CN104270751A - Security protocol based on received signal intensity in wireless sensor network - Google Patents

Security protocol based on received signal intensity in wireless sensor network Download PDF

Info

Publication number
CN104270751A
CN104270751A CN201410160428.2A CN201410160428A CN104270751A CN 104270751 A CN104270751 A CN 104270751A CN 201410160428 A CN201410160428 A CN 201410160428A CN 104270751 A CN104270751 A CN 104270751A
Authority
CN
China
Prior art keywords
node
aggregation
data
key
aggregation node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410160428.2A
Other languages
Chinese (zh)
Other versions
CN104270751B (en
Inventor
李哲涛
易昌
朱更明
王志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiangtan University
Original Assignee
Xiangtan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiangtan University filed Critical Xiangtan University
Priority to CN201410160428.2A priority Critical patent/CN104270751B/en
Publication of CN104270751A publication Critical patent/CN104270751A/en
Application granted granted Critical
Publication of CN104270751B publication Critical patent/CN104270751B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/248Connectivity information update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a security protocol based on received signal intensity in a wireless sensor network, specifically to secure routing and key management. According to the number of adjacent nodes, the intensity of received signals and the energy value thereof, a convergent node is selected by a convergent node selection equation. According to the number of the adjacent nodes and the throughput of the convergent node, a hot zone is determined by a hot zone selection equation. By comparing the feature similarity between collected data and pre-stored abnormal data, abnormal data is detected. An inter-node session key is generated dynamically, and according to whether a hot zone is determined, different keys are selected to generate a function. The key and data are encrypted in a manner of combining a public key cipher mechanism and a symmetric cipher mechanism. The security protocol improves flexibility of a key, enhances the rationality for selecting a convergent node and well ensures safe transmission of inter-node data.

Description

Based on the safety guarantee agreement of received signal strength in wireless sensor network
Technical field
The present invention relates to the foundation of Security routing and the management of dynamic key, belong to wireless communication technology field.
Technical background
Wireless sensor network (Wireless Sensor Networks, WSN) forms, by cooperation mode perception, collection, process and transmission of monitoring data by being deployed in cheap micro wireless sensor nodes a large amount of in monitored area.WSN is usually operated in rugged environment, has between node and links the characteristics such as fragility, topological structure dynamic change.Therefore, wireless sensor network easily suffers various types of attack, thus set up Security routing and data key management imperative.
Public key cryptography mechanism principle is separated with decruption key by encryption key.Key generates in pairs, and often pair of key is made up of a PKI and a private key.Key is longer, and cipher round results is better, but the expense of encrypting and decrypting is larger.Symmetric Cryptography is then adopt identical key to be encrypted deciphering, and encryption/decryption speed is fast, and expense is little.For wireless sensor network, how to utilize public key cryptography mechanism and Symmetric Cryptography that key and data are delivered to the hot issue that aggregation node becomes Data Collection in WSN safely.
Consider that node is generally deployed in deathtrap, in the face of various complex situations, therefore need will set abnormality detection mechanism in node, with attacking ability of improving the precaution, ensure data reliability.Because node energy is limited, the equilibrium assignment of energy becomes key issue, therefore according to dump energy Dynamic Selection aggregation node, need ensure the reasonability that aggregation node is selected.Sensor node is in practice, and because Node distribution is uneven, perception data amount varies in size, therefore dynamically need judge hot-zone.For transmitting procedure, the mode adopting public key cryptography mechanism and Symmetric Cryptography to combine, contributes to the safety ensureing data and key.
For above situation, patent of the present invention achieves the safe transmission etc. of aggregation node Dynamic Selection, the Dynamic Selection of hot-zone, data and key, devises the wireless sensor network protocols that has more fail safe.
Summary of the invention
For solving the problems referred to above in wireless sensor network, the foundation of Security routing and dynamic key management way combine by the present invention, form highly effective and safe agreement.
1, the foundation of Security routing, comprises following prerequisite, definition and step.
Prerequisite is as follows:
1) base-station node is safe, can not be counterfeiting;
2) N number of sensing node { S is had at zone of ignorance 1, S 1..., S n, each sensor node has unique ID number, between node mutually uncorrelated (node independently can determine perception data);
3) characteristic value of pre-stored data exception in each node, for detecting by suspecting node.
Be defined as follows:
1) broadcast singal sends the form of message:
Source address Destination address Current time Communication flows Jumping figure
2) aggregation node is responsible for the data of collecting all the sensors node perceived, and communicates with control centre;
3) node sets t interval time, for calculating the throughput of aggregation node in the t time;
4) node pre-sets the threshold value converging selective factor B is F th, hot-zone selective factor B threshold value be D th, aggregation node dump energy threshold value is E thbe Y with the threshold value of data exception characteristic similarity th;
5) update time of setting network aggregation node is T.
Step comprises detection three aspects of the selection of aggregation node, the selection of hot-zone and data exception:
One, the selection step of aggregation node is as follows:
1) all nodes send broadcast to its neighbor node;
2) neighbor node is according to the broadcast received, and obtains the intensity of Received signal strength, the source of signal and direction, and calculates the particular location of self according to beaconing nodes (base station) orientation;
3) all nodes are according to neighbor node number, received signal strength and self-energy value, utilize aggregation node to select formulae discovery aggregation node selective factor B θ, if θ is greater than F th, then transfer aggregation node to from ordinary node, otherwise remain ordinary node.Aggregation node selects formula as follows:
Wherein, θ represents the convergence selective factor B of node; E represents this node energy value; N represents this nodes neighbors nodes: represent the neighbor node received signal strength sum of this node; represent weight coefficient, size depends on the emphasis of practical application, if then using the neighbor node received signal strength sum of this node as paying the utmost attention to item;
4) aggregation node chosen after, its neighbor node determines the aggregation node of subordinate according to the signal strength signal intensity of the information of reception, and completes and shake hands with aggregation node, sets up network topology.Meanwhile, aggregation node is by periodic test self-energy, if dump energy is lower than threshold value E th, then broadcast is sent, according to the 3rd to neighbor node) and step reselects aggregation node.
Two, the selection step of hot-zone is as follows:
1) according to aggregation node selected in step one, by the throughput of aggregation node in certain hour t and neighbor node number, hot-zone is utilized to judge formulae discovery hot-zone selective factor B π, if π is greater than D th, be then hot-zone, otherwise be general area.Hot-zone judges that formula is as follows:
π = ∂ n + ( 1 - ∂ ) Data
Wherein, π represents the hot-zone selective factor B of aggregation node; N represents the neighbor node number of this aggregation node; Data represents the throughput of this aggregation node in certain hour t; represent weight coefficient, size depends on the emphasis of practical application, if then using the neighbor node number of this aggregation node as paying the utmost attention to item;
2) if be judged to be hot-zone, resetting the aggregation node update cycle is T ', wherein T ' <T, accelerates aggregation node and selects, real-time update aggregation node.
Three, the detecting step of data exception is as follows:
1) feature of the feature of node image data and pre-stored data exception is contrasted, utilize calculating formula of similarity to obtain abnormal nodes selective factor B ξ, if ξ is greater than threshold value Y th, then suspect node for being subject to, and this node will notify its neighbor node, otherwise remain ordinary node.Calculating formula of similarity is as follows:
&xi; = &Sigma; i = 1 m 1 &Sigma; j = 1 m 2 ( SubS tr i &CirclePlus; Str j )
Wherein, ξ represents the abnormal selective factor B of node; m 1represent the substring number of node image data; m 2represent node pre-stored data unusual character string number; SubStr irepresent i-th substring of node image data; Str jrepresent that node prestores the jth character string of abnormal data;
2) after being subject to the neighbor node suspecting node to obtain the data exception testing result of himself, if abnormal data, then abnormality detection result feeds back to by suspecting node by this node, if the feedback result number receiving neighbor node by suspection node is greater than 1/2 of neighbor node sum, be then infected node, otherwise remain ordinary node;
3) if be defined as infected node, then isolate this node, if this infected node is aggregation node, then utilize aggregation node to select step to reselect aggregation node.
2, the foundation of key management, comprises following prerequisite and step.
Prerequisite is as follows:
1) all node initializing keys are K n, for broadcast, choose aggregation node and realize the dynamic interpolation of new node;
2) all node initializing keys are K eand K p, be represent PKI and private key respectively, for public key cryptography mechanism.
Step is as follows:
1) sending node is with key K nencryption its temporal information T 1with the throughput Data of aggregation node in certain hour t of its subordinate, and enciphered message is sent to receiving node;
2) receiving node is according to key K nthe information that deciphering receives, obtains its temporal information T simultaneously 2, whether be hot-zone according to convergence region, utilize different F () functions dynamically to generate different session key K d.If convergence region is hot-zone, then F () function is according to the temporal information (T of two nodes 1, T 2) and the throughput Data of aggregation node in certain hour t of sending node subordinate, session key K d=F (F (T 1, T 2), Data); If convergence region is general area, then F () function is according to the temporal information (T of two nodes 1, T 2), session key K d=F (T 1, T 2);
3) receiving node calculates session key K dafter, adopt PKI K eencrypted session key K d, and by the K after encryption dsend to sending node;
4) sending node obtains the K after encrypting d, by private key K pdecrypt key K d, then with K dfor key uses Symmetric Cryptography coded communication packet, and send to receiving node;
5) receiving node is according to key K d, decrypting communication data bag, obtains wherein information.
Advantage of the present invention:
1) in existing WSN, because N node need pre-install N-1 key, and this agreement does not need to predict nodes, can meet the key pair process of conventional need, reduce the space of storage key;
2) this Protocol Through Network topological structure has adaptivity, prestored secret key K in node n, can achieve the dynamic interpolation of new node, supplementing failure node, ensures the persistence to this area monitoring;
3) this agreement adopts anomaly data detection mechanism, can complete the isolation to infected node exactly, prevent malicious data from attacking;
4) adopt aggregation node selection algorithm and periodically update aggregation node, ensure that the reasonability that aggregation node exists;
5) mode adopting public key cryptography mechanism and Symmetric Cryptography to combine, ensures the transmission security of key and data;
6) for the data of different stage and the data in dissimilar convergence region, adopt different function session key generation, ensure the safety of inter-node communication.
Accompanying drawing explanation
Fig. 1: aggregation node selects flow chart;
Fig. 2: hot-zone Establishing process figure;
Fig. 3: key management algorithm schematic diagram;
Fig. 4: node abnormality detection mechanism flow chart.
Embodiment
In order to solve the safety problem in wireless sensor network, the foundation of Security routing and dynamic key management way combine by the present invention, form highly effective and safe agreement.In order to realize the above results, key step of the present invention is as follows:
Shown in composition graphs 1, known aggregation node and hot-zone establishment step:
1) there is N number of node for zone of ignorance, utilize prestored secret key K nbroadcast encryption, data content has 5;
2) send data message format and example as follows:
3) each node is with key K nthe message that deciphering receives, then according to neighbor node number, received signal strength and self-energy value, utilize aggregation node to select formulae discovery aggregation node selective factor B θ, if θ is greater than F th, then transfer aggregation node to from ordinary node, otherwise remain ordinary node.Aggregation node selects formula as follows:
Wherein, θ represents the convergence selective factor B of node; E represents this node energy value; N represents this nodes neighbors nodes; represent the neighbor node received signal strength sum of this node; represent weight coefficient, size depends on the emphasis of practical application, if then using the neighbor node received signal strength sum of this node as paying the utmost attention to item;
4) aggregation node chosen after, its neighbor node determines the aggregation node of subordinate according to the signal strength signal intensity of the information of reception, and completes and shake hands with aggregation node, sets up network topology.Meanwhile, aggregation node is by periodic test self-energy, if dump energy is lower than threshold value E th, then broadcast is sent, according to the 3rd to neighbor node) and step reselects aggregation node.
Shown in composition graphs 2, known hot-zone Establishing process step is as follows:
1) according to the throughput of aggregation node in certain hour t and neighbor node number, hot-zone is utilized to judge formulae discovery hot-zone selective factor B π, if π is greater than D th, be then hot-zone, otherwise be general area.Hot-zone judges that formula is as follows:
&pi; = &PartialD; n + ( 1 - &PartialD; ) Data
Wherein, π represents the hot-zone selective factor B of aggregation node; N represents the neighbor node number of this aggregation node; Data represents the throughput of this aggregation node in certain hour t; represent weight coefficient, size depends on the emphasis of practical application, if then using the neighbor node number of this aggregation node as paying the utmost attention to item;
2) if be judged to be hot-zone, resetting the aggregation node update cycle is T ', and meets T ' <T, accelerates aggregation node and selects, real-time update aggregation node.
Shown in composition graphs 3, known dynamic key management process step:
1) suppose that sending node A transmits data to reception receiving node B, then sending node A is with key K nencryption its temporal information T 1with the throughput Data of aggregation node in certain hour t of its subordinate, and enciphered message is sent to receiving node B;
2) receiving node B is according to key K nresolve the data received, obtain its temporal information T simultaneously 2, whether being hot-zone for convergence region, dynamically producing different session key K by utilizing different F () functions d.If convergence region is hot-zone, then F () function is according to the temporal information (T of two nodes 1, T 2) and the throughput Data of aggregation node in certain hour t of sending node subordinate, session key K d=F (F (T 1, T 2), Data); If convergence region is general area, then F () function is according to the temporal information (T of two nodes 1, T 2), session key K d=F (T 1, T 2);
3) receiving node B calculates session key K dafter, adopt PKI K eencrypted session key K d, and by the K after encryption dsend to sending node A, ensure the fail safe of key at inter-node transmission;
4) sending node A obtains the K after encrypting d, by private key K pdecrypt key K d, then with K dfor key uses Symmetric Cryptography coded communication packet, and send to receiving node B, ensure the reliability of data at inter-node transmission;
5) receiving node B is according to key K d, decrypting communication data bag, obtains wherein information.
Shown in composition graphs 4, known node abnormality detection mechanism process step:
1) feature of the feature of node image data and pre-stored data exception is contrasted, utilize calculating formula of similarity to obtain abnormal nodes selective factor B ξ, if ξ is greater than threshold value Y th, then suspect node for being subject to, and this node will notify its neighbor node, otherwise remain ordinary node.Calculating formula of similarity is as follows:
&xi; = &Sigma; i = 1 m 1 &Sigma; j = 1 m 2 ( SubS tr i &CirclePlus; Str j )
Wherein, ξ represents the abnormal selective factor B of node; m 1represent the substring number of node image data; m 2represent node pre-stored data unusual character string number; SubStr irepresent i-th substring of node image data; Str jrepresent that node prestores the jth character string of abnormal data;
2) after being subject to the neighbor node suspecting node to obtain the data exception testing result of himself, if abnormal data, then abnormality detection result feeds back to by suspecting node by this node, if the feedback result number receiving neighbor node by suspection node is greater than 1/2 of neighbor node sum, be then infected node, otherwise remain ordinary node;
3) if be defined as infected node, then isolate this node, if this infected node is aggregation node, then utilize aggregation node to select step to reselect aggregation node.

Claims (2)

1. in wireless sensor network based on the safety guarantee agreement of received signal strength, it is characterized in that the foundation of Security routing, described method comprises following prerequisite, definition and step.
Prerequisite is as follows:
1) base-station node is safe;
2) N number of sensing node { S is had at zone of ignorance 1, S 2..., S n, each sensor node has unique ID number, between node mutually uncorrelated (node independently can determine perception data);
3) characteristic value of pre-stored data exception in each node.
Be defined as follows:
1) broadcast singal sends the form of message:
Source address Destination address Current time Communication flows Jumping figure
2) aggregation node is responsible for the data of collecting all the sensors node perceived, and communicates with control centre;
3) node sets t interval time, for calculating the throughput of aggregation node in the t time;
4) node pre-sets the threshold value converging selective factor B is F th, hot-zone selective factor B threshold value be D th, aggregation node dump energy threshold value is E thbe Y with the threshold value of data exception characteristic similarity th;
5) update time of setting network aggregation node is T.
Step comprises detection three aspects of the selection of aggregation node, the selection of hot-zone and data exception:
One, the selection step of aggregation node is as follows:
1) all nodes send broadcast to its neighbor node;
2) neighbor node is according to the broadcast received, and obtains the intensity of Received signal strength, the source of signal and direction, and calculates the particular location of self according to beaconing nodes (base station) orientation;
3) all nodes are according to neighbor node number, received signal strength and self-energy value, utilize aggregation node to select formulae discovery aggregation node selective factor B θ, if θ is greater than F th, then transfer aggregation node to from ordinary node, otherwise remain ordinary node.Aggregation node selects formula as follows:
Wherein, θ represents the convergence selective factor B of node; E represents this node energy value; N represents this nodes neighbors nodes; represent the neighbor node received signal strength sum of this node; represent weight coefficient,
4) aggregation node chosen after, its neighbor node determines the aggregation node of subordinate according to the signal strength signal intensity of the information of reception, and completes and shake hands with aggregation node, sets up network topology.Meanwhile, aggregation node is by periodic test self-energy, if dump energy is lower than threshold value E th, then broadcast is sent, according to the 3rd to neighbor node) and step reselects aggregation node.
Two, the selection step of hot-zone is as follows:
1) according to aggregation node selected in step one, by the throughput of aggregation node in certain hour t and neighbor node number, hot-zone is utilized to judge formulae discovery hot-zone selective factor B π, if π is greater than D th, be then hot-zone, otherwise be general area.Hot-zone judges that formula is as follows:
&pi; = &PartialD; n + ( 1 - &PartialD; ) Data
Wherein, π represents the hot-zone selective factor B of aggregation node; N represents the neighbor node number of this aggregation node; Data represents the throughput of this aggregation node in certain hour t; represent weight coefficient,
2) if be judged to be hot-zone, reset upgrade aggregation node cycle T ', wherein T ' <T, accelerates aggregation node and selects, real-time update aggregation node.
Three, the detecting step of data exception is as follows:
1) feature of the feature of node image data and pre-stored data exception is contrasted, utilize calculating formula of similarity to obtain abnormal nodes selective factor B ξ, if ξ is greater than threshold value Y th, then suspect node for being subject to, and this node will notify its neighbor node, otherwise remain ordinary node.Calculating formula of similarity is as follows:
&xi; = &Sigma; i = 1 m 1 &Sigma; j = 1 m 2 ( SubS tr i &CirclePlus; Str j )
Wherein, ξ represents the abnormal selective factor B of node; m 1represent the substring number of node image data; m 2represent node pre-stored data unusual character string number; SubStr irepresent i-th substring of node image data; Str jrepresent that node prestores the jth character string of abnormal data;
2) after being subject to the neighbor node suspecting node to obtain the data exception testing result of himself, if abnormal data, then abnormality detection result feeds back to by suspecting node by this node, if the feedback result number receiving neighbor node by suspection node is greater than 1/2 of neighbor node sum, be then infected node, otherwise remain ordinary node;
3) if be defined as infected node, then isolate this node, if this infected node is aggregation node, then utilize aggregation node to select step to reselect aggregation node.
2. in wireless sensor network based on the safety guarantee agreement of received signal strength, it is characterized in that the foundation of key management, comprise following prerequisite and step.
Prerequisite is as follows:
1) all node initializing keys are K n;
2) all node initializing keys are K eand K p, be represent PKI and private key respectively.
Step is as follows:
1) sending node is with key K nencryption its temporal information T 1with the throughput Data of aggregation node in certain hour t of its subordinate, and enciphered message is sent to receiving node;
2) receiving node is according to key K nthe information that deciphering receives, obtains its temporal information T simultaneously 2, determine whether that converging region is hot-zone, adopts different F () functions dynamically to generate different session key K for step 2 in right 1 d.If convergence region is hot-zone, then F () function is according to the temporal information (T of two nodes 1, T 2) and the throughput Data of aggregation node in certain hour t of sending node subordinate, session key K d=F (F (T 1, T 2), Data); If convergence region is general area, then F () function is according to the temporal information (T of two nodes 1, T 2), session key K d=F (T 1, T 2);
3) receiving node calculates session key K dafter, adopt PKI K eencrypted session key K d, and by the K after encryption dsend to sending node;
4) sending node obtains the K after encrypting d, by private key K pdecrypt key K d, then with K dfor key uses Symmetric Cryptography coded communication packet, send to receiving node;
5) receiving node is according to key K d, decrypting communication data bag, obtains wherein information.
CN201410160428.2A 2014-04-19 2014-04-19 Safety guarantee agreement based on received signal strength in wireless sensor network Expired - Fee Related CN104270751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410160428.2A CN104270751B (en) 2014-04-19 2014-04-19 Safety guarantee agreement based on received signal strength in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410160428.2A CN104270751B (en) 2014-04-19 2014-04-19 Safety guarantee agreement based on received signal strength in wireless sensor network

Publications (2)

Publication Number Publication Date
CN104270751A true CN104270751A (en) 2015-01-07
CN104270751B CN104270751B (en) 2017-12-08

Family

ID=52162222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410160428.2A Expired - Fee Related CN104270751B (en) 2014-04-19 2014-04-19 Safety guarantee agreement based on received signal strength in wireless sensor network

Country Status (1)

Country Link
CN (1) CN104270751B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184187A (en) * 2015-08-18 2015-12-23 重庆大学 Encrypting method and decrypting method of computer memorizer
CN105959281A (en) * 2016-04-29 2016-09-21 腾讯科技(深圳)有限公司 File encrypted transmission method and device
CN108173641A (en) * 2018-02-11 2018-06-15 福州大学 A kind of Zigbee safety communicating methods based on RSA
CN109495304A (en) * 2018-11-19 2019-03-19 中国科学院信息工程研究所 A kind of dispositions method and device of aggregation node
CN109802974A (en) * 2018-12-21 2019-05-24 北京理工大学 A kind of unidirectional safe transmission method of data based on public key cryptography
CN110035008A (en) * 2018-01-11 2019-07-19 中国科学院声学研究所 A kind of content distribution method based on coverage rate dynamic adjustment in node Ad Hoc network
CN112804118A (en) * 2020-12-31 2021-05-14 广州技象科技有限公司 Data transmission method and device based on data jump transmission link of intelligent electric meter

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478751A (en) * 2009-01-16 2009-07-08 南京邮电大学 Energy optimized safe routing method
CN102036308A (en) * 2010-12-09 2011-04-27 江南大学 Energy balancing wireless sensor network clustering method
CN102665251A (en) * 2012-05-25 2012-09-12 重庆大学 WSN (Wireless Sensor Network) distributed-type non-uniform clustering method
CN103298054A (en) * 2013-06-04 2013-09-11 四川大学 Wireless sensor network cluster routing protocol based on node depth

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478751A (en) * 2009-01-16 2009-07-08 南京邮电大学 Energy optimized safe routing method
CN102036308A (en) * 2010-12-09 2011-04-27 江南大学 Energy balancing wireless sensor network clustering method
CN102665251A (en) * 2012-05-25 2012-09-12 重庆大学 WSN (Wireless Sensor Network) distributed-type non-uniform clustering method
CN103298054A (en) * 2013-06-04 2013-09-11 四川大学 Wireless sensor network cluster routing protocol based on node depth

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杨光: "无线传感器网络安全路由协议研究", 《中国优秀博士学位论文全文数据库信息科技辑》 *
肖刘军: "基于节点位置和能量的无线传感器网络分簇路由协议研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184187A (en) * 2015-08-18 2015-12-23 重庆大学 Encrypting method and decrypting method of computer memorizer
CN105959281A (en) * 2016-04-29 2016-09-21 腾讯科技(深圳)有限公司 File encrypted transmission method and device
CN110035008A (en) * 2018-01-11 2019-07-19 中国科学院声学研究所 A kind of content distribution method based on coverage rate dynamic adjustment in node Ad Hoc network
CN110035008B (en) * 2018-01-11 2020-08-18 中国科学院声学研究所 Content distribution method based on coverage rate dynamic adjustment in node ad hoc network
CN108173641A (en) * 2018-02-11 2018-06-15 福州大学 A kind of Zigbee safety communicating methods based on RSA
CN109495304A (en) * 2018-11-19 2019-03-19 中国科学院信息工程研究所 A kind of dispositions method and device of aggregation node
CN109802974A (en) * 2018-12-21 2019-05-24 北京理工大学 A kind of unidirectional safe transmission method of data based on public key cryptography
CN109802974B (en) * 2018-12-21 2021-01-01 北京理工大学 One-way safe data transmission method based on public key cryptography
CN112804118A (en) * 2020-12-31 2021-05-14 广州技象科技有限公司 Data transmission method and device based on data jump transmission link of intelligent electric meter
CN112804118B (en) * 2020-12-31 2023-01-31 广州技象科技有限公司 Data transmission method and device based on intelligent ammeter data jump transmission link

Also Published As

Publication number Publication date
CN104270751B (en) 2017-12-08

Similar Documents

Publication Publication Date Title
CN104270751B (en) Safety guarantee agreement based on received signal strength in wireless sensor network
Bharathi et al. Node capture attack in Wireless Sensor Network: A survey
CN105187200A (en) Method For Generating A Key In A Network And User On A Network And Network
Thamizhmaran et al. Performance analysis of on-demand routing protocol for MANET using EA3ACK algorithm
Mishra et al. Security against black hole attack in wireless sensor network-a review
Kaushik et al. Intrusion detection and security system for blackhole attack
Madhurya et al. Implementation of enhanced security algorithms in mobile ad hoc networks
Ambika SYSLOC: hybrid key generation in sensor network
Sandhiya et al. Adaptive ACKnowledgement technique with key exchange mechanism for MANET
Kulkarni et al. Considering security for ZigBee protocol using message authentication code
Rajalakshmi et al. A Survey of intrusion detection with higher malicious misbehavior detection in Manet
Prathap et al. CPMTS: Catching packet modifiers with trust support in wireless sensor networks
Patil et al. Improved acknowledgement intrusion detection system in MANETs using hybrid cryptographic technique
Kamalesh et al. Fuzzy based secure intrusion detection system for authentication in wireless sensor networks
Deepa et al. Adoption of Hybrid Cryptography in an Acknowledgement Based Intrusion Detection System for Manets
Jariwala et al. Integrity and privacy preserving secure data aggregation in wireless sensor networks
Al-taha Symmetric key management scheme for hierarchical wireless sensor networks
Kumaratharan et al. A survey on improved PSO routing and clustering in WSN
Gaikwad et al. Comparative analysis of hop-to-hop and end-to-end secure communication
KR20090061372A (en) System and method for guarding and detecting intrusion using two level clustering in wireless senser network
Gonugunta Tulasi SECURE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS: AGAINST PACKET DROPPING ATTACKS‖
Al-taha et al. Lightweight key management scheme for hierarchical wireless sensor networks
Shantilal Self-healing sensor network key distribution scheme for secure communication
Dudnik et al. METHODS OF DETERMINATION OF INTERFERENCES IN WIRELESS COMPUTER NETWORKS
Dudnik et al. CHAPTER «ENGINEERING SCIENCES»

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171208