CN101072096A - Data safety transmission method for wireless sensor network - Google Patents

Data safety transmission method for wireless sensor network Download PDF

Info

Publication number
CN101072096A
CN101072096A CN 200710099880 CN200710099880A CN101072096A CN 101072096 A CN101072096 A CN 101072096A CN 200710099880 CN200710099880 CN 200710099880 CN 200710099880 A CN200710099880 A CN 200710099880A CN 101072096 A CN101072096 A CN 101072096A
Authority
CN
China
Prior art keywords
centroid
authentication code
device node
data
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200710099880
Other languages
Chinese (zh)
Other versions
CN100581102C (en
Inventor
聂欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weixunzijing Tech Co., Ltd., Beijing
Original Assignee
WEIXUNZIJING SCIENCE AND TECHNOLOGY Co Ltd BEIJING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WEIXUNZIJING SCIENCE AND TECHNOLOGY Co Ltd BEIJING filed Critical WEIXUNZIJING SCIENCE AND TECHNOLOGY Co Ltd BEIJING
Priority to CN 200710099880 priority Critical patent/CN100581102C/en
Publication of CN101072096A publication Critical patent/CN101072096A/en
Priority to PCT/CN2008/071089 priority patent/WO2008145059A1/en
Priority to US12/601,987 priority patent/US20100293379A1/en
Application granted granted Critical
Publication of CN100581102C publication Critical patent/CN100581102C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Network user determines master key, and inputs it to central node and equipment node. After authorizing each other between central node and equipment node, central node generates new session key, and sends it to equipment node. When communication is carried out between central node and equipment node, data-sending party uses new session key to carry out encryption and authentication of data integrality for transmitted data; data-receiving party uses new session key to decrypt data, and validate data integrality. Advantages are that in precondition of not influencing security performance of network, the method reduces amount of calculation and communication overhead, solves authorization between central node and equipment nodes. The invention discloses method for generating, transmitting and updating encryption key as well as encrypting transmitted data and authenticating data integrality so as to guarantee security of data transmission in wireless sensor network.

Description

The method of data security transmission in a kind of wireless sensor network
Technical field
The present invention relates to the method for data security transmission in a kind of wireless sensor network, belong to wireless communication technology field.
Background technology
Wireless sensor network is a kind of system of RFDC, and the basic composition unit of wireless sensor network is a node, and node utilizes transceiver to carry out the transmission of data in wireless channel.Node in the wireless sensor network is divided into two classes: Centroid and device node.
Typical device node is made up of data acquisition unit, data processing unit, data transmission unit and power supply four parts.Data collection module is generally transducer, and type of sensor is by the physical form decision of monitored signal.Data acquisition unit is collected the information of surrounding environment, under the control of data processing unit, sends to Centroid by data transmission unit.
Centroid is the interface that connects other Exterior Communications Systems such as wireless sensor network and the Internet, the data that Centroid is collected device node by the Internet send to the user in a distant place, equally, the user also can send to Centroid with control command by other communication systems such as the Internets, and Centroid is realized the control of user to network to the device node forward command.Compare with device node, Centroid generally has stronger computing capability and more system resources.
Wireless sensor network all has in fields such as environmental monitoring, space exploration, rescue and relief work, Smart Homes more widely to be used.But the node of wireless sensor network generally has following feature: at first, and the finite energy of economize on electricity.Energy is restriction sensing node ability, the topmost restrictive condition in life-span, and existing sensing node generally all is to power by battery, and can not charge again.Secondly, the computing capability of economize on electricity is limited.The node cpu of sensor network generally only has the disposal ability of 8bit, 4MHz~8MHz.In addition, the memory space of node is also very limited.Use the transmission of wire transmission medium point-to-point different with cable network, wireless sensor network uses wireless medium to adopt the form transmission signals of broadcasting.Because the opening of wireless transmission medium, therefore the node within signal cover can be received signal, and other nodes can be eavesdropped, modification and retransmission of information, the threat data transmission safety.Therefore, need to adopt certain methods to guarantee the wireless sensor network data transmission safety, these methods relate generally to mandate, encryption and data integrity authentication.
Mandate is meant that two nodes confirm the process of the other side's legal identity mutually.Authorize the exchange that generally can relate to information between two nodes in order to prove the other side's legitimacy.After the legal identity of license confirmation, just can carry out the communication of data after the node both sides relation of breaking the wall of mistrust.
Be encrypted as with data message promptly expressly be converted to can not identification form be the process of ciphertext.Changing ciphertext into expressly process deciphers exactly.Encryption system all comprises following four parts usually: expressly, need ciphered data; Ciphertext is encrypted the data that the back generates; Cryptographic algorithm; Key, character string with length-specific or numeric string with cryptographic algorithm is used are used to control the encryption and decryption process.Transmit leg is given the recipient with ciphertext by some transmission medium.Ciphertext may be that the third party intercepts and eavesdrops by illegal user, but as long as the third party does not have key, can only obtain the cipher-text information that some can't understand meaning, thereby guarantee data transmission safety.
The data integrity authentication in order to guarantee to transmit the safety of data, does not only allow the third party to know data content, does not also allow the third party to revise the content of data.Can reach this purpose by the data of transmission being carried out the data integrity authentication.The general one-way hash function (being one-way Hash function again) that adopts carries out the data integrity authentication.The data integrity authentication is " summary " of the clear content generation regular length of authentication as required, and this section " summary " is called message authentication code (MAC, MessageAuthentication Code).The MAC difference that different plaintexts generates, and the MAC that the phase isolog generates is identical.Therefore, can judge that two segment datas are whether identical or judge whether one piece of data is modified before and after transmission according to whether MAC is identical.In wireless sensor network, after often will carrying out that the one-way hash function computing generates MAC and MAC be attached to data to the data that send, the recipient receives and calculates MAC after the data and compare with MAC after being attached to data, if both are identical, think that then data were not distorted, otherwise, think that then data are distorted.
Because previously described wireless sensor network feature, existing safety method exists following problem when being applied to wireless sensor network: at first, the operand that needs is bigger.The node resource and the computing capability of sensor network are limited, so the bigger safety method of operand is not adapted at using in the wireless sensor network.Secondly, existing method generally needs more data interaction, can increase the communications burden of network and the energy consumption of node like this, influences network performance, uses so also be less compliant in the wireless sensor network.If adopt existing safety method, bigger operand may cause node to bear or influence other tasks of execution because carrying out the relevant calculating of safety.Secondly, too much calculating and communication have increased the energy consumption of node, might cause the depleted of energy of node, influence the performance of network.Because above restriction, existing safety method also is not suitable for wireless sensor network, and the problem of authorizing mutually between the node never solves.
Summary of the invention
The present invention seeks to propose the method for data security transmission in a kind of wireless sensor network, with the big and big problem of protocol communication expense of operand that solves existing method, solve the problem that to authorize between node, under the limited situation of node resource, guarantee the wireless sensor network data transmission safety.
The method of data security transmission in the wireless sensor network that the present invention proposes comprises following each step:
(1) the wireless sensor network user obtains the master key of this device node behind the purchase of equipment node, and this master key is imported the Centroid of wireless sensor network;
(2) carry out authorizing between the Centroid of data communication and the device node, determine both sides' legitimacy;
(3) Centroid periodically carries out Hash operation according to above-mentioned master key and a random number, produces an original session key;
(4) Centroid adds message authentication code behind above-mentioned original session key, and use above-mentioned master key that original session key and message authentication code are encrypted, obtain session key, and this session key is sent to the device node that carries out data communication with Centroid;
(5) device node receives above-mentioned session key, at first use master key that the information of receiving is decrypted, and the authentication code of checking session key, obtain new original session key, and with existing original session key in the new original session key alternate device node;
(6) after device node uses the original session key of up-to-date acquisition, after the transmission data, add authentication code, and transmission data and authentication code are encrypted with up-to-date original session key, send to Centroid after the encryption, the information that the Centroid deciphering receives, and the authentication code of checking deciphering back information, obtain transmitting data;
(7) Centroid utilizes the original session key that above-mentioned steps (3) obtains, the transmission data are encrypted, after the transmission data after the encryption, add authentication code, and send to the device node that carries out data communication with Centroid, the information that the device node deciphering receives, and the authentication code of checking deciphering back information, obtain transmitting data.
In the said method, authorize between Centroid and the device node, determine the method for both sides' legitimacy, comprise the steps:
(1) Centroid adds authentication code after first random number, and uses master key that first random number and authentication code are encrypted, and first random number after will encrypting and authentication code send to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and verifies the authentication code of first random number, obtains first random number of Centroid;
(2) device node adds authentication code after second random number, and uses master key that second random number and authentication code are encrypted, and second random number after will encrypting and authentication code send to above-mentioned Centroid; Centroid is decrypted the information that receives, and verifies the authentication code of second random number, obtains second random number of device node;
(3) Centroid adds authentication code after the Centroid sign, and uses master key that center node identification and authentication code are encrypted, and the Centroid after will encrypting identifies and authentication code sends to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and the authentication code of authentication center node identification, obtains the Centroid sign;
(4) device node adds authentication code after the device node sign, and uses master key that device node sign and authentication code are encrypted, and the device node after will encrypting identifies and authentication code sends to above-mentioned Centroid; Centroid is decrypted the information that receives, and the authentication code of Authentication devices node identification, obtains the device node sign;
(5) Centroid is according to first parameter S 1, utilize the message authentication code of above-mentioned master key calculation S1, to this message authentication code encryption, send it to device node, wherein the shared in advance data 1|| Centroid of S1=Centroid and device node identifies || the device node sign || and first random number || second random number, symbol wherein || expression is with symbol || and data afterwards are attached to symbol || after the data before, form one group of data;
(6) device node is according to second parameter S 2, utilize the message authentication code of above-mentioned master key calculation S2, to this message authentication code encryption, send it to Centroid, wherein the shared in advance data 2|| Centroid sign of S2=Centroid and device node || the device node sign || first random number || second random number;
(7) information that receives of Centroid deciphering obtains the message authentication code of above-mentioned S2, and its message authentication code with the local S2 that calculates is compared, if the two is identical, then authorizes and pass through, if inequality, and authorization failure then;
(8) information that receives of device node deciphering obtains the message authentication code of above-mentioned S1, and its message authentication code with the local S1 that calculates is compared, if the two is identical, then authorizes and pass through, if inequality, and authorization failure then.
The method of data security transmission in the wireless sensor network that the present invention proposes does not obviously influence under the prerequisite of network security performance having, and greatly reduces amount of calculation and communication overhead, and has solved the problem of authorizing between node in the wireless sensor network.The inventive method also provides generation, transmission and the method for updating of key, and the data of transmission are encrypted and the data integrity authentication, has guaranteed the wireless sensor network data transmission safety preferably.
Description of drawings
Fig. 1 is the main flow chart of the inventive method.
Fig. 2 is authorization flow figure between the inventive method Centroid and the device node.
Embodiment
The method of data security transmission in the wireless sensor network that the present invention proposes, its flow chart as shown in Figure 1, at first the wireless sensor network user obtains the master key of this device node behind the purchase of equipment node, and this master key is imported the Centroid of wireless sensor network; Carry out authorizing between the Centroid of data communication and the device node, determine both sides' legitimacy; Centroid periodically carries out Hash operation according to above-mentioned master key and a random number, produces an original session key; Centroid adds message authentication code behind above-mentioned original session key, and use above-mentioned master key that original session key and message authentication code are encrypted, obtain session key, and this session key is sent to the device node that carries out data communication with Centroid; Device node receives above-mentioned session key, at first uses master key that the information of receiving is decrypted, and the authentication code of checking session key, obtains new original session key, and with existing original session key in the new original session key alternate device node; After device node uses the original session key of up-to-date acquisition, after the transmission data, add authentication code, and transmission data and authentication code are encrypted with up-to-date original session key, send to Centroid after the encryption, the information that the Centroid deciphering receives, and the authentication code of checking deciphering back information, obtain transmitting data; The original session key that Centroid utilizes, the transmission data are encrypted, after the transmission data after the encryption, add authentication code, and send to the device node that carries out data communication with Centroid, the information that the device node deciphering receives, and the authentication code of checking deciphering back information, obtain transmitting data.
In the said method, the flow process of authorizing between Centroid and the device node comprises the steps: as shown in Figure 2
(1) Centroid adds authentication code after first random number, and uses master key that first random number and authentication code are encrypted, and first random number after will encrypting and authentication code send to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and verifies the authentication code of first random number, obtains first random number of Centroid;
(2) device node adds authentication code after second random number, and uses master key that second random number and authentication code are encrypted, and second random number after will encrypting and authentication code send to above-mentioned Centroid; Centroid is decrypted the information that receives, and verifies the authentication code of second random number, obtains second random number of device node;
(3) Centroid adds authentication code after the Centroid sign, and uses master key that center node identification and authentication code are encrypted, and the Centroid after will encrypting identifies and authentication code sends to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and the authentication code of authentication center node identification, obtains the Centroid sign;
(4) device node adds authentication code after the device node sign, and uses master key that device node sign and authentication code are encrypted, and the device node after will encrypting identifies and authentication code sends to above-mentioned Centroid; Centroid is decrypted the information that receives, and the authentication code of Authentication devices node identification, obtains the device node sign;
(5) Centroid is according to first parameter S 1, utilize the message authentication code of above-mentioned master key calculation S1, to this message authentication code encryption, send it to device node, wherein the shared in advance data 1|| Centroid of S1=Centroid and device node identifies || the device node sign || and first random number || second random number, symbol wherein || expression is with symbol || and data afterwards are attached to symbol || after the data before, form one group of data;
(6) device node is according to second parameter S 2, utilize the message authentication code of above-mentioned master key calculation S2, to this message authentication code encryption, send it to Centroid, wherein the shared in advance data 2|| Centroid sign of S2=Centroid and device node || the device node sign || first random number || second random number;
(7) information that receives of Centroid deciphering obtains the message authentication code of above-mentioned S2, and its message authentication code with the local S2 that calculates is compared, if the two is identical, then authorizes and pass through, if inequality, and authorization failure then;
(8) information that receives of device node deciphering obtains the message authentication code of above-mentioned S1, and its message authentication code with the local S1 that calculates is compared, if the two is identical, then authorizes and pass through, if inequality, and authorization failure then.
The inventive method adopts two kinds of keys, is respectively master key and session key.Master key is used for generation, renewal and the safe transmission of session key.Session key is used for the encryption and decryption and the data integrity authentication of network transmission data.
Below in conjunction with accompanying drawing, introduce the embodiment of the inventive method in detail, mainly comprise the steps:
At first, realize sharing of master key between Centroid and the device node, this process is finished by the user of network.The user determines master key, and master key is imported Centroid and device node, generally requires the corresponding master key of each device node.Centroid is safeguarded one and is used to note down the sign of distinct device node and the table of corresponding master key and session key, writes down the master key of each device node correspondence and up-to-date session key.So just between Centroid and device node, set up the close value of sharing, realized access control simultaneously, prevented that undelegated user from obtaining the information in the network.
Then, Centroid and device node carry out mutual mandate, in order to determine both sides' legitimacy.This process is finished automatically by Centroid and device node, and the process of mandate as shown in Figure 2.
In licensing process, Centroid and device node produce a random number separately, are called first random number and second random number.First random number and second random number are generally the character string of equal in length, are used for the security information difference that guarantees that each licensing process generates, the fail safe that has improved licensing process.Centroid produces first random number, after first random number, add authentication code, and use master key that first random number and authentication code are encrypted, and first random number after will encrypting and authentication code send to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and verifies the authentication code of first random number, obtains first random number of Centroid.
After device node obtains first random number of Centroid transmission, can produce second random number, and after second random number, add authentication code, and use master key that second random number and authentication code are encrypted, and second random number after will encrypting and authentication code send to above-mentioned Centroid; Centroid is decrypted the information that receives, and verifies the authentication code of second random number, obtains second random number of device node.
More than this finished Centroid and the device node that communicates with it between the random number exchange.After the exchange of finishing random number, Centroid and the node switching node identification that communicates with it, process is as follows:
Centroid adds authentication code after the Centroid sign, and uses master key that center node identification and authentication code are encrypted, and the Centroid after will encrypting identifies and authentication code sends to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and the authentication code of authentication center node identification, obtains the Centroid sign.
After obtaining the Centroid sign of Centroid transmission, device node adds authentication code after the device node sign, and use master key that device node sign and authentication code are encrypted, and the device node after will encrypting identify and authentication code sends to above-mentioned Centroid; Centroid is decrypted the information that receives, and the authentication code of Authentication devices node identification, obtains the device node sign.So just finished the sign exchange between Centroid and the device node.
After Centroid and device node were finished random number exchange and node identification exchange, Centroid and device node had all obtained the sign of first random number, second random number and Centroid and device node.Centroid and device node carry out first parameter and second CALCULATION OF PARAMETERS respectively according to the methods below, and according to the authentication code of first parameter and these two parameter correspondences of second calculation of parameter.
Centroid calculates first parameter, the data 1|| Centroid sign that first parameter=Centroid and device node are shared in advance || the device node sign || and first random number || second random number.Centroid uses the message authentication code of above-mentioned master key calculation first parameter, to this message authentication code encryption, sends it to device node.
Device node calculates second parameter, the data 2|| Centroid sign that second parameter=Centroid and device node are shared in advance || the device node sign || and first random number || second random number.Device node utilizes the message authentication code of above-mentioned master key calculation second parameter, to this message authentication code encryption, sends it to Centroid.
Because in different licensing process, Centroid is different with the random number that device node produces, so all inequality according to first parameter and second parameter of first and second random number and node identification generation.
The information that the Centroid deciphering receives, obtain the message authentication code of above-mentioned second parameter, and its message authentication code with local second parameter of calculating compared, if the two is identical, show that then this device node has the key identical with Centroid, device node is legal node, and Centroid sends an affirmation to device node, shows that in affirmation Centroid has passed through the mandate to device node; If both are inequality, Centroid shows authorization failure in affirmation.
The information that the device node deciphering receives, obtain the message authentication code of above-mentioned second parameter, and its message authentication code with local first parameter of calculating compared, if the two is identical, show that then Centroid has the key identical with device node, Centroid is legal node, and then device node sends an affirmation to Centroid, shows that in affirmation device node has passed through the mandate to Centroid; If both are inequality, then device node shows authorization failure in affirmation.
If authorize both sides to have a side in license confirmation, to show authorization failure, then licensing process failure, the node both sides can not carry out ensuing data communication.Have only both sides all to show to authorize and pass through, Centroid and device node just can carry out ensuing data communication.
Session key is produced by Centroid.At Centroid with communicate device node with it by after mutually authorizing, Centroid periodically carries out Hash operation according to security information and produces session key.Security information is made up of the master key of device node correspondence and the random number of certain-length.Security information is as the input of one-way Hash function, and the output of hash function is session key, that is: session key=H (master key || random number),
Wherein H represents the one-way Hash function computing, symbol || after expression is attached to master key with random number.
Because Centroid generally has stronger computing capability and system resource, so the generation of session key is finished by Centroid, this has not only improved the speed of system, and has reduced the operand and the energy consumption of device node.Using same session key after a period of time, use the fail safe of the enciphered data of this session key to reduce, so need to bring in constant renewal in the session key that enciphered data is used, Centroid periodically produces and sends new session key and can address this problem.
After generating new session key, Centroid is searched the master key of device node correspondence according to the device node sign that communicates with it.Centroid adds authentication code after new session key, and uses master key encrypted session key and authentication code, and sends it to device node.After successfully giving device node with the session cipher key delivery, Centroid upgrades the item of session key correspondence in the local table.Use the master key encrypted session key to guarantee the safe transmission of session key.
Device node receives above-mentioned session key, at first uses master key that the information of receiving is decrypted, and the authentication code of checking session key, obtains new original session key, and with existing original session key in the new original session key alternate device node.
After Centroid and device node have all been finished the renewal of session key, just begin the transmission of data, all data of transmitting between node are all transmitted with the ciphertext form., before Centroid sends data, after data, add authentication code, and use up-to-date session key data and authentication code at device node, send to Centroid.And at Centroid before device node sends data, at first need to search the session key of device node correspondence according to the sign of device node.After data to be sent, add authentication code, and use up-to-date session key data and authentication code, send to device node.

Claims (2)

1, the method for data security transmission in a kind of wireless sensor network is characterized in that this method comprises following each step:
(1) the wireless sensor network user obtains the master key of this device node behind the purchase of equipment node, and this master key is imported the Centroid of wireless sensor network;
(2) carry out authorizing between the Centroid of data communication and the device node, determine both sides' legitimacy;
(3) Centroid periodically carries out Hash operation according to above-mentioned master key and a random number, produces an original session key;
(4) Centroid adds message authentication code in above-mentioned original session key back, and use above-mentioned master key that original session key and message authentication code are encrypted, obtain session key, and this session key is sent to the device node that carries out data communication with Centroid;
(5) device node receives above-mentioned session key, at first use master key that the information of receiving is decrypted, and the authentication code of checking session key, obtain new original session key, and with existing original session key in the new original session key alternate device node;
(6) after device node uses the original session key of up-to-date acquisition, after the transmission data, add authentication code, and transmission data and authentication code are encrypted with up-to-date original session key, send to Centroid after the encryption, the information that the Centroid deciphering receives, and the authentication code of checking deciphering back information, obtain transmitting data;
(7) Centroid utilizes the original session key that above-mentioned steps (3) obtains, the transmission data are encrypted, after the transmission data after the encryption, add authentication code, and send to the device node that carries out data communication with Centroid, the information that the device node deciphering receives, and the authentication code of checking deciphering back information, obtain transmitting data.
2, method as claimed in claim 2 is characterized in that wherein authorizing between the Centroid and device node, determines the method for both sides' legitimacy, comprises the steps:
(1) Centroid adds authentication code after first random number, and uses master key that first random number and authentication code are encrypted, and first random number after will encrypting and authentication code send to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and verifies the authentication code of first random number, obtains first random number of Centroid;
(2) device node adds authentication code after second random number, and uses master key that second random number and authentication code are encrypted, and second random number after will encrypting and authentication code send to above-mentioned Centroid; Centroid is decrypted the information that receives, and verifies the authentication code of second random number, obtains second random number of device node;
(3) Centroid adds authentication code after the Centroid sign, and uses master key that center node identification and authentication code are encrypted, and the Centroid after will encrypting identifies and authentication code sends to the device node that carries out data communication with Centroid; Device node is decrypted the information that receives, and the authentication code of authentication center node identification, obtains the Centroid sign;
(4) device node adds authentication code after the device node sign, and uses master key that device node sign and authentication code are encrypted, and the device node after will encrypting identifies and authentication code sends to above-mentioned Centroid; Centroid is decrypted the information that receives, and the authentication code of Authentication devices node identification, obtains the device node sign;
(5) Centroid is according to first parameter S 1, utilize the message authentication code of above-mentioned master key calculation S1, to this message authentication code encryption, send it to device node, the data 1|| Centroid sign shared in advance of S1=Centroid and device node wherein || the device node sign || first random number || second random number, after M1||M2 represents data M 2 is attached to data M 1;
(6) device node is according to second parameter S 2, utilize the message authentication code of above-mentioned master key calculation S2, to this message authentication code encryption, send it to Centroid, wherein the shared in advance data 2|| Centroid sign of S2=Centroid and device node || the device node sign || first random number || second random number;
(7) information that receives of Centroid deciphering obtains the message authentication code of above-mentioned S2, and its message authentication code with the local S2 that calculates is compared, if the two is identical, then authorizes and pass through, if inequality, and authorization failure then;
(8) information that receives of device node deciphering obtains the message authentication code of above-mentioned S1, and its message authentication code with the local S1 that calculates is compared, if the two is identical, then authorizes and pass through, if inequality, and authorization failure then.
CN 200710099880 2007-05-31 2007-05-31 Data safety transmission method for wireless sensor network Expired - Fee Related CN100581102C (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN 200710099880 CN100581102C (en) 2007-05-31 2007-05-31 Data safety transmission method for wireless sensor network
PCT/CN2008/071089 WO2008145059A1 (en) 2007-05-31 2008-05-26 A method for secure data transmission in wireless sensor network
US12/601,987 US20100293379A1 (en) 2007-05-31 2008-05-26 method for secure data transmission in wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200710099880 CN100581102C (en) 2007-05-31 2007-05-31 Data safety transmission method for wireless sensor network

Publications (2)

Publication Number Publication Date
CN101072096A true CN101072096A (en) 2007-11-14
CN100581102C CN100581102C (en) 2010-01-13

Family

ID=38899103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200710099880 Expired - Fee Related CN100581102C (en) 2007-05-31 2007-05-31 Data safety transmission method for wireless sensor network

Country Status (2)

Country Link
CN (1) CN100581102C (en)
WO (1) WO2008145059A1 (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008145059A1 (en) * 2007-05-31 2008-12-04 Beijing Transpacific Ip Technology Development Ltd. A method for secure data transmission in wireless sensor network
CN101227286B (en) * 2008-01-31 2010-04-14 北京飞天诚信科技有限公司 Method for generating message authentication code
CN101867921A (en) * 2010-06-11 2010-10-20 电子科技大学 Communication method capable of improving hiding performance of wireless sensor network
CN102104981A (en) * 2009-12-18 2011-06-22 传象科技股份有限公司 System and method for connecting wireless nodes
CN102196430A (en) * 2011-05-17 2011-09-21 浪潮(山东)电子信息有限公司 Wireless inter-node communication method based on adaptive antenna selection mechanism and frequency negotiation mechanism
WO2011131085A1 (en) * 2010-04-22 2011-10-27 国家无线电监测中心检测中心 Method, system, terminal, destination access node and access controller for low-overhead sensor network access control
CN102254382A (en) * 2011-06-24 2011-11-23 北京握奇数据系统有限公司 Remote recharging method, client and system for pay television
CN101715186B (en) * 2009-11-20 2012-01-04 西安电子科技大学 Secret sharing based safety communication method of wireless sensor network
CN102394746A (en) * 2011-11-01 2012-03-28 上海耀华称重系统有限公司 Data transmission method of weighing system based on digital sensor
CN102487384A (en) * 2010-12-03 2012-06-06 联想(北京)有限公司 Data processing method and device
CN101715187B (en) * 2009-11-20 2012-09-05 西安电子科技大学 Safety communication method based on dynamic gateway
CN102684873A (en) * 2011-06-23 2012-09-19 杭州尚思科技有限公司 Information-encrypted wireless lamp networking system and encrypting communication method thereof
WO2012152070A1 (en) * 2011-07-20 2012-11-15 中兴通讯股份有限公司 Method for communication between gateways in wsn, initiator gateway, and target gateway
CN103001944A (en) * 2012-09-27 2013-03-27 深圳市友讯达科技发展有限公司 Method for protecting programs in micro-power wireless information acquisition system
CN103152733A (en) * 2011-12-07 2013-06-12 华为技术有限公司 Communication method and device
CN103297959A (en) * 2012-02-28 2013-09-11 中国移动通信集团广东有限公司 Method for encryption in sensor network, encryption device and sensor network
CN104101376A (en) * 2013-04-09 2014-10-15 罗伯特·博世有限公司 Sensor module and method for operating a sensor module
CN104468112A (en) * 2014-08-13 2015-03-25 中经云数据存储科技(北京)有限公司 Authorized access control method based on optical disc juke-box system and safety system
CN104506560A (en) * 2015-01-13 2015-04-08 中国人民解放军总参谋部工程兵科研三所 Dynamic parameter wireless test network security confidentiality keeping method
CN105072636A (en) * 2015-09-15 2015-11-18 成都华兴智造科技有限公司 Wireless testing and data transmission system
CN105141620A (en) * 2015-09-16 2015-12-09 华东师范大学 Small data distribution method enabling wireless sensor network security and denial of service attack defense
US9237310B2 (en) 2008-11-26 2016-01-12 Thomson Licensing Method and system digital for processing digital content according to a workflow
CN106209352A (en) * 2015-05-28 2016-12-07 恩智浦有限公司 There is effective cipher key derivative of forward security
CN106612506A (en) * 2015-10-27 2017-05-03 国网智能电网研究院 WSN (Wireless Sensor Network) node safety interaction method in online state monitoring system of power transmission line
CN107066899A (en) * 2011-02-18 2017-08-18 霍尼韦尔国际公司 For methods and systems for securely uploading files onto aircraft
CN108270767A (en) * 2016-11-23 2018-07-10 伊迪米亚身份与安全法国公司 Data verification method
CN108737433A (en) * 2018-05-29 2018-11-02 冼汉生 Sensor node monitoring system based on Internet of Things and sensor node monitoring method
CN110048856A (en) * 2019-04-25 2019-07-23 高创(苏州)电子有限公司 Data transmission method, device and POS machine system
CN112152963A (en) * 2019-06-26 2020-12-29 国民技术股份有限公司 Intelligent lock, security platform and authentication method thereof

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006595B (en) * 2010-12-07 2013-04-17 东南大学 Key management method of wireless sensor network
CN111294793A (en) * 2019-12-30 2020-06-16 国网北京市电力公司 Data privacy protection method for identity authentication in wireless sensor network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7096359B2 (en) * 2001-03-01 2006-08-22 University Of Cincinnati Authentication scheme for ad hoc and sensor wireless networks
CN1667999A (en) * 2005-01-18 2005-09-14 中国电子科技集团公司第三十研究所 A secure communication method between mobile nodes in mobile self-organized network
CN100581102C (en) * 2007-05-31 2010-01-13 北京泛亚创知科技发展有限公司 Data safety transmission method for wireless sensor network

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008145059A1 (en) * 2007-05-31 2008-12-04 Beijing Transpacific Ip Technology Development Ltd. A method for secure data transmission in wireless sensor network
CN101227286B (en) * 2008-01-31 2010-04-14 北京飞天诚信科技有限公司 Method for generating message authentication code
US9237310B2 (en) 2008-11-26 2016-01-12 Thomson Licensing Method and system digital for processing digital content according to a workflow
CN101715187B (en) * 2009-11-20 2012-09-05 西安电子科技大学 Safety communication method based on dynamic gateway
CN101715186B (en) * 2009-11-20 2012-01-04 西安电子科技大学 Secret sharing based safety communication method of wireless sensor network
CN102104981A (en) * 2009-12-18 2011-06-22 传象科技股份有限公司 System and method for connecting wireless nodes
WO2011131085A1 (en) * 2010-04-22 2011-10-27 国家无线电监测中心检测中心 Method, system, terminal, destination access node and access controller for low-overhead sensor network access control
CN101867921A (en) * 2010-06-11 2010-10-20 电子科技大学 Communication method capable of improving hiding performance of wireless sensor network
CN102487384B (en) * 2010-12-03 2015-06-03 联想(北京)有限公司 Data processing method and device
CN102487384A (en) * 2010-12-03 2012-06-06 联想(北京)有限公司 Data processing method and device
CN107066899A (en) * 2011-02-18 2017-08-18 霍尼韦尔国际公司 For methods and systems for securely uploading files onto aircraft
CN102196430A (en) * 2011-05-17 2011-09-21 浪潮(山东)电子信息有限公司 Wireless inter-node communication method based on adaptive antenna selection mechanism and frequency negotiation mechanism
CN102196430B (en) * 2011-05-17 2014-02-26 浪潮(山东)电子信息有限公司 Wireless inter-node communication method based on adaptive antenna selection mechanism and frequency negotiation mechanism
CN102684873A (en) * 2011-06-23 2012-09-19 杭州尚思科技有限公司 Information-encrypted wireless lamp networking system and encrypting communication method thereof
CN102684873B (en) * 2011-06-23 2014-12-31 杭州尚思科技有限公司 Information-encrypted wireless lamp networking system and encrypting communication method thereof
CN102254382A (en) * 2011-06-24 2011-11-23 北京握奇数据系统有限公司 Remote recharging method, client and system for pay television
WO2012152070A1 (en) * 2011-07-20 2012-11-15 中兴通讯股份有限公司 Method for communication between gateways in wsn, initiator gateway, and target gateway
CN102394746A (en) * 2011-11-01 2012-03-28 上海耀华称重系统有限公司 Data transmission method of weighing system based on digital sensor
CN103152733A (en) * 2011-12-07 2013-06-12 华为技术有限公司 Communication method and device
WO2013083082A1 (en) * 2011-12-07 2013-06-13 华为技术有限公司 Communication method and device
CN103297959A (en) * 2012-02-28 2013-09-11 中国移动通信集团广东有限公司 Method for encryption in sensor network, encryption device and sensor network
CN103297959B (en) * 2012-02-28 2017-01-25 中国移动通信集团广东有限公司 Method for encryption in sensor network, encryption device and sensor network
CN103001944A (en) * 2012-09-27 2013-03-27 深圳市友讯达科技发展有限公司 Method for protecting programs in micro-power wireless information acquisition system
CN103001944B (en) * 2012-09-27 2016-04-13 深圳友讯达科技股份有限公司 Program protection method in micropower Wireless Information Collecting System
CN104101376B (en) * 2013-04-09 2019-05-31 罗伯特·博世有限公司 Sensor module and method for running sensor module
CN104101376A (en) * 2013-04-09 2014-10-15 罗伯特·博世有限公司 Sensor module and method for operating a sensor module
CN104468112A (en) * 2014-08-13 2015-03-25 中经云数据存储科技(北京)有限公司 Authorized access control method based on optical disc juke-box system and safety system
CN104506560A (en) * 2015-01-13 2015-04-08 中国人民解放军总参谋部工程兵科研三所 Dynamic parameter wireless test network security confidentiality keeping method
CN104506560B (en) * 2015-01-13 2018-04-27 中国人民解放军总参谋部工程兵科研三所 A kind of safety security method of dynamic parameter wireless test network
CN106209352A (en) * 2015-05-28 2016-12-07 恩智浦有限公司 There is effective cipher key derivative of forward security
CN105072636A (en) * 2015-09-15 2015-11-18 成都华兴智造科技有限公司 Wireless testing and data transmission system
CN105072636B (en) * 2015-09-15 2019-02-26 成都华兴智造科技有限公司 A kind of wireless test and data transmission system
CN105141620A (en) * 2015-09-16 2015-12-09 华东师范大学 Small data distribution method enabling wireless sensor network security and denial of service attack defense
CN106612506A (en) * 2015-10-27 2017-05-03 国网智能电网研究院 WSN (Wireless Sensor Network) node safety interaction method in online state monitoring system of power transmission line
CN108270767B (en) * 2016-11-23 2022-03-29 伊迪米亚身份与安全法国公司 Data verification method
CN108270767A (en) * 2016-11-23 2018-07-10 伊迪米亚身份与安全法国公司 Data verification method
CN108737433A (en) * 2018-05-29 2018-11-02 冼汉生 Sensor node monitoring system based on Internet of Things and sensor node monitoring method
CN108737433B (en) * 2018-05-29 2020-09-11 深圳市齐为信息科技有限公司 Sensor node monitoring system and sensor node monitoring method based on Internet of things
CN110048856A (en) * 2019-04-25 2019-07-23 高创(苏州)电子有限公司 Data transmission method, device and POS machine system
CN110048856B (en) * 2019-04-25 2022-05-31 高创(苏州)电子有限公司 Data transmission method and device and POS machine system
CN112152963A (en) * 2019-06-26 2020-12-29 国民技术股份有限公司 Intelligent lock, security platform and authentication method thereof
WO2020259397A1 (en) * 2019-06-26 2020-12-30 国民技术股份有限公司 Smart lock, security platform and authentication method therefor
CN112152963B (en) * 2019-06-26 2024-04-09 国民技术股份有限公司 Intelligent lock, security platform and authentication method thereof

Also Published As

Publication number Publication date
CN100581102C (en) 2010-01-13
WO2008145059A1 (en) 2008-12-04

Similar Documents

Publication Publication Date Title
CN100581102C (en) Data safety transmission method for wireless sensor network
CN109600350B (en) System and method for secure communication between controllers in a vehicle network
CN107453868B (en) A kind of safe and efficient quantum key method of servicing
CN102098157B (en) A kind of system and method based on be used for strengthening the security of client/server communications protocol without certificate Public Key Infrastructure
US20100293379A1 (en) method for secure data transmission in wireless sensor network
Mustafa et al. A review of data security and cryptographic techniques in IoT based devices
CN104410616A (en) Method and system for encrypting, decrypting and transmitting data
CN111770092B (en) Numerical control system network security architecture and secure communication method and system
CN109714760B (en) Authority access control method suitable for intelligent equipment in direct connection communication environment
CN102594842A (en) Device-fingerprint-based network management message authentication and encryption scheme
CN112636923B (en) Engineering machinery CAN equipment identity authentication method and system
CN112491550B (en) Mobile terminal equipment credibility authentication method and system based on Internet of vehicles
CN113542428B (en) Vehicle data uploading method and device, vehicle, system and storage medium
CN103118363A (en) Method, system, terminal device and platform device of secret information transmission
Liang et al. Novel private data access control scheme suitable for mobile edge computing
CN112713995A (en) Dynamic communication key distribution method and device for terminal of Internet of things
Singh et al. Secure and energy efficient data transmission model for WSN
CN104125239A (en) Network authentication method and system based on data link encryption transmission
CN106972928B (en) Bastion machine private key management method, device and system
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
CN113179258B (en) Vehicle-mounted data encryption method based on multi-encryption algorithm
CN111145400B (en) Safe and simple low-power-consumption Bluetooth lock and control method thereof
CN110047181B (en) Intelligent door lock safety control method based on Zigbee
CN112214753A (en) Authentication method and device, electronic equipment and storage medium
KR20060058789A (en) Method and apparatus for data security on home network system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING FANYA CHUANGZHI TECHNOLOGY DEVELOPMENT CO

Free format text: FORMER OWNER: WEIXUNZIJING TECH CO., LTD., BEIJING

Effective date: 20080912

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20080912

Address after: Room 2, building 5, building No. 100022, west view, Yongan, Beijing, Chaoyang District, China: 23C

Applicant after: Beijing Fanya Chuangzhi Science-Technology Development Inc.

Address before: Room 402, building 2, D, Pioneer Park, 76297898-8 information road, Beijing, Haidian District: 100085

Applicant before: Weixunzijing Science and Technology Co., Ltd., Beijing

C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING YUDONG SCIENCE AND TECHNOLOGY DEVELOPMENT

Free format text: FORMER OWNER: BEIJING FANYA CHUANGZHI SCIENCE-TECHNOLOGY DEVELOPMENT INC.

Effective date: 20100719

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100022 ROOM 23C, BUILDING 2, NO.5, LINGTONGGUAN, YONGANXILI, CHAOYANG DISTRICT, BEIJING CITY TO: 100000 NO.15, SHANGHOU STREET, YAMENKOU HIJINGSHAN DISTRICT, BEIJING CITY

TR01 Transfer of patent right

Effective date of registration: 20100719

Address after: 100000 Beijing city Shijingshan District Yamenkou Backstreet No. 15

Patentee after: Weixunzijing Tech Co., Ltd., Beijing

Address before: 100022, Beijing, Yongan, Chaoyang District west view 5, building 2, room 23C

Patentee before: Beijing Fanya Chuangzhi Science-Technology Development Inc.

C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100113

Termination date: 20130531