CN101742490A - Safe and effective wireless sensor network program dynamic update method - Google Patents
Safe and effective wireless sensor network program dynamic update method Download PDFInfo
- Publication number
- CN101742490A CN101742490A CN200910155122A CN200910155122A CN101742490A CN 101742490 A CN101742490 A CN 101742490A CN 200910155122 A CN200910155122 A CN 200910155122A CN 200910155122 A CN200910155122 A CN 200910155122A CN 101742490 A CN101742490 A CN 101742490A
- Authority
- CN
- China
- Prior art keywords
- program
- sensor node
- sensor
- message
- subspace
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 10
- 239000011159 matrix material Substances 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种程序动态更新方法,属于无线通信领域。The invention relates to a method for dynamically updating programs, which belongs to the field of wireless communication.
背景技术Background technique
近年来,无线传感器网络因其具有广阔的应用前景而引起了大量研究者的关注。在大多数情况下,基站需要更新传感器节点上的程序。这里的基站是指连接着传感器网络并且资源不受限的服务器。最近,许多无线传感器网络安全动态程序更新机制已经被提出,其中一些机制因为使用了数字签名这一高能耗的操作而不适用于资源受限的传感器网络,一些其他机制已经被人指出存在安全漏洞。因此,到目前为止,还没有出现一种安全有效的无线传感器网络程序动态更新方法。In recent years, wireless sensor networks have attracted the attention of a large number of researchers because of their broad application prospects. In most cases, the base station needs to update the program on the sensor nodes. The base station here refers to the server connected to the sensor network and has unlimited resources. Recently, many secure dynamic program update mechanisms for wireless sensor networks have been proposed, some of which are not suitable for resource-constrained sensor networks because of the use of digital signatures, an energy-intensive operation, and some other mechanisms have been pointed out to have security vulnerabilities . Therefore, up to now, there has not been a safe and effective method for dynamically updating programs in wireless sensor networks.
发明内容Contents of the invention
本发明的目的在于提供一种安全有效的无线传感器网络程序动态更新方法。The purpose of the present invention is to provide a safe and effective wireless sensor network program dynamic update method.
本发明解决其技术问题所采用的技术方案是:该安全有效的无线传感器网络程序动态更新方法主要包括以下步骤:The technical solution adopted by the present invention to solve the technical problems is: the safe and effective wireless sensor network program dynamic update method mainly includes the following steps:
1)在传感器节点部署前,基站进行以下操作:1) Before the deployment of sensor nodes, the base station performs the following operations:
确定一个欧氏空间,并将该欧氏空间分解为两个正交的第一子空间和第二子空间;随机选择第一子空间的一个标准正交基,并为每一个传感器节点从第二子空间中随机选择一个向量;Determine a Euclidean space, and decompose the Euclidean space into two orthogonal first subspaces and second subspaces; randomly select an orthonormal basis of the first subspace, and for each sensor node from the first Randomly select a vector in the second subspace;
确定一个哈希函数,并为所有的传感器节点选择一个相同的随机数作为簇密钥;Determine a hash function and choose the same random number as the cluster key for all sensor nodes;
将所述向量、簇密钥和哈希函数安装到每一个传感器节点中;installing the vector, cluster key and hash function into each sensor node;
2)在传感器节点部署后,当基站对所有传感器节点上的程序进行更新时,基站向传感器网络广播程序更新消息,该程序更新消息中包括消息发送的时间戳、更新后的程序、程序版本号、程序的标识符、以簇密钥作为输入的哈希函数值和用来检验程序更新消息的有效性的辅助信息;2) After the sensor nodes are deployed, when the base station updates the programs on all sensor nodes, the base station broadcasts a program update message to the sensor network, which includes the time stamp of message sending, the updated program, and the program version number , the identifier of the program, the hash function value with the cluster key as input, and auxiliary information used to check the validity of the program update message;
3)每个传感器节点收到程序更新消息后,验证该消息的有效性,若该程序更新消息有效,则传感器节点接受该程序更新消息并更新自身的程序;否则拒绝该程序更新消息。3) After each sensor node receives the program update message, it verifies the validity of the message. If the program update message is valid, the sensor node accepts the program update message and updates its own program; otherwise, it rejects the program update message.
与现有技术相比,本发明的优点是:Compared with prior art, the advantage of the present invention is:
(1)本发明通过矩阵正交原理来实现系统的安全性,简单可靠,因此特别适用于资源受限的无线传感器网络;(1) The present invention realizes the safety of the system through the principle of matrix orthogonality, which is simple and reliable, so it is especially suitable for wireless sensor networks with limited resources;
(2)传感器节点对程序更新消息进行了周密的验证从而能够有效地抵御各(2) The sensor node has carefully verified the program update message so that it can effectively resist various
种袭击,特别是簇密钥的使用,能够有效抵御虫洞攻击;Such attacks, especially the use of cluster keys, can effectively resist wormhole attacks;
(3)为了更新所有传感器节点上的程序,基站仅需要发送唯一一个广播消息即可。(3) In order to update the programs on all sensor nodes, the base station only needs to send a unique broadcast message.
(4)本发明中的程序更新信息的长度是固定的,与传感器网络的节点数目无关,从而适用于大规模的无线传感器网络程序更新。(4) The length of the program update information in the present invention is fixed and has nothing to do with the number of nodes in the sensor network, so it is suitable for large-scale wireless sensor network program update.
附图说明Description of drawings
图1是本发明无线传感器网络程序动态更新方法的工作流程图。Fig. 1 is a working flowchart of the method for dynamically updating wireless sensor network programs of the present invention.
具体实施方式Detailed ways
有关的技术术语如下:The relevant technical terms are as follows:
M 程序M program
Xpid 程序M的标识符Identifier of the X pid program M
XVER 程序M的版本Version of X VER program M
h 单路的哈希函数h one-way hash function
异或操作 XOR operation
A·B 矩阵A和矩阵B的点积A·B The dot product of matrix A and matrix B
AT 矩阵A的转置 AT Transpose of matrix A
A.在传感器节点部署前,基站选择一个n维的欧氏空间V,并且将V分解为两个正交的第一子空间V1和第二子空间V2,其中V1是k维,V2是n-k维。基站再随机选择V1的一个标准正交基{Q1,Q2,...,Qk};并且为每个传感器节点i选择一个向量Ci,i=1,2K,k,其中Ci是属于V2的元素。基站确定一个哈希函数,再为所有的传感器节点选择一个相同的m位的随机数xB作为簇密钥,m应该足够大,例如256,也就是说xB是一个高信息熵的随机数。然后,向量Ci、哈希函数h和簇密钥xB被装载到每个传感器节点中。A. Before the deployment of sensor nodes, the base station selects an n-dimensional Euclidean space V, and decomposes V into two orthogonal first subspace V 1 and second subspace V 2 , where V 1 is k-dimensional, V 2 is nk dimension. The base station then randomly selects an orthonormal basis {Q 1 , Q 2 ,...,Q k } of V 1 ; and selects a vector C i for each sensor node i , i=1, 2K, k, where C i is an element belonging to V2 . The base station determines a hash function, and then selects the same m-bit random number x B as the cluster key for all sensor nodes. m should be large enough, such as 256, which means that x B is a random number with high information entropy . Then, vector C i , hash function h and cluster key x B are loaded into each sensor node.
B.在传感器节点部署后,当需要更新程序时,基站向所有的传感器节点发送程序更新消息Mddv (j),
C.当任一传感器节点i接收到消息Mddv (j)时,进行下面关于程序更新消息的有效性验证的操作:C. When any sensor node i receives the message M ddv (j) , perform the following operations on the validity verification of the program update message:
1)验证j的有效性:如果j小于或者等于存贮在传感器节点中的j*时,传感器节点拒绝该消息;否则,传感器节点认为j是新鲜的并且用j替换掉j*(初始时,传感器节点存贮的j*=0),并进行下一步操作。1) Verify the validity of j: if j is less than or equal to j * stored in the sensor node, the sensor node rejects the message; otherwise, the sensor node considers j to be fresh and replaces j * with j (initially, The sensor node stores j * = 0), and proceed to the next step.
2)验证tj的有效性:传感器节点的当前时间为Clock,如果|Clock-tj|<Δt,进行下一步骤;否则传感器节点拒绝该消息。这里Δt为预先设置好的时间延迟阈值;2) Verify the validity of t j : the current time of the sensor node is Clock, if |Clock-t j |<Δt, proceed to the next step; otherwise, the sensor node rejects the message. Here Δt is the preset time delay threshold;
3)接着,传感器节点利用所存储的簇密钥xB计算h(j,tj,M,Xpid,Xver,xB),将所计算得到的h(j,tj,M,Xpid,Xver,xB)与Madv (j)中对应的哈希函数值h(j,tj,M,Xpid,Xver,xB)进行比较,如果两者不相等,则传感器节点拒绝该消息;如果两者相等,则进行下一步骤。3) Next, the sensor node uses the stored cluster key x B to calculate h(j, t j , M, X pid , X ver , x B ), and the calculated h(j, t j , M, X pid , X ver , x B ) is compared with the corresponding hash function value h(j, t j , M, X pid , X ver , x B ) in M adv (j) , if the two are not equal, the sensor The node rejects the message; if both are equal, proceed to the next step.
4)传感器节点计算h(j,tj,M,Xpid,Xver,xB)TβOj T,如果等于0,进行下一步骤;否则传感器节点拒绝该消息;4) The sensor node calculates h(j, t j , M, X pid , X ver , x B ) T βO j T , if it is equal to 0, proceed to the next step; otherwise, the sensor node rejects the message;
5)传感器节点随机从βOj T中选择一个非零的行向量Rj T,将Rj T和存储在节点i中的Ci相乘,如果结果为0,继续下一步骤;否则传感器节点拒绝该消息;5) The sensor node randomly selects a non-zero row vector R j T from βO j T , multiplies R j T with the C i stored in node i, if the result is 0, proceed to the next step; otherwise the sensor node reject the message;
6)传感器节点检查Rj是否为R1,R2 K Rj-1的线性组合,如果不是,则存储Rj,将Rj插入到向量集合{R1,R2K Rj-1}中,接受该消息;否则拒绝该消息。6) The sensor node checks whether R j is a linear combination of R 1 , R 2 K R j-1 , if not, stores R j , inserts R j into the vector set {R 1 , R 2 K R j-1 }, Accept the message; otherwise reject the message.
每个传感器节点对收到的程序更新消息都进行以上一系列关于程序更新消息的有效性的检验的操作,若该消息能够通过全部的检验,则该传感器节点接受该程序更新消息,进行程序的动态更新;否则,该传感器节点拒绝该程序更新消息。Each sensor node performs the above series of checks on the validity of the program update message for the received program update message. If the message can pass all checks, the sensor node accepts the program update message and performs program update. Dynamic update; otherwise, the sensor node rejects the program update message.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101551227A CN101742490B (en) | 2009-12-02 | 2009-12-02 | Safe and effective method for dynamically updating wireless sensor network program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101551227A CN101742490B (en) | 2009-12-02 | 2009-12-02 | Safe and effective method for dynamically updating wireless sensor network program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101742490A true CN101742490A (en) | 2010-06-16 |
CN101742490B CN101742490B (en) | 2012-07-04 |
Family
ID=42465211
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009101551227A Expired - Fee Related CN101742490B (en) | 2009-12-02 | 2009-12-02 | Safe and effective method for dynamically updating wireless sensor network program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101742490B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487503A (en) * | 2010-12-06 | 2012-06-06 | 中国航空工业集团公司第六三一研究所 | Method for managing multi-stage security dynamic group security keys |
CN102612035A (en) * | 2012-04-13 | 2012-07-25 | 北京工业大学 | Energy-efficient identity authentication method in multi-level clustering wireless sensor network |
CN103079198A (en) * | 2011-10-26 | 2013-05-01 | 中兴通讯股份有限公司 | Key updating method and system for sensor node |
CN103702325A (en) * | 2013-12-19 | 2014-04-02 | 华南理工大学 | Lightweight wireless sensor network safety small data distribution method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277265B (en) * | 2008-05-07 | 2011-05-04 | 浙江大学 | Method for accelerating loading ELF document in wireless sensing network |
-
2009
- 2009-12-02 CN CN2009101551227A patent/CN101742490B/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487503A (en) * | 2010-12-06 | 2012-06-06 | 中国航空工业集团公司第六三一研究所 | Method for managing multi-stage security dynamic group security keys |
CN102487503B (en) * | 2010-12-06 | 2014-04-16 | 中国航空工业集团公司第六三一研究所 | Method for managing multi-stage security dynamic group security keys |
CN103079198A (en) * | 2011-10-26 | 2013-05-01 | 中兴通讯股份有限公司 | Key updating method and system for sensor node |
CN103079198B (en) * | 2011-10-26 | 2018-08-03 | 中兴通讯股份有限公司 | The key updating method and system of sensor node |
CN102612035A (en) * | 2012-04-13 | 2012-07-25 | 北京工业大学 | Energy-efficient identity authentication method in multi-level clustering wireless sensor network |
CN102612035B (en) * | 2012-04-13 | 2014-05-28 | 北京工业大学 | Energy-efficient identity authentication method in multi-level clustering wireless sensor network |
CN103702325A (en) * | 2013-12-19 | 2014-04-02 | 华南理工大学 | Lightweight wireless sensor network safety small data distribution method |
CN103702325B (en) * | 2013-12-19 | 2017-04-19 | 华南理工大学 | Lightweight wireless sensor network safety small data distribution method |
Also Published As
Publication number | Publication date |
---|---|
CN101742490B (en) | 2012-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102970679B (en) | The secure signing method of identity-based | |
US20120243683A1 (en) | Node and group key updating method | |
WO2010088060A3 (en) | Authentication for a multi-tier wireless home mesh network | |
KR102037115B1 (en) | Counter check and reconfiguration method, apparatus, and system | |
Law et al. | Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks | |
JP6289680B2 (en) | Packet transmission device, packet reception device, packet transmission program, and packet reception program | |
CN101742490B (en) | Safe and effective method for dynamically updating wireless sensor network program | |
WO2019017844A1 (en) | System and method for managing secure communications between modules in a controller area network | |
JP2015521003A5 (en) | ||
CN101765109B (en) | Wireless sensor network program dynamic updating method capable of resisting compromised node attack | |
EP3647979B1 (en) | Device attestation techniques | |
US20150172918A1 (en) | Method for transmitting data, access point and station | |
Hassan et al. | Analysis of an opportunistic large array line network with Bernoulli node deployment | |
CN102421094B (en) | Distributed safety reprogramming method of wireless sensor network | |
CN105848150B (en) | A wireless sensor network packet small data security distribution method | |
CN109039841B (en) | Method and device for joining cascade networking and knife box | |
Zhang et al. | Design of improved Luby transform codes with decreasing ripple size and feedback | |
Hamed Azimi et al. | Data preservation under spatial failures in sensor networks | |
Chen et al. | Energy‐Efficient Broadcast Scheduling Algorithm in Duty‐Cycled Multihop Wireless Networks | |
Zeng et al. | Security weakness in a dynamic program update protocol for wireless sensor networks | |
He et al. | Secure and efficient dynamic program update in wireless sensor networks | |
US11601263B2 (en) | Systems and methods for efficient key management in a vehicular intranet | |
CN107979605B (en) | Safe big data network communication method | |
Liang et al. | Two-layer coded gradient aggregation with straggling communication links | |
CN103826223B (en) | Authentication method suitable for clustering wireless sensing network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120704 Termination date: 20171202 |