CN103888940B - Multi-level encryption and authentication type WIA-PA network handheld device communication method - Google Patents
Multi-level encryption and authentication type WIA-PA network handheld device communication method Download PDFInfo
- Publication number
- CN103888940B CN103888940B CN201210555911.1A CN201210555911A CN103888940B CN 103888940 B CN103888940 B CN 103888940B CN 201210555911 A CN201210555911 A CN 201210555911A CN 103888940 B CN103888940 B CN 103888940B
- Authority
- CN
- China
- Prior art keywords
- handheld device
- network
- key
- field apparatus
- wia
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention relates to a high-safety multi-level encryption and authentication type WIA-PA network handheld device communication method. The WIA-PA network includes a gateway, a routing device and a field device. The handheld device can be in safe communication with devices in the WIA-PA network in two ways. In the first way, point-to-point communication is established between the handheld device and the devices in the WIA-PA network, and encryption is performed in the link layer. In the second way, the handheld device is joined into the WIA-PA network, and the handheld device is in communication with the devices in the WIA-PA network through the multi-level encryption technology after the handheld device is joined into the WIA-PA network. Through the combination of the two ways, the safety can be ensured, and at the same time, communication is fast established between the handheld device and the devices in the network, and advantages of low power consumption, fast speed and less network performance influences can be realized.
Description
Technical field
The present invention relates to secure wireless communication technology, more particularly to a kind of handheld device and allow the handheld device with
The operator scheme that the equipment selected in WIA-PA network is securely communicated.
Background technology
Industry wireless network WIA (WirelessNetworksforIndustrialAutomation) technology is by China
Highly reliable, super low-power consumption the intelligent multi-hop wireless with independent intellectual property right that academy of science's Shenyang automation research is released is passed
Sensor network technology, the technology provides a kind of self-organizing, the intelligent Mesh network routing mechanism cured certainly, can be directed to application bar
The dynamic change of part and environment, keeps the high reliability and stiff stability of network performance.
Industry wireless network has begun to be used for the key areas such as electric power, oil, chemical industry, metallurgy.In industrial circle,
Wireless network is mainly used in the monitoring system of large-scale key equipment and infrastructure, thus, compared with civilian network, network is pacified
Complete and information security has higher requirement.Radio network technique has many advantages, example for industry monitoring and control system
Such as:Flexibly install whenever and wherever possible, movement/slewing is monitored, reduce cost of wiring tape etc..But, wireless network also band
Having carried out many safety problems needs to solve, for example:Easily illegal access, be easier attack, can even pass through wireless network
Attack cable network.Therefore, industry wireless network safety main task be protection legitimate correspondence safely, prevent unauthorized access
Or using wireless network to wireless industrial/cable network in various equipment cause function or the destruction in performance.
Handheld device can be communicated as a part for network with field apparatus, routing device and gateway, and can
To configure and obtain the various parameters of equipment.If handheld device is subject to the attack of hacker or unauthorized handheld device illegal
Be added in network, it would be possible to network is produced serious influence, or even makes whole network paralyse.
Additionally, industry wireless network is in terms of energy consumption, especially the energy consumption aspect of field apparatus, there is the requirement that comparison is high,
Thus the impact of should the try one's best performance and life cycle that reduce handheld device in networking and communication to whole network.
The content of the invention
For deficiencies of the prior art part, the technical problem to be solved in the present invention be to provide it is a kind of multistage plus
The means of communication of the close WIA-PA network handheld device with certification, ensure that handheld device safely and fast and WIA-PA network
In designated equipment communication, and reduce the impact to other equipment as far as possible.
The technical scheme that adopted for achieving the above object of the present invention is:A kind of multi-level encryption and the WIA-PA network of certification
The communication means of handheld device, the network is included in multiple field apparatus and routing device, a WIA radio network gateway and control
The heart, wherein, a routing device and multiple field apparatus constitute Star Network;
When the handheld device field apparatus to be communicated is in the communication range of the handheld device, then the handheld device
Communicated by setting up point-to-point subnet with field apparatus;
When the handheld device field apparatus to be communicated not in the communication range of the handheld device when, then it is described hand-held to set
It is standby to be communicated with the field apparatus by adding the network.
The method for building up of the point-to-point subnet is:
A1. handheld device starts configuration process after user input configuring cipher key success;
A2. handheld device monitors the broadcast of field apparatus under specified network number and channel, and search can set up point-to-point
Field apparatus;
A3. being formed on a handheld device can set up point-to-point field apparatus list, and user selects to be intended to set up as needed
The field apparatus of connection;
A4. the field apparatus that handheld device is selected with user carries out time synchronized, and the addition for determining the field apparatus is received
Send out time slot;
A5. handheld device generates the message identifying of encryption, and is sent to the field apparatus;
A6. field apparatus is received after message identifying, is decrypted using the addition key of oneself in link layer, is carried after decryption
The addition key of handheld device is taken out, that compares handheld device adds key whether identical with the addition key of field apparatus, such as
It is really identical, think that handheld device possesses the qualification for setting up point to point network, session key is locally produced, will be comprising session key
Response message using field apparatus addition key encryption after be sent to handheld device;
A7. handheld device is received after the response message of field apparatus, and point-to-point subnet is set up.
Addition key of the message identifying of the encryption comprising handheld device, and entered using symmetric encipherment algorithm in link layer
Row encryption, encryption key is the addition key of handheld device.
After the completion of the point-to-point subnet is set up, handheld device is communicated with field apparatus using session key.
The symmetric encipherment algorithm is completed by the encryption chip inside field apparatus.
The communication process of step A5 to the A7 is carried out in the addition transmitting-receiving time slot of the field apparatus.
The handheld device is by adding the method for the network:
B1. handheld device starts configuration process after user input configuring cipher key success, and selects to add WIA-PA network;
B2. handheld device monitors the broadcast of field apparatus and routing device under specified network number and channel, and search can
To set up the routing device of connection, if comprising multiple routing devices that can set up connection, according to jumping figure, signal intensity and negative
The factors such as load, select optimal routing device;
B3. handheld device carries out time synchronized with routing device, determines the addition transmitting-receiving time slot of selected routing device;
B4. handheld device generates the networking message identifying of encryption, and is sent to the routing device;
B5. the routing device is received after the networking message identifying of handheld device, close using the addition of oneself in link layer
Key is decrypted, and the addition key of handheld device is extracted after decryption, and that compares handheld device adds key with routing device
Add key whether identical, if the same think that handheld device possesses the qualification for adding WIA-PA network, be handheld device point
With communication time slot, the message with Link data structures is sent to into handheld device after link layer encryption;The routing device
The public key of handheld device is added in list of public keys, after updating list of public keys, selects idle time slot to send list of public keys
All nodes in WIA-PA network;
B6. handheld device is received after the response message of the routing device, that is, be added to WIA-PA network.
The networking message identifying includes the addition key and public key of handheld device and in link layer using symmetric cryptography calculation
Method is encrypted, and encryption key is the addition key of handheld device.
The method that the handheld device is communicated with the field apparatus is:
When handheld device needs to send data to field apparatus, in list of public keys, the public key of the field apparatus is searched,
Application layer data is encrypted using public key, is then encrypted in link layer using the addition key of handheld device, will be added
Data message after close is sent to sets up the routing device being connected with handheld device;
The routing device is received after above-mentioned data message, is decrypted using the addition key RKJ of routing device in link layer,
Determine after next-hop routing device after decryption, be encrypted using the addition key RKJ of routing device in link layer, be then issued to
The next-hop routing device, the like, until data message is sent to into the handheld device field apparatus to be communicated;
Field apparatus is received after the data message, is decrypted using the addition key of oneself in link layer, it is determined that should
Data message is destined to after oneself, is decrypted using the private key of oneself in application layer, and be applied a layer message.
The communication process of step B4 to the B6 is carried out in the addition transmitting-receiving time slot of selected routing device.
The present invention has advantages below:
1. the present invention ensure that handheld device communicating with the designated equipment in WIA-PA network safely and fast, and to the greatest extent
Impact of the possible reduction to other equipment, enciphering rate is fast, low in energy consumption.
2. the point-to-point communication of the present invention is added using session key using adding key to carry out authentication to communication data
Close, certification and encryption adopt symmetric encipherment algorithm, and are completed by the encryption chip of device interior, fast, low in energy consumption with speed
The characteristics of;Simultaneously point-to-point subnet will not produce impact to the communication of the other equipment in WIA-PA network.
3. in the communication modes end to end of the present invention, data need to be transmitted in multiple equipment, using application layer encryption
And link layer encryption, it is ensured that data safe transmission end to end.The encryption of application layer adopts a kind of rivest, shamir, adelman, the calculation
Method can provide higher safety, but the speed of encryption and decryption is slower;The encryption of link layer adopts symmetry algorithm, and it is right to reduce
The impact of routing device.
Description of the drawings
Fig. 1 is typical WIA-PA network schematic diagram;
Fig. 2 is the schematic diagram that handheld device and WIA-PA network designated equipment set up point-to-point subnet;
Fig. 3 is the schematic diagram that handheld device adds WIA-PA network.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in further detail.
The concept being related in the present invention is as follows:
1) time synchronized:Because WIA industry wireless networks use time-division multiplex communication pattern, the whole network all devices are all
Time slot operations are carried out according to same network time.The time of whole network for gateway broadcasting packet in carry absolute time
Between.Node parses wherein absolute network time by several broadcasting packets from lock in time source for continuously receiving, and
Using FTSP synchronized algorithm deadline synchronizations.
2) time slot:Basic time resource in WIA networks, under Single Channel Case, only completes an equipment in each time slot
Broadcast transmission task, or the packet sending and receiving task between a pair of equipment.
3) superframe:It is the time slot sets of one group of circulation appearance, the number of time slot determines the speed of superframe cycle.
4)Link:It is the data knot for describing the communication call parameter in network on a certain paths between two neighboring equipment
Structure, including sender address, recipient address receive and dispatch the time slot and channel for using, the path number of said path.
5) symmetric encipherment algorithm:Encryption key is identical with decruption key, and the algorithm amount of calculation is little, enciphering rate is fast.
6) rivest, shamir, adelman:Encryption key is different from decruption key, needs two keys:Public-key cryptography, and it is privately owned
Key.The algorithm calculates complicated, safe.
As shown in figure 1, the schematic diagram of typical WIA-PA network, it can be seen that the network include field apparatus,
Routing device, WIA radio network gateways and control centre.One routing device and multiple field apparatus constitute a Star network
Network, referred to as cluster.Cluster head is the manager in cluster, is undertaken by routing device.Cluster member is the data source in cluster, is held by field apparatus
Load.Each device interior includes safety management module.
The safety management module of gateway(Secure Manager)The responsible configuration of whole network security strategy, the management of key and
The certification work of equipment, its function is broadly divided into following components:
1) according to concrete application, the security strategy of system is configured, configures the security function of WIA-PA network;
2) certification attempts to join routing device in network, field apparatus and handheld device;
3) according to concrete application and the security strategy of system, gateway device and routing device are configured and is monitored;
4) it is responsible for the key management of whole network, including configuration safety management module, key is produced, key is distributed, key
Recovery, key updating etc.;
5) safety measure such as data encrypting and deciphering and data check is implemented.The safety management module function of cluster head is as follows:
1) safety measure of the security strategy arranged according to Secure Manager, configuration and monitoring site equipment;
2) key that cluster member is used is managed, is responsible for the key of forwarding Secure Manager distribution;
3) safety measure such as data encrypting and deciphering and data check is implemented;
4) certification request is initiated;
5) correspondence between certification field apparatus and routing device;
6) correspondence between certification routing device.The safety management module function of cluster member is as follows:
1) management data link sublayer and the safety measure using sublayer;
2) safety measure such as data encrypting and deciphering and data check is implemented;
3) key of cluster member is managed.
Embodiment
Handheld device needs to be set up with designated equipment and is wirelessly connected, and can just complete the work for configuring and obtaining facility information.
According to circumstances different, handheld device is respectively adopted two kinds of different modes and is communicated with equipment:
First kind of way:As shown in Fig. 2 handheld device H1 sets up point-to-point subnet with specified field apparatus N2, once
This point-to-point subnet is established, and handheld device will be considered believable equipment, it is allowed to which it carries out safe with field apparatus N2
Point-to-point communication.Due to not needing other routing devices to participate in the transmission of data, therefore adopt the encryption of link layer just can be with
Ensure the safety of data.Set up point-to-point secure communication subnet process as follows:
1) the user input configuring cipher key of handheld device H1, after success configuration software is started;
2) under specified network number and channel, the broadcast of audiomonitor, search can set up point-to-point handheld device H1
Equipment, as illustrated, now have 4 equipment that can set up communication, including routing device R1 and field apparatus N1, N2, N3;
3) list of devices is formed in handheld device H1(R1、N1、N2、N3), user selects to be intended to set up connection as needed
Equipment N2;
4) handheld device carries out time synchronized with field apparatus N2, determines the addition transmitting-receiving time slot of N2, communication below mistake
Journey be all N2 addition transmitting-receiving time slot carry out;
5) handheld device H1 generates the message identifying of encryption, is then sent to field apparatus N2.The message adding comprising H1
Enter key HJK, and be encrypted using symmetric encipherment algorithm in link layer, encryption key is HJK.
6) field apparatus N2 is received after message identifying, is decrypted using the addition key NJK of N2 in link layer, after decryption
The addition key HJK of handheld device H1 is extracted, whether compare HJK and NJK identical, if the same think that handheld device H1 has
The standby qualification for setting up point to point network, N2 generates session key SK, is sent to after the message comprising SK is encrypted using key NJK
H1;
7) handheld device H1 is received after the response message of field apparatus N2, and point-to-point subnet is set up.Hereafter handheld device H1
Safe communication is carried out with field apparatus N2 using session key SK.
Which carries out authentication using addition key, using session key to encryption of communicated data, certification and encryption
Adopt symmetric encipherment algorithm, and completed by the encryption chip of device interior, with speed it is fast, it is low in energy consumption the characteristics of;Same time point
Impact will not be produced on the communication of the other equipment in WIA-PA network to the subnet put.
The second way:As shown in figure 3, when handheld device H1 needs to be communicated with field apparatus N4, N4 exceedes
The communication range of H1, now H1 need add WIA-PA network, could be communicated with N4.In order to ensure that H1 is end-to-end with N4
Communication security, needs be encrypted in link layer and application layer, be encrypted using asymmetric arithmetic in application layer, in link
Layer is encrypted using symmetry algorithm.Handheld device H1 adds WIA-PA network, and the process communicated with N4 is as follows:
1) the user input configuring cipher key of handheld device H1, starts configuration software after success, start and select after software addition
WIA-PA network;
2) under specified network number and channel, the broadcast of audiomonitor, search can set up connection to handheld device H1
Routing device, if comprising multiple routing devices that can set up connection, according to the factors such as jumping figure, signal intensity and load, choosing
Optimal routing device is selected out, as illustrated, selecting routing device R1;
3) handheld device carries out time synchronized with routing device R1, determines the addition transmitting-receiving time slot of R1, communication below mistake
Journey be all R1 addition transmitting-receiving time slot carry out;
4) handheld device H1 generates the networking message identifying of encryption, is then sent to routing device R1.The message includes H1
Addition key HJK and public key PUBKEYH and be encrypted using symmetric encipherment algorithm in link layer, encryption key is HJK.
5) routing device R1 is received after the networking message identifying of H1, is solved using the addition key RJK of R1 in link layer
It is close, the addition key HJK of handheld device H1 is extracted after decryption, whether identical, if the same think handss if comparing HJK and RJK
Holding equipment H1 possesses the qualification for adding WIA-PA network, is H1 distribution communication time slots, and Link messages are sent out after link layer encryption
Give H1.R1 is added to the public key PUBKEYH of H1 in list of public keys, after updating list of public keys, selects suitable time slot by public affairs
Key list is sent to all nodes in WIA-PA network;
6) handheld device H1 is received after the response message of routing device R1, is successfully joined WIA-PA network.
7) when handheld device H1 needs to send data to field apparatus N4, in list of public keys, the public key of equipment N4 is searched
PUBKEY4, is encrypted using PUBKEY4 to application layer data, is then encrypted in link layer using HJK, is sent to road
By equipment R1;
8) routing device R1 is received after message, is decrypted using RJK in link layer, and next-hop routing device R2 is determined after decryption
Afterwards, it is encrypted using RJK in link layer, is then issued to routing device R2.R2 is received after message, and processing procedure is similar to R1,
Message is sent to into N4;
9) field apparatus N4 is received after message, is decrypted using encryption key JKN in link layer, determines that the message is to send out
After giving oneself, it is decrypted using the private key of oneself in application layer, be applied a layer message.
Which carries out identity and recognizes when handheld device H1 networks by the routing device handheld device H1 being directly connected to
Card, H1 adds WIA-PA network after certification success.When H1 is communicated with node device, carry out adding in link layer and application layer
Close, the encryption of link layer ensures the safety of transmission path;The encryption of application layer ensures the end-by-end security of data.It is non-right
The characteristics of claiming algorithm to have safe, but calculating speed is slower, and the encryption in application layer only needs to enter in the originating end of communication
Row encryption, clearing end is decrypted, therefore is encrypted using asymmetric arithmetic in application layer, while high safety is ensured,
Other equipment is not affected;And the encryption of link layer needs all nodes in transmission path all to participate in, therefore using right
Claim algorithm, and completed by hardware chip, so as to reduce the impact to performance and power consumption.
Key management module is included in the handheld device, and key management module is responsible for storing and managing following several keys:
Configuring cipher key, addition key, session key, equipment list of public keys.Wherein configuring cipher key and encryption key are breathed out using a kind of individual event
Uncommon algorithm, calculates and is stored in the flash of handheld device after its cryptographic Hash.
Claims (9)
1. a kind of communication means of the WIA-PA network handheld device of multi-level encryption and certification, it is characterised in that the network bag
Multiple field apparatus and routing device, a WIA radio network gateway and control centre are included, wherein, a routing device and multiple existing
Field device constitutes Star Network;
When the handheld device field apparatus to be communicated is in the communication range of the handheld device, then the handheld device with it is existing
Field device is communicated by setting up point-to-point subnet;
When the handheld device field apparatus to be communicated not in the communication range of the handheld device when, then the handheld device lead to
Cross and add the network to be communicated with the field apparatus;
The method for building up of the point-to-point subnet is:
A1. handheld device starts configuration process after user input configuring cipher key success;
A2. handheld device monitors the broadcast of field apparatus under specified network number and channel, and search can set up point-to-point existing
Field device;
A3. being formed on a handheld device can set up point-to-point field apparatus list, and user selects to be intended to set up connection as needed
Field apparatus;
A4. the field apparatus that handheld device is selected with user carries out time synchronized, when determining that the addition of the field apparatus is received and dispatched
Gap;
A5. handheld device generates the message identifying of encryption, and is sent to the field apparatus;
A6. field apparatus is received after message identifying, is decrypted using the addition key of oneself in link layer, is extracted after decryption
Whether the addition key of handheld device, compare handheld device adds key identical with the addition key of field apparatus, if phase
It is same then think that handheld device possesses the qualification for setting up point to point network, session key is locally produced, will include session key should
Answer after message is encrypted using the addition key of field apparatus and be sent to handheld device;
A7. handheld device is received after the response message of field apparatus, and point-to-point subnet is set up.
2. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature
It is, the addition key of the message identifying comprising handheld device of the encryption, and is carried out using symmetric encipherment algorithm in link layer
Encryption, encryption key is the addition key of handheld device.
3. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature
It is that after the completion of the point-to-point subnet is set up, handheld device is communicated with field apparatus using session key.
4. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 2 and certification, its feature
It is that the symmetric encipherment algorithm is completed by the encryption chip inside field apparatus.
5. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature
It is that the communication process of step A5 to the A7 is carried out in the addition transmitting-receiving time slot of the field apparatus.
6. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 1 and certification, its feature
It is that the handheld device is by adding the method for the network:
B1. handheld device starts configuration process after user input configuring cipher key success, and selects to add WIA-PA network;
B2. handheld device monitors the broadcast of field apparatus and routing device under specified network number and channel, and search can build
The routing device of vertical connection, if comprising multiple routing devices that can set up connection, according to jumping figure, signal intensity and load because
Element, selects optimal routing device;
B3. handheld device carries out time synchronized with routing device, determines the addition transmitting-receiving time slot of selected routing device;
B4. handheld device generates the networking message identifying of encryption, and is sent to the routing device;
B5. the routing device is received after the networking message identifying of handheld device, is entered using the addition key of oneself in link layer
Row decryption, extracts the addition key of handheld device after decryption, compare the addition key of handheld device and the addition of routing device
Whether key is identical, if the same thinks that handheld device possesses the qualification for adding WIA-PA network, is that handheld device distribution is logical
Letter time slot, by the message with Link data structures handheld device is sent to after link layer encryption;The routing device is by handss
The public key of holding equipment is added in list of public keys, after updating list of public keys, selects idle time slot to be sent to list of public keys
All nodes in WIA-PA network;
B6. handheld device is received after the response message of the routing device, that is, be added to WIA-PA network.
7. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 6 and certification, its feature
It is that the addition key and public key that the networking message identifying includes handheld device is simultaneously entered in link layer using symmetric encipherment algorithm
Row encryption, encryption key is the addition key of handheld device.
8. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 6 and certification, its feature
It is that the method that the handheld device is communicated with the field apparatus is:
When handheld device needs to send data to field apparatus, in list of public keys, the public key of the field apparatus is searched, used
Public key is encrypted to application layer data, is then encrypted in link layer using the addition key of handheld device, after encryption
Data message be sent to and set up the routing device that is connected with handheld device;
The routing device is received after above-mentioned data message, is decrypted using the addition key RKJ of routing device in link layer, decryption
Determine after next-hop routing device afterwards, be encrypted using the addition key RKJ of routing device in link layer, be then issued to described
Next-hop routing device, the like, until data message is sent to into the handheld device field apparatus to be communicated;
Field apparatus is received after the data message, is decrypted using the addition key of oneself in link layer, determines the data
Message is destined to after oneself, is decrypted using the private key of oneself in application layer, and be applied a layer message.
9. the communication means of the WIA-PA network handheld device of multi-level encryption according to claim 6 and certification, its feature
It is that the communication process of step B4 to the B6 is carried out in the addition transmitting-receiving time slot of selected routing device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210555911.1A CN103888940B (en) | 2012-12-19 | 2012-12-19 | Multi-level encryption and authentication type WIA-PA network handheld device communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210555911.1A CN103888940B (en) | 2012-12-19 | 2012-12-19 | Multi-level encryption and authentication type WIA-PA network handheld device communication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103888940A CN103888940A (en) | 2014-06-25 |
CN103888940B true CN103888940B (en) | 2017-05-10 |
Family
ID=50957624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210555911.1A Active CN103888940B (en) | 2012-12-19 | 2012-12-19 | Multi-level encryption and authentication type WIA-PA network handheld device communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103888940B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014112611A1 (en) * | 2014-09-02 | 2016-03-03 | Endress + Hauser Conducta Gesellschaft für Mess- und Regeltechnik mbH + Co. KG | Method for authenticating at least one first unit to at least one second unit |
CN104507175B (en) * | 2015-01-13 | 2017-12-01 | 重庆邮电大学 | A kind of method of WIA PA network hand-holds equipment Network with Random Multiple Access System |
CN104852982B (en) * | 2015-05-18 | 2018-04-27 | 重庆邮电大学 | A kind of direct-connected method of WIA-PA network handheld device and field device based on Keep-alive frames |
DE102015121861A1 (en) * | 2015-12-15 | 2017-06-22 | Endress + Hauser Flowtec Ag | Access key for a field device |
CN105744524B (en) * | 2016-05-06 | 2019-03-22 | 重庆邮电大学 | Mobile device networking authentication method in a kind of WIA-PA industry wireless network |
CN109493580A (en) * | 2017-09-11 | 2019-03-19 | 奥维飞越通信有限公司 | One kind being based on WIA-PA Multifunctional hand-held machine control system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754423A (en) * | 2008-12-19 | 2010-06-23 | 中国科学院沈阳自动化研究所 | Industrial wireless communication method based on IEEE802.15.4 |
WO2012014008A1 (en) * | 2010-07-30 | 2012-02-02 | Abb Research Ltd | A method and a system for localization in industrial wireless sensor network |
-
2012
- 2012-12-19 CN CN201210555911.1A patent/CN103888940B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754423A (en) * | 2008-12-19 | 2010-06-23 | 中国科学院沈阳自动化研究所 | Industrial wireless communication method based on IEEE802.15.4 |
WO2012014008A1 (en) * | 2010-07-30 | 2012-02-02 | Abb Research Ltd | A method and a system for localization in industrial wireless sensor network |
Non-Patent Citations (3)
Title |
---|
WIA-PA 网络的入网认证和密钥更新机制研究;王浩;《PROCESS AUTOMATION INSTRUMENTATION》;20110731;第32卷;全文 * |
WIA-PA: 用于过程自动化的工业无线网络系统;梁炜;《Technology of Industrial Wireless Communication》;20090228;全文 * |
WIA-PA网络安全通信协议栈研究与实现;张萱;《中国优秀硕士学位论文全文数据库信息科技辑》;20101215;正文10-19页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103888940A (en) | 2014-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cao et al. | Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks | |
CN103888940B (en) | Multi-level encryption and authentication type WIA-PA network handheld device communication method | |
CN101159748B (en) | Entity authentication method in wireless sensor network | |
CN104780069B (en) | A kind of key-course towards SDN and data Layer communication port self-configuration method and its system | |
CN101420686B (en) | Industrial wireless network security communication implementation method based on cipher key | |
Healy et al. | Security for wireless sensor networks: A review | |
CN102546184B (en) | Method and system for message secure transmission or key distribution in sensor network | |
CN102869007A (en) | Safety algorithm negotiation method, device and network system | |
CN101282208B (en) | Method for updating safety connection association master key as well as server and network system | |
CN108882238A (en) | A kind of lightweight rotation ca authentication method in mobile ad hoc network based on common recognition algorithm | |
Chen et al. | A dynamic-encryption authentication scheme for M2M security in cyber-physical systems | |
Wang et al. | KeyRev: An efficient key revocation scheme for wireless sensor networks | |
Uluagac et al. | Designing secure protocols for wireless sensor networks | |
Saraswathi et al. | Dynamic and probabilistic key management for distributed wireless sensor networks | |
WO2004102871A1 (en) | A process for secure communication over a wireless network, related network and computer program product | |
Ambili et al. | A secure software defined networking based framework for IoT networks | |
CN106888083A (en) | Internet of Things the following group key generation method and communication node | |
Soroush et al. | Providing transparent security services to sensor networks | |
CN105981028A (en) | Network element authentication in communication networks | |
Abraham et al. | An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks | |
Min et al. | Research and implementation of the security method based on WIA-PA standard | |
CN101646172B (en) | Method and device for generating key in distributed MESH network | |
Wei et al. | Research and implementation on the security scheme of industrial wireless network | |
Fulare et al. | Secure authentication technique in wireless integrated sensor network: Virtual certificate authority | |
Falk et al. | Industrial sensor network security architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |