CN101742490A - Safe and effective method for dynamically updating wireless sensor network program - Google Patents
Safe and effective method for dynamically updating wireless sensor network program Download PDFInfo
- Publication number
- CN101742490A CN101742490A CN200910155122A CN200910155122A CN101742490A CN 101742490 A CN101742490 A CN 101742490A CN 200910155122 A CN200910155122 A CN 200910155122A CN 200910155122 A CN200910155122 A CN 200910155122A CN 101742490 A CN101742490 A CN 101742490A
- Authority
- CN
- China
- Prior art keywords
- program
- sensor node
- message
- updating message
- subspace
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a safe and effective method for dynamically updating a wireless sensor network program, belonging to the field of wireless communication. The method comprises the following steps of: determining an euclidean space by a base station and dividing the euclidean space into a first subspace and a second subspace which are orthogonal to each other before deploying sensor nodes; randomly selecting a standard orthogonal basis of the first subspace, and randomly selecting a vector for each sensor node from the second subspace; determining a hash function, and selecting a same random number for all the sensor nodes as a cluster key; installing the vector, the cluster key and the hash function into each sensor node; broadcasting program updating message to a sensor network by the base station when the base station needs to update the programs on all the sensor nodes, and checking the validity of the message by each sensor node; if the program updating message is valid, receiving the program updating message by the sensor node and updating programs per se; otherwise, rejecting the program updating message.
Description
Technical field
The present invention relates to a kind of program dynamic updating method, belong to wireless communication field.
Background technology
In recent years, wireless sensor network has caused a large amount of researchers' concern because of it has broad application prospects.In most of the cases, the base station needs the program on the new sensor node more.The base station here is meant and is connecting sensor network and the not limited server of resource.Recently, many wireless sensor network security dynamic routine update mechanisms are suggested, some of them mechanism is not suitable for resource-constrained sensor network because having used the operation of this high energy consumption of digital signature, and some other mechanism are pointed out to exist security breaches by the people.Therefore, up to the present, a kind of method for dynamically updating wireless sensor network program does not safely and effectively appear also.
Summary of the invention
The object of the present invention is to provide a kind of method for dynamically updating wireless sensor network program safely and effectively.
The technical solution adopted for the present invention to solve the technical problems is: this safely and effectively method for dynamically updating wireless sensor network program mainly may further comprise the steps:
1) before sensor node deployment, following operation is carried out in the base station:
Determine an Euclidean space, and this Euclidean space is decomposed into first subspace and second subspace of two quadratures; Select an orthonormal basis of first subspace at random, and from second subspace, select a vector at random for each sensor node;
Determine a hash function, and be that all sensor nodes select an identical random number as bunch key;
Described vector, bunch key and hash function are installed in each sensor node;
2) behind sensor node deployment, when the base station is upgraded the program on all the sensors node, the base station is to sensor network radio program updating message, comprise timestamp that message sends in this program updating message, the identifier of the program after upgrading, program version number, program, with bunch key as the hash function value of input be used for the supplementary of validity of check problem updating message;
3) after each sensor node is received program updating message, verify the validity of this message, if this program updating message is effective, then sensor node is accepted this program updating message and is upgraded self program; Otherwise refuse this program updating message.
Compared with prior art, advantage of the present invention is:
(1) the present invention realizes the fail safe of system by the matrix orthogonality principle, and is simple and reliable, therefore is specially adapted to resource-constrained wireless sensor network;
(2) thus sensor node has carried out careful checking to program updating message can resist each effectively
Plant attack, the particularly use of bunch key can effectively be resisted the worm hole and attack;
(3) in order to upgrade the program on all the sensors node, the base station only needs to send a unique broadcast and gets final product.
(4) length of the program updates information among the present invention is fixed, and is irrelevant with the interstitial content of sensor network, thereby be applicable to that large-scale wireless sensor network program upgrades.
Description of drawings
Fig. 1 is the workflow diagram of method for dynamically updating wireless sensor network program of the present invention.
Embodiment
Relevant technical term is as follows:
The M program
X
PidThe identifier of program M
X
VERThe version of program M
The hash function of h single channel
The dot product of AB matrix A and matrix B
A
TThe transposition of matrix A
A. before sensor node deployment, the Euclidean space V of base station selected n dimension, and V is decomposed into the first subspace V of two quadratures
1With the second subspace V
2, V wherein
1Be the k dimension, V
2It is the n-k dimension.The base station is selected V more at random
1An orthonormal basis { Q
1, Q
2..., Q
k; And be that each sensor node i selects a vectorial C
i, i=1,2K, k, wherein C
iBe to belong to V
2Element.A hash function is determined in the base station, is the random number x that all sensor nodes are selected an identical m position again
BAs a bunch key, m should be enough big, and for example 256, that is to say x
BIt is the random number of a high comentropy.Then, vectorial C
i, hash function h and bunch key x
BBe loaded onto in each sensor node.
B. behind sensor node deployment, when the needs refresh routine, the base station is to all sensor node router updating message M
Ddv (j),
J=1 wherein, 2Kk, the j representation program upgrades sequence number, is to be used for the supplementary of validity of check problem updating message; t
jExpression message M
Ddv (j)The timestamp that sends; Program after M represents to upgrade, X
PidThe identifier of representation program, X
VerRepresentation program version number, β satisfy to concern h (j, t
j, M, X
Pid, X
Ver, x
B) vector of β=0.
C. work as arbitrary sensor node i and receive message M
Ddv (j)The time, below carrying out about the operation of the validation verification of program updating message:
1) validity of checking j: if j is less than or equal to the j that is stored in the sensor node
*The time, sensor node is refused this message; Otherwise sensor node thinks that j is fresh and replaces j with j
*(when initial, the j of sensor node storage
*=0), and carry out next step operation.
2) checking t
jValidity: the current time of sensor node is Clock, if | Clock-t
j|<Δ t, carry out next step; Otherwise sensor node is refused this message.Here Δ t is the time delay threshold value that pre-sets;
3) then, bunch key x that the sensor node utilization is stored
BCalculate h (j, t
j, M, X
Pid, X
Ver, x
B), with h (j, the t that is calculated
j, M, X
Pid, X
Ver, x
B) and M
Adv (j)Middle corresponding hash function value h (j, t
j, M, X
Pid, X
Ver, x
B) compare, if both are unequal, then sensor node is refused this message; If both equate, then carry out next step.
4) sensor node calculates h (j, t
j, M, X
Pid, X
Ver, x
B)
Tβ O
j TIf, equal 0, carry out next step; Otherwise sensor node is refused this message;
5) sensor node is at random from β O
j TThe middle vectorial R of row that selects a non-zero
j T, with R
j TWith the C that is stored in the node i
iMultiply each other,, continue next step if the result is 0; Otherwise sensor node is refused this message;
6) sensor node is checked R
jWhether be R
1, R
2K R
J-1Linear combination, if not, then store R
j, with R
jBe inserted into vector set { R
1, R
2K R
J-1In, accept this message; Otherwise refuse this message.
Each sensor node all carries out the operation of the check of above a series of validity about program updating message to the program updating message of receiving, if this message can be by whole checks, then this sensor node is accepted this program updating message, carries out dynamically updating of program; Otherwise this sensor node is refused this program updating message.
Claims (1)
1. method for dynamically updating wireless sensor network program safely and effectively is characterized in that may further comprise the steps:
1) before sensor node deployment, following operation is carried out in the base station:
Determine an Euclidean space, and this Euclidean space is decomposed into first subspace and second subspace of two quadratures; Select an orthonormal basis of first subspace at random, and from second subspace, select a vector at random for each sensor node;
Determine a hash function, and be that all sensor nodes select an identical random number as bunch key;
Described vector, bunch key and hash function are installed in each sensor node;
2) behind sensor node deployment, when the base station is upgraded the program on all the sensors node, the base station is to sensor network radio program updating message, this program updating message comprises timestamp that message sends, the identifier of the program after upgrading, program version number, program, with bunch key as the hash function value of input be used for the supplementary of validity of check problem updating message;
3) after each sensor node is received program updating message, utilize bunch key stored, verify the validity of this message, if this program updating message is effective, then sensor node is accepted this program updating message and is upgraded self program; Otherwise refuse this program updating message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101551227A CN101742490B (en) | 2009-12-02 | 2009-12-02 | Safe and effective method for dynamically updating wireless sensor network program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101551227A CN101742490B (en) | 2009-12-02 | 2009-12-02 | Safe and effective method for dynamically updating wireless sensor network program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101742490A true CN101742490A (en) | 2010-06-16 |
CN101742490B CN101742490B (en) | 2012-07-04 |
Family
ID=42465211
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009101551227A Expired - Fee Related CN101742490B (en) | 2009-12-02 | 2009-12-02 | Safe and effective method for dynamically updating wireless sensor network program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101742490B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487503A (en) * | 2010-12-06 | 2012-06-06 | 中国航空工业集团公司第六三一研究所 | Method for managing multi-stage security dynamic group security keys |
CN102612035A (en) * | 2012-04-13 | 2012-07-25 | 北京工业大学 | Energy-efficient identity authentication method in multi-level clustering wireless sensor network |
CN103079198A (en) * | 2011-10-26 | 2013-05-01 | 中兴通讯股份有限公司 | Key updating method and system for sensor node |
CN103702325A (en) * | 2013-12-19 | 2014-04-02 | 华南理工大学 | Lightweight wireless sensor network safety small data distribution method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277265B (en) * | 2008-05-07 | 2011-05-04 | 浙江大学 | Method for accelerating loading ELF document in wireless sensing network |
-
2009
- 2009-12-02 CN CN2009101551227A patent/CN101742490B/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487503A (en) * | 2010-12-06 | 2012-06-06 | 中国航空工业集团公司第六三一研究所 | Method for managing multi-stage security dynamic group security keys |
CN102487503B (en) * | 2010-12-06 | 2014-04-16 | 中国航空工业集团公司第六三一研究所 | Method for managing multi-stage security dynamic group security keys |
CN103079198A (en) * | 2011-10-26 | 2013-05-01 | 中兴通讯股份有限公司 | Key updating method and system for sensor node |
CN103079198B (en) * | 2011-10-26 | 2018-08-03 | 中兴通讯股份有限公司 | The key updating method and system of sensor node |
CN102612035A (en) * | 2012-04-13 | 2012-07-25 | 北京工业大学 | Energy-efficient identity authentication method in multi-level clustering wireless sensor network |
CN102612035B (en) * | 2012-04-13 | 2014-05-28 | 北京工业大学 | Energy-efficient identity authentication method in multi-level clustering wireless sensor network |
CN103702325A (en) * | 2013-12-19 | 2014-04-02 | 华南理工大学 | Lightweight wireless sensor network safety small data distribution method |
CN103702325B (en) * | 2013-12-19 | 2017-04-19 | 华南理工大学 | Lightweight wireless sensor network safety small data distribution method |
Also Published As
Publication number | Publication date |
---|---|
CN101742490B (en) | 2012-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106951788B (en) | Customer vehicle data security method | |
CN107426165B (en) | Bidirectional secure cloud storage data integrity detection method supporting key updating | |
CN107688945B (en) | Design method of efficient permission chain based on delay state consensus | |
Kim et al. | An enhanced access reservation protocol with a partial preamble transmission mechanism in NB-IoT systems | |
CN101742490B (en) | Safe and effective method for dynamically updating wireless sensor network program | |
EP3646536A1 (en) | System and method for managing secure communications between modules in a controller area network | |
Liu et al. | Quantized consensus of multi‐agent systems via broadcast gossip algorithms | |
CN104468697A (en) | Radio station data transmission load distribution method | |
De Marco et al. | Contention resolution in a non-synchronized multiple access channel | |
CN101765109B (en) | Program dynamic updating method for wireless sensor network capable of resisting compromised node attack | |
CN110730081A (en) | Block chain network-based certificate revocation method, related equipment and medium | |
EP3647979B1 (en) | Device attestation techniques | |
CN102957666A (en) | License control method and license control system | |
CN101526947A (en) | SQL resisting injection technology using regular expression | |
CN101256572B (en) | Method for operating XML document as well as XDMS | |
Hamed Azimi et al. | Data preservation under spatial failures in sensor networks | |
CN117251889B (en) | Block chain consensus method, related device and medium | |
DK1716705T3 (en) | Method of pairing a number of N data receiving equipment with a number of M conditional access control cards | |
KR101329131B1 (en) | Method for electing cluster head in sensor network and sensor node generation system in the sinsor network | |
CN109309671A (en) | A kind of communications device data management method and device based on block chain | |
Zhong | [Retracted] An ALOHA‐Based Algorithm Based on Grouping of Tag Prefixes for Industrial Internet of Things | |
CN114584326B (en) | Block chain data processing method and device, electronic equipment and storage medium | |
CN103491113B (en) | A kind of synchronous method, the apparatus and system of information fusion file | |
Kim et al. | On the Discrete‐Time GeoX/G/1 Queues under N‐Policy with Single and Multiple Vacations | |
Zhao et al. | Security‐Aware Scheduling for FlexRay‐Based Real‐Time Automotive Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120704 Termination date: 20171202 |
|
CF01 | Termination of patent right due to non-payment of annual fee |