A Secure Communication Method for Intra-cluster Nodes in Wireless Sensor Networks Based on Key Technology

A technology of wireless sensors and intra-cluster nodes, which is applied in the field of cryptographic applications, can solve the problems of loss of network security, large key storage space, and small storage space, so as to reduce generation time and storage space, and consume less key resources , the effect of less computing resources

Active Publication Date: 2018-04-06
中电科网络安全科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The former requires little storage space, but the security is very low. If a node is captured, the entire network will lose security; the latter has higher security, but requires a larger key storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secure Communication Method for Intra-cluster Nodes in Wireless Sensor Networks Based on Key Technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0029] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0030] Working principle: In the present invention, the wireless sensor network adopts a hierarchical structure for management. The whole network is divided into multiple clusters, each sensor node belongs to only one cluster, and each cluster consists of a cluster head and multiple sensor nodes. A group key is shared in the cluster. The cluster head comprehensively considers the storage key capacity and the number of updated keys of the nodes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of cipher application, in particular to a secure communication method for nodes in a wireless sensor network cluster based on key technology. Aiming at the problems existing in the prior art, the present invention provides a method, which utilizes permutation and combination theory, uses a small amount of key seeds in the network cluster to generate a large number of combined keys, and provides the key pool required for key distribution and update According to the combination relationship, the association rules of key resources between nodes are formulated, and the HMAC function is used to generate temporary session keys, which reduces the generation time and storage space of keys, reduces the transmission volume of wireless sensor networks, and meets the needs of wireless sensor network clusters. Communication encryption requirements between nodes. The specific process is: the cluster head Hd uses the SHA1 function to generate the session key between any two nodes, and then constructs the corresponding encryption key for protecting the session key according to the key resources allocated by the two nodes, so that any node in the cluster can communicate with secure communication between them.

Description

technical field [0001] The invention relates to the technical field of cipher application, in particular to a secure communication method for nodes in a wireless sensor network cluster based on key technology. Background technique [0002] Wireless sensor networks are widely used in smart home, smart manufacturing and other fields, and become a research hotspot in the fields of Internet of Things and Industrial Internet. Different from ordinary wired networks and wireless networks, wireless sensor networks have the characteristics of less computing resources, small storage capacity, and communication is easy to be eavesdropped. Therefore, communication encryption is one of the important means of wireless sensor network security protection, and key management is a key technology for wireless sensor network to realize communication encryption. [0003] The existing wireless sensor network key management schemes are mainly divided into two categories: one is the shared master ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/04H04W12/041H04W12/0431
CPCH04L63/062H04W12/04
Inventor 王斯梁
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products