Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A wireless multi-hop ad hoc network encryption key dynamic loading device and method

A self-organizing network and wireless self-organizing technology, applied in wireless communication, network topology, security devices, etc., can solve problems such as wireless communication data leakage, and achieve the effect of protecting authentication security, safe and convenient key protection technology

Active Publication Date: 2021-08-13
DONGGUAN UNIV OF TECH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And when the key leaks, it will lead to the leakage of wireless communication data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless multi-hop ad hoc network encryption key dynamic loading device and method
  • A wireless multi-hop ad hoc network encryption key dynamic loading device and method
  • A wireless multi-hop ad hoc network encryption key dynamic loading device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] In the embodiment of the present invention, please refer to Figure 1-6 , a wireless multi-hop self-organizing network encryption key dynamic loading device, comprising: a dynamic key U-shield (2), a USB interface (11), an automatic mounting device, a hot-swappable event execution device, and a key automatic loading device and network service restart device. The dynamic key U-shield (2) is connected to the wireless self-organizing network node (1) through the USB interface (11) to form an interface event, which triggers the automatic mounting device. After the mounting is completed, the hot plug action is detected through the kernel Plug event execution device, hot plug event execution device will call the automatic key loading device at last, load the latest dynamic key, after the key loading is completed, finally call the network service startup device, restart the network service of the wireless Mesh network, complete The process of dynamically loading encryption ke...

Embodiment 2

[0052] In the embodiment of the present invention, please refer to figure 2 , the present invention at first carries out dynamic key input (or change) on computer (computer / notebook etc. installs the equipment of corresponding drive software) with dynamic key U-shield (2) according to the requirement, power-on starts action (task) execution The required wireless ad hoc network node (1) (or a running device), make sure that the startup is complete or has been started (the indicator light is not flashing), insert the dynamic key U-shield (2) into the wireless ad hoc network node (1 ) on the USB interface (11), wait for the indicator light to flash three times at a rate of 1 time per second, and then stay on for 1 second. Indicates that all operations are completed (about 30s), and then insert the dynamic key U-shield (2) into another wireless ad hoc network node (1) device and repeat it. All devices in the network must be executed once.

[0053] The present invention has follo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless multi-hop ad hoc network encryption key dynamic loading device and method. When the Sentry series wireless Mesh network equipment performs networking communication, a special U-shield is used to load an unpredictable random number combination (8‑ 64-bit) as the key; the specific execution steps are as follows: U-shield enters a dynamic loading key, inserts the dynamic key U-shield containing the latest key into the wireless mesh network device, and the wireless mesh network device will automatically verify and load After verifying the latest key again to ensure that the key is loaded successfully, the network service will be restarted, and the network will be re-established, thus completing the dynamic loading of the wireless multi-hop self-organizing network encryption key. The invention is a safe and convenient key protection technology, which can effectively protect the authentication security in the wireless network communication process; the Sentry series wireless devices adopting the dynamic loading key networking mode do not need to modify the password regularly, do not need to remember the password, and even In case of loss, there is no need to worry.

Description

technical field [0001] The invention relates to the field of wireless multi-hop ad hoc networks, in particular to a wireless multi-hop ad hoc network encryption key dynamic loading device and method with dynamic keys. Background technique [0002] The wireless multi-hop self-organizing network is composed of wireless multi-hop self-organizing nodes. It can be dynamically networked through the self-organizing protocol and has the ability of multi-hop transmission. The networking protocol will automatically select the best path according to the link quality. It can operate as an independent private network or as a fixed deployment to achieve last-mile access. Wireless multi-hop ad-hoc networks have great prospects for development. With the development of the Internet of Things, it has become one of the current research hotspots in wireless networks. However, the increasingly serious security problems have made people pay more and more attention to the security problems of wir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/0433
CPCH04W12/04H04W84/18
Inventor 毛续飞万鹏俊周坤晓何贤芒
Owner DONGGUAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products