CN103888940B - Multi-level encryption and authentication type WIA-PA network handheld device communication method - Google Patents

Multi-level encryption and authentication type WIA-PA network handheld device communication method Download PDF

Info

Publication number
CN103888940B
CN103888940B CN201210555911.1A CN201210555911A CN103888940B CN 103888940 B CN103888940 B CN 103888940B CN 201210555911 A CN201210555911 A CN 201210555911A CN 103888940 B CN103888940 B CN 103888940B
Authority
CN
China
Prior art keywords
handheld device
network
key
field apparatus
wia
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210555911.1A
Other languages
Chinese (zh)
Other versions
CN103888940A (en
Inventor
朱祥彬
曾鹏
赵雪峰
赵晓全
宋颖超
肖金超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang Institute of Automation of CAS
Original Assignee
Shenyang Institute of Automation of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Institute of Automation of CAS filed Critical Shenyang Institute of Automation of CAS
Priority to CN201210555911.1A priority Critical patent/CN103888940B/en
Publication of CN103888940A publication Critical patent/CN103888940A/en
Application granted granted Critical
Publication of CN103888940B publication Critical patent/CN103888940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to a high-safety multi-level encryption and authentication type WIA-PA network handheld device communication method. The WIA-PA network includes a gateway, a routing device and a field device. The handheld device can be in safe communication with devices in the WIA-PA network in two ways. In the first way, point-to-point communication is established between the handheld device and the devices in the WIA-PA network, and encryption is performed in the link layer. In the second way, the handheld device is joined into the WIA-PA network, and the handheld device is in communication with the devices in the WIA-PA network through the multi-level encryption technology after the handheld device is joined into the WIA-PA network. Through the combination of the two ways, the safety can be ensured, and at the same time, communication is fast established between the handheld device and the devices in the network, and advantages of low power consumption, fast speed and less network performance influences can be realized.

Description

The means of communication of multi-level encryption and the WIA-PA network handheld device of certification
Technical field
The present invention relates to secure wireless communication technology, more particularly to a kind of handheld device and allow the handheld device with The operator scheme that the equipment selected in WIA-PA network is securely communicated.
Background technology
Industry wireless network WIA (WirelessNetworksforIndustrialAutomation) technology is by China Highly reliable, super low-power consumption the intelligent multi-hop wireless with independent intellectual property right that academy of science's Shenyang automation research is released is passed Sensor network technology, the technology provides a kind of self-organizing, the intelligent Mesh network routing mechanism cured certainly, can be directed to application bar The dynamic change of part and environment, keeps the high reliability and stiff stability of network performance.
Industry wireless network has begun to be used for the key areas such as electric power, oil, chemical industry, metallurgy.In industrial circle, Wireless network is mainly used in the monitoring system of large-scale key equipment and infrastructure, thus, compared with civilian network, network is pacified Complete and information security has higher requirement.Radio network technique has many advantages, example for industry monitoring and control system Such as:Flexibly install whenever and wherever possible, movement/slewing is monitored, reduce cost of wiring tape etc..But, wireless network also band Having carried out many safety problems needs to solve, for example:Easily illegal access, be easier attack, can even pass through wireless network Attack cable network.Therefore, industry wireless network safety main task be protection legitimate correspondence safely, prevent unauthorized access Or using wireless network to wireless industrial/cable network in various equipment cause function or the destruction in performance.
Handheld device can be communicated as a part for network with field apparatus, routing device and gateway, and can To configure and obtain the various parameters of equipment.If handheld device is subject to the attack of hacker or unauthorized handheld device illegal Be added in network, it would be possible to network is produced serious influence, or even makes whole network paralyse.
Additionally, industry wireless network is in terms of energy consumption, especially the energy consumption aspect of field apparatus, there is the requirement that comparison is high, Thus the impact of should the try one's best performance and life cycle that reduce handheld device in networking and communication to whole network.
The content of the invention
For deficiencies of the prior art part, the technical problem to be solved in the present invention be to provide it is a kind of multistage plus The means of communication of the close WIA-PA network handheld device with certification, ensure that handheld device safely and fast and WIA-PA network In designated equipment communication, and reduce the impact to other equipment as far as possible.
The technical scheme that adopted for achieving the above object of the present invention is:A kind of multi-level encryption and the WIA-PA network of certification The communication means of handheld device, the network is included in multiple field apparatus and routing device, a WIA radio network gateway and control The heart, wherein, a routing device and multiple field apparatus constitute Star Network;
When the handheld device field apparatus to be communicated is in the communication range of the handheld device, then the handheld device Communicated by setting up point-to-point subnet with field apparatus;
When the handheld device field apparatus to be communicated not in the communication range of the handheld device when, then it is described hand-held to set It is standby to be communicated with the field apparatus by adding the network.
The method for building up of the point-to-point subnet is:
A1. handheld device starts configuration process after user input configuring cipher key success;
A2. handheld device monitors the broadcast of field apparatus under specified network number and channel, and search can set up point-to-point Field apparatus;
A3. being formed on a handheld device can set up point-to-point field apparatus list, and user selects to be intended to set up as needed The field apparatus of connection;
A4. the field apparatus that handheld device is selected with user carries out time synchronized, and the addition for determining the field apparatus is received Send out time slot;
A5. handheld device generates the message identifying of encryption, and is sent to the field apparatus;
A6. field apparatus is received after message identifying, is decrypted using the addition key of oneself in link layer, is carried after decryption The addition key of handheld device is taken out, that compares handheld device adds key whether identical with the addition key of field apparatus, such as It is really identical, think that handheld device possesses the qualification for setting up point to point network, session key is locally produced, will be comprising session key Response message using field apparatus addition key encryption after be sent to handheld device;
A7. handheld device is received after the response message of field apparatus, and point-to-point subnet is set up.
Addition key of the message identifying of the encryption comprising handheld device, and entered using symmetric encipherment algorithm in link layer Row encryption, encryption key is the addition key of handheld device.
After the completion of the point-to-point subnet is set up, handheld device is communicated with field apparatus using session key.
The symmetric encipherment algorithm is completed by the encryption chip inside field apparatus.
The communication process of step A5 to the A7 is carried out in the addition transmitting-receiving time slot of the field apparatus.
The handheld device is by adding the method for the network:
B1. handheld device starts configuration process after user input configuring cipher key success, and selects to add WIA-PA network;
B2. handheld device monitors the broadcast of field apparatus and routing device under specified network number and channel, and search can To set up the routing device of connection, if comprising multiple routing devices that can set up connection, according to jumping figure, signal intensity and negative The factors such as load, select optimal routing device;
B3. handheld device carries out time synchronized with routing device, determines the addition transmitting-receiving time slot of selected routing device;
B4. handheld device generates the networking message identifying of encryption, and is sent to the routing device;
B5. the routing device is received after the networking message identifying of handheld device, close using the addition of oneself in link layer Key is decrypted, and the addition key of handheld device is extracted after decryption, and that compares handheld device adds key with routing device Add key whether identical, if the same think that handheld device possesses the qualification for adding WIA-PA network, be handheld device point With communication time slot, the message with Link data structures is sent to into handheld device after link layer encryption;The routing device The public key of handheld device is added in list of public keys, after updating list of public keys, selects idle time slot to send list of public keys All nodes in WIA-PA network;
B6. handheld device is received after the response message of the routing device, that is, be added to WIA-PA network.
The networking message identifying includes the addition key and public key of handheld device and in link layer using symmetric cryptography calculation Method is encrypted, and encryption key is the addition key of handheld device.
The method that the handheld device is communicated with the field apparatus is:
When handheld device needs to send data to field apparatus, in list of public keys, the public key of the field apparatus is searched, Application layer data is encrypted using public key, is then encrypted in link layer using the addition key of handheld device, will be added Data message after close is sent to sets up the routing device being connected with handheld device;
The routing device is received after above-mentioned data message, is decrypted using the addition key RKJ of routing device in link layer, Determine after next-hop routing device after decryption, be encrypted using the addition key RKJ of routing device in link layer, be then issued to The next-hop routing device, the like, until data message is sent to into the handheld device field apparatus to be communicated;
Field apparatus is received after the data message, is decrypted using the addition key of oneself in link layer, it is determined that should Data message is destined to after oneself, is decrypted using the private key of oneself in application layer, and be applied a layer message.
The communication process of step B4 to the B6 is carried out in the addition transmitting-receiving time slot of selected routing device.
The present invention has advantages below:
1. the present invention ensure that handheld device communicating with the designated equipment in WIA-PA network safely and fast, and to the greatest extent Impact of the possible reduction to other equipment, enciphering rate is fast, low in energy consumption.
2. the point-to-point communication of the present invention is added using session key using adding key to carry out authentication to communication data Close, certification and encryption adopt symmetric encipherment algorithm, and are completed by the encryption chip of device interior, fast, low in energy consumption with speed The characteristics of;Simultaneously point-to-point subnet will not produce impact to the communication of the other equipment in WIA-PA network.
3. in the communication modes end to end of the present invention, data need to be transmitted in multiple equipment, using application layer encryption And link layer encryption, it is ensured that data safe transmission end to end.The encryption of application layer adopts a kind of rivest, shamir, adelman, the calculation Method can provide higher safety, but the speed of encryption and decryption is slower;The encryption of link layer adopts symmetry algorithm, and it is right to reduce The impact of routing device.
Description of the drawings
Fig. 1 is typical WIA-PA network schematic diagram;
Fig. 2 is the schematic diagram that handheld device and WIA-PA network designated equipment set up point-to-point subnet;
Fig. 3 is the schematic diagram that handheld device adds WIA-PA network.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in further detail.
The concept being related in the present invention is as follows:
1) time synchronized:Because WIA industry wireless networks use time-division multiplex communication pattern, the whole network all devices are all Time slot operations are carried out according to same network time.The time of whole network for gateway broadcasting packet in carry absolute time Between.Node parses wherein absolute network time by several broadcasting packets from lock in time source for continuously receiving, and Using FTSP synchronized algorithm deadline synchronizations.
2) time slot:Basic time resource in WIA networks, under Single Channel Case, only completes an equipment in each time slot Broadcast transmission task, or the packet sending and receiving task between a pair of equipment.
3) superframe:It is the time slot sets of one group of circulation appearance, the number of time slot determines the speed of superframe cycle.
4)Link:It is the data knot for describing the communication call parameter in network on a certain paths between two neighboring equipment Structure, including sender address, recipient address receive and dispatch the time slot and channel for using, the path number of said path.
5) symmetric encipherment algorithm:Encryption key is identical with decruption key, and the algorithm amount of calculation is little, enciphering rate is fast.
6) rivest, shamir, adelman:Encryption key is different from decruption key, needs two keys:Public-key cryptography, and it is privately owned Key.The algorithm calculates complicated, safe.
As shown in figure 1, the schematic diagram of typical WIA-PA network, it can be seen that the network include field apparatus, Routing device, WIA radio network gateways and control centre.One routing device and multiple field apparatus constitute a Star network Network, referred to as cluster.Cluster head is the manager in cluster, is undertaken by routing device.Cluster member is the data source in cluster, is held by field apparatus Load.Each device interior includes safety management module.
The safety management module of gateway(Secure Manager)The responsible configuration of whole network security strategy, the management of key and The certification work of equipment, its function is broadly divided into following components:
1) according to concrete application, the security strategy of system is configured, configures the security function of WIA-PA network;
2) certification attempts to join routing device in network, field apparatus and handheld device;
3) according to concrete application and the security strategy of system, gateway device and routing device are configured and is monitored;
4) it is responsible for the key management of whole network, including configuration safety management module, key is produced, key is distributed, key Recovery, key updating etc.;
5) safety measure such as data encrypting and deciphering and data check is implemented.The safety management module function of cluster head is as follows:
1) safety measure of the security strategy arranged according to Secure Manager, configuration and monitoring site equipment;
2) key that cluster member is used is managed, is responsible for the key of forwarding Secure Manager distribution;
3) safety measure such as data encrypting and deciphering and data check is implemented;
4) certification request is initiated;
5) correspondence between certification field apparatus and routing device;
6) correspondence between certification routing device.The safety management module function of cluster member is as follows:
1) management data link sublayer and the safety measure using sublayer;
2) safety measure such as data encrypting and deciphering and data check is implemented;
3) key of cluster member is managed.
Embodiment
Handheld device needs to be set up with designated equipment and is wirelessly connected, and can just complete the work for configuring and obtaining facility information. According to circumstances different, handheld device is respectively adopted two kinds of different modes and is communicated with equipment:
First kind of way:As shown in Fig. 2 handheld device H1 sets up point-to-point subnet with specified field apparatus N2, once This point-to-point subnet is established, and handheld device will be considered believable equipment, it is allowed to which it carries out safe with field apparatus N2 Point-to-point communication.Due to not needing other routing devices to participate in the transmission of data, therefore adopt the encryption of link layer just can be with Ensure the safety of data.Set up point-to-point secure communication subnet process as follows:
1) the user input configuring cipher key of handheld device H1, after success configuration software is started;
2) under specified network number and channel, the broadcast of audiomonitor, search can set up point-to-point handheld device H1 Equipment, as illustrated, now have 4 equipment that can set up communication, including routing device R1 and field apparatus N1, N2, N3;
3) list of devices is formed in handheld device H1(R1、N1、N2、N3), user selects to be intended to set up connection as needed Equipment N2;
4) handheld device carries out time synchronized with field apparatus N2, determines the addition transmitting-receiving time slot of N2, communication below mistake Journey be all N2 addition transmitting-receiving time slot carry out;
5) handheld device H1 generates the message identifying of encryption, is then sent to field apparatus N2.The message adding comprising H1 Enter key HJK, and be encrypted using symmetric encipherment algorithm in link layer, encryption key is HJK.
6) field apparatus N2 is received after message identifying, is decrypted using the addition key NJK of N2 in link layer, after decryption The addition key HJK of handheld device H1 is extracted, whether compare HJK and NJK identical, if the same think that handheld device H1 has The standby qualification for setting up point to point network, N2 generates session key SK, is sent to after the message comprising SK is encrypted using key NJK H1;
7) handheld device H1 is received after the response message of field apparatus N2, and point-to-point subnet is set up.Hereafter handheld device H1 Safe communication is carried out with field apparatus N2 using session key SK.
Which carries out authentication using addition key, using session key to encryption of communicated data, certification and encryption Adopt symmetric encipherment algorithm, and completed by the encryption chip of device interior, with speed it is fast, it is low in energy consumption the characteristics of;Same time point Impact will not be produced on the communication of the other equipment in WIA-PA network to the subnet put.
The second way:As shown in figure 3, when handheld device H1 needs to be communicated with field apparatus N4, N4 exceedes The communication range of H1, now H1 need add WIA-PA network, could be communicated with N4.In order to ensure that H1 is end-to-end with N4 Communication security, needs be encrypted in link layer and application layer, be encrypted using asymmetric arithmetic in application layer, in link Layer is encrypted using symmetry algorithm.Handheld device H1 adds WIA-PA network, and the process communicated with N4 is as follows:
1) the user input configuring cipher key of handheld device H1, starts configuration software after success, start and select after software addition WIA-PA network;
2) under specified network number and channel, the broadcast of audiomonitor, search can set up connection to handheld device H1 Routing device, if comprising multiple routing devices that can set up connection, according to the factors such as jumping figure, signal intensity and load, choosing Optimal routing device is selected out, as illustrated, selecting routing device R1;
3) handheld device carries out time synchronized with routing device R1, determines the addition transmitting-receiving time slot of R1, communication below mistake Journey be all R1 addition transmitting-receiving time slot carry out;
4) handheld device H1 generates the networking message identifying of encryption, is then sent to routing device R1.The message includes H1 Addition key HJK and public key PUBKEYH and be encrypted using symmetric encipherment algorithm in link layer, encryption key is HJK.
5) routing device R1 is received after the networking message identifying of H1, is solved using the addition key RJK of R1 in link layer It is close, the addition key HJK of handheld device H1 is extracted after decryption, whether identical, if the same think handss if comparing HJK and RJK Holding equipment H1 possesses the qualification for adding WIA-PA network, is H1 distribution communication time slots, and Link messages are sent out after link layer encryption Give H1.R1 is added to the public key PUBKEYH of H1 in list of public keys, after updating list of public keys, selects suitable time slot by public affairs Key list is sent to all nodes in WIA-PA network;
6) handheld device H1 is received after the response message of routing device R1, is successfully joined WIA-PA network.
7) when handheld device H1 needs to send data to field apparatus N4, in list of public keys, the public key of equipment N4 is searched PUBKEY4, is encrypted using PUBKEY4 to application layer data, is then encrypted in link layer using HJK, is sent to road By equipment R1;
8) routing device R1 is received after message, is decrypted using RJK in link layer, and next-hop routing device R2 is determined after decryption Afterwards, it is encrypted using RJK in link layer, is then issued to routing device R2.R2 is received after message, and processing procedure is similar to R1, Message is sent to into N4;
9) field apparatus N4 is received after message, is decrypted using encryption key JKN in link layer, determines that the message is to send out After giving oneself, it is decrypted using the private key of oneself in application layer, be applied a layer message.
Which carries out identity and recognizes when handheld device H1 networks by the routing device handheld device H1 being directly connected to Card, H1 adds WIA-PA network after certification success.When H1 is communicated with node device, carry out adding in link layer and application layer Close, the encryption of link layer ensures the safety of transmission path;The encryption of application layer ensures the end-by-end security of data.It is non-right The characteristics of claiming algorithm to have safe, but calculating speed is slower, and the encryption in application layer only needs to enter in the originating end of communication Row encryption, clearing end is decrypted, therefore is encrypted using asymmetric arithmetic in application layer, while high safety is ensured, Other equipment is not affected;And the encryption of link layer needs all nodes in transmission path all to participate in, therefore using right Claim algorithm, and completed by hardware chip, so as to reduce the impact to performance and power consumption.
Key management module is included in the handheld device, and key management module is responsible for storing and managing following several keys: Configuring cipher key, addition key, session key, equipment list of public keys.Wherein configuring cipher key and encryption key are breathed out using a kind of individual event Uncommon algorithm, calculates and is stored in the flash of handheld device after its cryptographic Hash.

Claims (9)

1. a kind of communication means of the WIA-PA network handheld device of multi-level encryption and certification, it is characterised in that the network bag Multiple field apparatus and routing device, a WIA radio network gateway and control centre are included, wherein, a routing device and multiple existing Field device constitutes Star Network;
When the handheld device field apparatus to be communicated is in the communication range of the handheld device, then the handheld device with it is existing Field device is communicated by setting up point-to-point subnet;
When the handheld device field apparatus to be communicated not in the communication range of the handheld device when, then the handheld device lead to Cross and add the network to be communicated with the field apparatus;
The method for building up of the point-to-point subnet is:
A1. handheld device starts configuration process after user input configuring cipher key success;
A2. handheld device monitors the broadcast of field apparatus under specified network number and channel, and search can set up point-to-point existing Field device;
A3. being formed on a handheld device can set up point-to-point field apparatus list, and user selects to be intended to set up connection as needed Field apparatus;
A4. the field apparatus that handheld device is selected with user carries out time synchronized, when determining that the addition of the field apparatus is received and dispatched Gap;
A5. handheld device generates the message identifying of encryption, and is sent to the field apparatus;
A6. field apparatus is received after message identifying, is decrypted using the addition key of oneself in link layer, is extracted after decryption Whether the addition key of handheld device, compare handheld device adds key identical with the addition key of field apparatus, if phase It is same then think that handheld device possesses the qualification for setting up point to point network, session key is locally produced, will include session key should Answer after message is encrypted using the addition key of field apparatus and be sent to handheld device;
A7. handheld device is received after the response message of field apparatus, and point-to-point subnet is set up.
2. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature It is, the addition key of the message identifying comprising handheld device of the encryption, and is carried out using symmetric encipherment algorithm in link layer Encryption, encryption key is the addition key of handheld device.
3. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature It is that after the completion of the point-to-point subnet is set up, handheld device is communicated with field apparatus using session key.
4. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 2 and certification, its feature It is that the symmetric encipherment algorithm is completed by the encryption chip inside field apparatus.
5. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature It is that the communication process of step A5 to the A7 is carried out in the addition transmitting-receiving time slot of the field apparatus.
6. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature It is that the handheld device is by adding the method for the network:
B1. handheld device starts configuration process after user input configuring cipher key success, and selects to add WIA-PA network;
B2. handheld device monitors the broadcast of field apparatus and routing device under specified network number and channel, and search can build The routing device of vertical connection, if comprising multiple routing devices that can set up connection, according to jumping figure, signal intensity and load because Element, selects optimal routing device;
B3. handheld device carries out time synchronized with routing device, determines the addition transmitting-receiving time slot of selected routing device;
B4. handheld device generates the networking message identifying of encryption, and is sent to the routing device;
B5. the routing device is received after the networking message identifying of handheld device, is entered using the addition key of oneself in link layer Row decryption, extracts the addition key of handheld device after decryption, compare the addition key of handheld device and the addition of routing device Whether key is identical, if the same thinks that handheld device possesses the qualification for adding WIA-PA network, is that handheld device distribution is logical Letter time slot, by the message with Link data structures handheld device is sent to after link layer encryption;The routing device is by handss The public key of holding equipment is added in list of public keys, after updating list of public keys, selects idle time slot to be sent to list of public keys All nodes in WIA-PA network;
B6. handheld device is received after the response message of the routing device, that is, be added to WIA-PA network.
7. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 6 and certification, its feature It is that the addition key and public key that the networking message identifying includes handheld device is simultaneously entered in link layer using symmetric encipherment algorithm Row encryption, encryption key is the addition key of handheld device.
8. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 6 and certification, its feature It is that the method that the handheld device is communicated with the field apparatus is:
When handheld device needs to send data to field apparatus, in list of public keys, the public key of the field apparatus is searched, used Public key is encrypted to application layer data, is then encrypted in link layer using the addition key of handheld device, after encryption Data message be sent to and set up the routing device that is connected with handheld device;
The routing device is received after above-mentioned data message, is decrypted using the addition key RKJ of routing device in link layer, decryption Determine after next-hop routing device afterwards, be encrypted using the addition key RKJ of routing device in link layer, be then issued to described Next-hop routing device, the like, until data message is sent to into the handheld device field apparatus to be communicated;
Field apparatus is received after the data message, is decrypted using the addition key of oneself in link layer, determines the data Message is destined to after oneself, is decrypted using the private key of oneself in application layer, and be applied a layer message.
9. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 6 and certification, its feature It is that the communication process of step B4 to the B6 is carried out in the addition transmitting-receiving time slot of selected routing device.
CN201210555911.1A 2012-12-19 2012-12-19 Multi-level encryption and authentication type WIA-PA network handheld device communication method Active CN103888940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210555911.1A CN103888940B (en) 2012-12-19 2012-12-19 Multi-level encryption and authentication type WIA-PA network handheld device communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210555911.1A CN103888940B (en) 2012-12-19 2012-12-19 Multi-level encryption and authentication type WIA-PA network handheld device communication method

Publications (2)

Publication Number Publication Date
CN103888940A CN103888940A (en) 2014-06-25
CN103888940B true CN103888940B (en) 2017-05-10

Family

ID=50957624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210555911.1A Active CN103888940B (en) 2012-12-19 2012-12-19 Multi-level encryption and authentication type WIA-PA network handheld device communication method

Country Status (1)

Country Link
CN (1) CN103888940B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102014112611A1 (en) * 2014-09-02 2016-03-03 Endress + Hauser Conducta Gesellschaft für Mess- und Regeltechnik mbH + Co. KG Method for authenticating at least one first unit to at least one second unit
CN104507175B (en) * 2015-01-13 2017-12-01 重庆邮电大学 A kind of method of WIA PA network hand-holds equipment Network with Random Multiple Access System
CN104852982B (en) * 2015-05-18 2018-04-27 重庆邮电大学 A kind of direct-connected method of WIA-PA network handheld device and field device based on Keep-alive frames
DE102015121861A1 (en) * 2015-12-15 2017-06-22 Endress + Hauser Flowtec Ag Access key for a field device
CN105744524B (en) * 2016-05-06 2019-03-22 重庆邮电大学 Mobile device networking authentication method in a kind of WIA-PA industry wireless network
CN109493580A (en) * 2017-09-11 2019-03-19 奥维飞越通信有限公司 One kind being based on WIA-PA Multifunctional hand-held machine control system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754423A (en) * 2008-12-19 2010-06-23 中国科学院沈阳自动化研究所 Industrial wireless communication method based on IEEE802.15.4
WO2012014008A1 (en) * 2010-07-30 2012-02-02 Abb Research Ltd A method and a system for localization in industrial wireless sensor network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754423A (en) * 2008-12-19 2010-06-23 中国科学院沈阳自动化研究所 Industrial wireless communication method based on IEEE802.15.4
WO2012014008A1 (en) * 2010-07-30 2012-02-02 Abb Research Ltd A method and a system for localization in industrial wireless sensor network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WIA-PA 网络的入网认证和密钥更新机制研究;王浩;《PROCESS AUTOMATION INSTRUMENTATION》;20110731;第32卷;全文 *
WIA-PA: 用于过程自动化的工业无线网络系统;梁炜;《Technology of Industrial Wireless Communication》;20090228;全文 *
WIA-PA网络安全通信协议栈研究与实现;张萱;《中国优秀硕士学位论文全文数据库信息科技辑》;20101215;正文10-19页 *

Also Published As

Publication number Publication date
CN103888940A (en) 2014-06-25

Similar Documents

Publication Publication Date Title
Cao et al. Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks
CN103888940B (en) Multi-level encryption and authentication type WIA-PA network handheld device communication method
CN101159748B (en) Entity authentication method in wireless sensor network
CN104780069B (en) A kind of key-course towards SDN and data Layer communication port self-configuration method and its system
CN101420686B (en) Industrial wireless network security communication implementation method based on cipher key
Healy et al. Security for wireless sensor networks: A review
CN102546184B (en) Method and system for message secure transmission or key distribution in sensor network
CN102869007A (en) Safety algorithm negotiation method, device and network system
CN101282208B (en) Method for updating safety connection association master key as well as server and network system
CN108882238A (en) A kind of lightweight rotation ca authentication method in mobile ad hoc network based on common recognition algorithm
Chen et al. A dynamic-encryption authentication scheme for M2M security in cyber-physical systems
Wang et al. KeyRev: An efficient key revocation scheme for wireless sensor networks
Uluagac et al. Designing secure protocols for wireless sensor networks
Saraswathi et al. Dynamic and probabilistic key management for distributed wireless sensor networks
WO2004102871A1 (en) A process for secure communication over a wireless network, related network and computer program product
Ambili et al. A secure software defined networking based framework for IoT networks
CN106888083A (en) Internet of Things the following group key generation method and communication node
Soroush et al. Providing transparent security services to sensor networks
CN105981028A (en) Network element authentication in communication networks
Abraham et al. An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks
Min et al. Research and implementation of the security method based on WIA-PA standard
CN101646172B (en) Method and device for generating key in distributed MESH network
Wei et al. Research and implementation on the security scheme of industrial wireless network
Fulare et al. Secure authentication technique in wireless integrated sensor network: Virtual certificate authority
Falk et al. Industrial sensor network security architecture

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant