to exp...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com