A wireless sensor network routing method based on leach protocol
A wireless sensor, network technology, applied in the direction of network topology, wireless communication, advanced technology, etc., can solve the problem of LEACH protocol security vulnerabilities and so on
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0119] Such as figure 1 As shown, in this embodiment, a wireless sensor network routing method based on the LEACH protocol, the steps are as follows:
[0120] S1. Initial deployment of all nodes in the entire network; the initial deployment includes the generation of base station key chains, the distribution of node identities in the entire network, and the storage of symmetric key security algorithms.
[0121] S2. Enter the authentication broadcast stage: the base station broadcasts data including security control information to the entire network and periodically updates the security control information. The security control information includes a random number, and the node obtains the security control broadcast by the base station After the information is sent, the correctness of the security control information is verified, and the currently stored security control information is updated after the verification; after the authentication broadcast stage ends, step S3 is ent...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com