Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Group key management method applicable to heterogeneous sensor network

A technology of heterogeneous sensors and management methods, which is applied in the application field of wireless sensor network technology and network information security cross technology, can solve the problem of not realizing the mutual identification of network access nodes and group leaders, and not having group member node key update command legality authentication, Problems such as high cost of group key update

Active Publication Date: 2015-05-13
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Wireless sensor networks (WSN, wireless sensor networks) have attracted more and more attention due to their broad application prospects, but due to their limited resources, unsafe working environment and low-cost requirements, security issues have always been is a hotspot of academic research
In WSN, in addition to point-to-point unicast communication, multicast communication is also required, but multicast communication has the characteristics of open channels, and compared with unicast communication, it is more likely to be attacked by malicious nodes, so the problem of secure multicast has become One of the key issues restricting the development of WSN
[0003] Although the current research on group key management in sensor networks has achieved secure multicast communication to a certain extent, they may not have fully considered the dynamic changes of wireless sensor networks (for example, due to the limited resources of sensor nodes, the energy consumption of nodes Exhaustion makes it necessary to exit the network, and the exit of old nodes must have new nodes to maintain the operation of the network. Such a process will inevitably lead to dynamic changes in the network), which makes the cost of group key update in the whole scheme too high, even without Group key update mechanism; although some group key management schemes have a group key update mechanism, they do not implement mutual authentication between network access nodes and group leaders, nor do group member nodes issue key updates to group leaders command for legality authentication, so the group key management mechanism has certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group key management method applicable to heterogeneous sensor network
  • Group key management method applicable to heterogeneous sensor network
  • Group key management method applicable to heterogeneous sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] A non-limiting embodiment is given below in conjunction with the accompanying drawings to further illustrate the present invention. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0038] this invention figure 1 It is a flowchart of the present invention. In order to describe the design idea of ​​the present invention more clearly and understandably, the figure 1 The invention steps in the method are divided into three stages: the networking stage, the group key establishment stage and the group key update stage; figure 2 , 3 , 4, 5, and 6 analyze the above three stages in detail. The specific process is as follows:

[0039] 1. System initialization configuration

[0040] (1) Before the nodes are deployed ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a group key management method applicable to a heterogeneous sensor network. The method is that the distributive key management mode is performed; key materials of nodes in the group are dynamically distributed by a leader of each group; when networking, the leader and the nodes in the group are identified according to an exclusive NOR identification mechanism; when constructing the group key, the leader generates a witness for members in each group through an one-way accumulator; when updating the group key, three key update mechanisms are provided, namely, the mechanism of timely updating the group key, the mechanism of updating the group key while adding a new node, and the mechanism of updating the group key when repealing the old nodes; the nodes in the group utilize the concealed witness in a group key update message to identity a group key update instruction. With the adoption of the method, the calculation cost and storage cost of the whole network can be reduced; the real distributive management mode can be achieved; in addition, the forward security and the backward security of the whole network can be ensured; the safety and reliability of the wireless sensor network in operation can be improved.

Description

technical field [0001] The invention relates to a group key management method suitable for a wireless sensor network, which belongs to the application field of wireless sensor network technology and cross-technology of network information security. Background technique [0002] Wireless sensor networks (WSN, wireless sensor networks) have attracted more and more attention due to their broad application prospects, but due to their limited resources, unsafe working environment and low-cost requirements, security issues have always been It is a hotspot of academic research. With the rapid development of WSN, its application scope is also more and more extensive. At present, the existence of WSN is indispensable in the military and people's daily life. In WSN, in addition to point-to-point unicast communication, multicast communication is also required, but multicast communication has the characteristics of open channels, and compared with unicast communication, it is more lik...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/08H04L29/06
Inventor 罗洪平陈伟王浩王平曾培寇伟
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products