Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security access method of xmpp protocol based on sensor network

A sensor network and protocol security technology, applied in security devices, transmission systems, electrical components, etc., can solve problems such as limited use of TLS, difficulty in implementing encryption algorithms, and high communication overhead, and achieve authentication efficiency and energy consumption optimization , Realize the confidentiality and integrity of information, and protect the effect of link security

Active Publication Date: 2017-10-03
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, there are roughly two key negotiation methods: RSA public key encryption method and Diffie-Hellman key negotiation method. Due to the energy and storage space limitations of wireless sensor nodes, encryption algorithms such as RSA and ECC are difficult to implement in nodes. TLS The use of the SASL handshake mechanism is limited, and the security of the authentication methods used in the SASL handshake mechanism, such as PLAIN (RFC4616) and EXTERNAL (RFC2222), cannot be guaranteed
In addition, the TLS handshake mechanism requires up to a dozen message interactions, coupled with the SASL mechanism, the communication overhead is too large, and it is suitable for energy-constrained wireless sensor networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access method of xmpp protocol based on sensor network
  • Security access method of xmpp protocol based on sensor network
  • Security access method of xmpp protocol based on sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Hereinafter, the preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings; it should be understood that the various data and methods of this embodiment, the preferred embodiment is only a special example of the implementation method of the present invention, not for limitation The scope of protection of the present invention.

[0055] figure 1 This is a schematic diagram of the work control process provided by the embodiments of the present invention, as shown in the figure: The DIGEST-AES security mechanism, an XMPP security mechanism suitable for sensor networks provided by the present invention, includes: the initialization phase, where XMPP nodes and XMPP servers are encrypted Key negotiation, XMPP node access authentication and authorization services. First, in the initialization phase, the XMPP node registers with the server and submits registration information; when the node needs to access the network, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a sensor network based XMPP security access method which is applicable to an authentication mechanism-DIGEST-AES security mechanism of a wireless sensor network. The sensor network based XMPP security access method comprises the steps that an XMPP node and an XMPP server perform key negotiation and the XMPP node is accessed to authentication and authorization service at an initialization phase. According to the sensor network based XMPP security access method, a low-expenditure security algorithm is introduced while the original protocol structure and the communication mode of an XMPP are ensured, a message exchange process is simplified, the XMPP node and the XMPP server of the sensor network can safely and effectively establish XML stream, and security functions including equipment registration, key negotiation, authorization, authentication and the like based on the XMPP are achieved. Compared with a traditional XMPP security mechanism, the communication expenditure of the security mechanism is remarkably reduced.

Description

Technical field [0001] The invention relates to the field of wireless sensor networks, in particular to a method for secure access of sensor network nodes based on the XMPP protocol. Background technique [0002] XMPP (Extensible Messaging and Presence Protocol, formerly known as Jabber) is an open real-time communication protocol based on XML and an Internet standard adopted by the Internet Engineering Task Force (IETF). The XMPP protocol has the characteristics of openness and scalability, which makes its application in wireless sensor networks have a broader prospect. [0003] The XMPP protocol uses an open protocol, which makes it more helpful for wireless sensor networks to achieve the standardized information transmission goals of things to things and people to things; as an application layer protocol, the use of XMPP can also meet the needs of wireless sensor networks. Application diversification needs, but also more conducive to service expansion; In addition, XMPP uses a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/08H04L63/10H04W12/04H04W12/06
Inventor 王浩柳乐王平魏旻王少军
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products