CN101742490A - Safe and effective method for dynamically updating wireless sensor network program - Google Patents

Safe and effective method for dynamically updating wireless sensor network program Download PDF

Info

Publication number
CN101742490A
CN101742490A CN200910155122A CN200910155122A CN101742490A CN 101742490 A CN101742490 A CN 101742490A CN 200910155122 A CN200910155122 A CN 200910155122A CN 200910155122 A CN200910155122 A CN 200910155122A CN 101742490 A CN101742490 A CN 101742490A
Authority
CN
China
Prior art keywords
program
sensor node
message
updating message
subspace
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910155122A
Other languages
Chinese (zh)
Other versions
CN101742490B (en
Inventor
何道敬
陈纯
卜佳俊
尹明剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN2009101551227A priority Critical patent/CN101742490B/en
Publication of CN101742490A publication Critical patent/CN101742490A/en
Application granted granted Critical
Publication of CN101742490B publication Critical patent/CN101742490B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safe and effective method for dynamically updating a wireless sensor network program, belonging to the field of wireless communication. The method comprises the following steps of: determining an euclidean space by a base station and dividing the euclidean space into a first subspace and a second subspace which are orthogonal to each other before deploying sensor nodes; randomly selecting a standard orthogonal basis of the first subspace, and randomly selecting a vector for each sensor node from the second subspace; determining a hash function, and selecting a same random number for all the sensor nodes as a cluster key; installing the vector, the cluster key and the hash function into each sensor node; broadcasting program updating message to a sensor network by the base station when the base station needs to update the programs on all the sensor nodes, and checking the validity of the message by each sensor node; if the program updating message is valid, receiving the program updating message by the sensor node and updating programs per se; otherwise, rejecting the program updating message.

Description

Method for dynamically updating wireless sensor network program safely and effectively
Technical field
The present invention relates to a kind of program dynamic updating method, belong to wireless communication field.
Background technology
In recent years, wireless sensor network has caused a large amount of researchers' concern because of it has broad application prospects.In most of the cases, the base station needs the program on the new sensor node more.The base station here is meant and is connecting sensor network and the not limited server of resource.Recently, many wireless sensor network security dynamic routine update mechanisms are suggested, some of them mechanism is not suitable for resource-constrained sensor network because having used the operation of this high energy consumption of digital signature, and some other mechanism are pointed out to exist security breaches by the people.Therefore, up to the present, a kind of method for dynamically updating wireless sensor network program does not safely and effectively appear also.
Summary of the invention
The object of the present invention is to provide a kind of method for dynamically updating wireless sensor network program safely and effectively.
The technical solution adopted for the present invention to solve the technical problems is: this safely and effectively method for dynamically updating wireless sensor network program mainly may further comprise the steps:
1) before sensor node deployment, following operation is carried out in the base station:
Determine an Euclidean space, and this Euclidean space is decomposed into first subspace and second subspace of two quadratures; Select an orthonormal basis of first subspace at random, and from second subspace, select a vector at random for each sensor node;
Determine a hash function, and be that all sensor nodes select an identical random number as bunch key;
Described vector, bunch key and hash function are installed in each sensor node;
2) behind sensor node deployment, when the base station is upgraded the program on all the sensors node, the base station is to sensor network radio program updating message, comprise timestamp that message sends in this program updating message, the identifier of the program after upgrading, program version number, program, with bunch key as the hash function value of input be used for the supplementary of validity of check problem updating message;
3) after each sensor node is received program updating message, verify the validity of this message, if this program updating message is effective, then sensor node is accepted this program updating message and is upgraded self program; Otherwise refuse this program updating message.
Compared with prior art, advantage of the present invention is:
(1) the present invention realizes the fail safe of system by the matrix orthogonality principle, and is simple and reliable, therefore is specially adapted to resource-constrained wireless sensor network;
(2) thus sensor node has carried out careful checking to program updating message can resist each effectively
Plant attack, the particularly use of bunch key can effectively be resisted the worm hole and attack;
(3) in order to upgrade the program on all the sensors node, the base station only needs to send a unique broadcast and gets final product.
(4) length of the program updates information among the present invention is fixed, and is irrelevant with the interstitial content of sensor network, thereby be applicable to that large-scale wireless sensor network program upgrades.
Description of drawings
Fig. 1 is the workflow diagram of method for dynamically updating wireless sensor network program of the present invention.
Embodiment
Relevant technical term is as follows:
The M program
X PidThe identifier of program M
X VERThe version of program M
The hash function of h single channel
Figure G2009101551227D00021
Xor operation
The dot product of AB matrix A and matrix B
A TThe transposition of matrix A
A. before sensor node deployment, the Euclidean space V of base station selected n dimension, and V is decomposed into the first subspace V of two quadratures 1With the second subspace V 2, V wherein 1Be the k dimension, V 2It is the n-k dimension.The base station is selected V more at random 1An orthonormal basis { Q 1, Q 2..., Q k; And be that each sensor node i selects a vectorial C i, i=1,2K, k, wherein C iBe to belong to V 2Element.A hash function is determined in the base station, is the random number x that all sensor nodes are selected an identical m position again BAs a bunch key, m should be enough big, and for example 256, that is to say x BIt is the random number of a high comentropy.Then, vectorial C i, hash function h and bunch key x BBe loaded onto in each sensor node.
B. behind sensor node deployment, when the needs refresh routine, the base station is to all sensor node router updating message M Ddv (j), M adv ( j ) = Δ { j , t j , M , X pid , X ver , h ( j , t j , , M , X pid , X ver , x B ) , β O j T } , J=1 wherein, 2Kk, the j representation program upgrades sequence number, is to be used for the supplementary of validity of check problem updating message; t jExpression message M Ddv (j)The timestamp that sends; Program after M represents to upgrade, X PidThe identifier of representation program, X VerRepresentation program version number, β satisfy to concern h (j, t j, M, X Pid, X Ver, x B) vector of β=0.
C. work as arbitrary sensor node i and receive message M Ddv (j)The time, below carrying out about the operation of the validation verification of program updating message:
1) validity of checking j: if j is less than or equal to the j that is stored in the sensor node *The time, sensor node is refused this message; Otherwise sensor node thinks that j is fresh and replaces j with j *(when initial, the j of sensor node storage *=0), and carry out next step operation.
2) checking t jValidity: the current time of sensor node is Clock, if | Clock-t j|<Δ t, carry out next step; Otherwise sensor node is refused this message.Here Δ t is the time delay threshold value that pre-sets;
3) then, bunch key x that the sensor node utilization is stored BCalculate h (j, t j, M, X Pid, X Ver, x B), with h (j, the t that is calculated j, M, X Pid, X Ver, x B) and M Adv (j)Middle corresponding hash function value h (j, t j, M, X Pid, X Ver, x B) compare, if both are unequal, then sensor node is refused this message; If both equate, then carry out next step.
4) sensor node calculates h (j, t j, M, X Pid, X Ver, x B) Tβ O j TIf, equal 0, carry out next step; Otherwise sensor node is refused this message;
5) sensor node is at random from β O j TThe middle vectorial R of row that selects a non-zero j T, with R j TWith the C that is stored in the node i iMultiply each other,, continue next step if the result is 0; Otherwise sensor node is refused this message;
6) sensor node is checked R jWhether be R 1, R 2K R J-1Linear combination, if not, then store R j, with R jBe inserted into vector set { R 1, R 2K R J-1In, accept this message; Otherwise refuse this message.
Each sensor node all carries out the operation of the check of above a series of validity about program updating message to the program updating message of receiving, if this message can be by whole checks, then this sensor node is accepted this program updating message, carries out dynamically updating of program; Otherwise this sensor node is refused this program updating message.

Claims (1)

1. method for dynamically updating wireless sensor network program safely and effectively is characterized in that may further comprise the steps:
1) before sensor node deployment, following operation is carried out in the base station:
Determine an Euclidean space, and this Euclidean space is decomposed into first subspace and second subspace of two quadratures; Select an orthonormal basis of first subspace at random, and from second subspace, select a vector at random for each sensor node;
Determine a hash function, and be that all sensor nodes select an identical random number as bunch key;
Described vector, bunch key and hash function are installed in each sensor node;
2) behind sensor node deployment, when the base station is upgraded the program on all the sensors node, the base station is to sensor network radio program updating message, this program updating message comprises timestamp that message sends, the identifier of the program after upgrading, program version number, program, with bunch key as the hash function value of input be used for the supplementary of validity of check problem updating message;
3) after each sensor node is received program updating message, utilize bunch key stored, verify the validity of this message, if this program updating message is effective, then sensor node is accepted this program updating message and is upgraded self program; Otherwise refuse this program updating message.
CN2009101551227A 2009-12-02 2009-12-02 Safe and effective method for dynamically updating wireless sensor network program Expired - Fee Related CN101742490B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101551227A CN101742490B (en) 2009-12-02 2009-12-02 Safe and effective method for dynamically updating wireless sensor network program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101551227A CN101742490B (en) 2009-12-02 2009-12-02 Safe and effective method for dynamically updating wireless sensor network program

Publications (2)

Publication Number Publication Date
CN101742490A true CN101742490A (en) 2010-06-16
CN101742490B CN101742490B (en) 2012-07-04

Family

ID=42465211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101551227A Expired - Fee Related CN101742490B (en) 2009-12-02 2009-12-02 Safe and effective method for dynamically updating wireless sensor network program

Country Status (1)

Country Link
CN (1) CN101742490B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487503A (en) * 2010-12-06 2012-06-06 中国航空工业集团公司第六三一研究所 Method for managing multi-stage security dynamic group security keys
CN102612035A (en) * 2012-04-13 2012-07-25 北京工业大学 Energy-efficient identity authentication method in multi-level clustering wireless sensor network
CN103079198A (en) * 2011-10-26 2013-05-01 中兴通讯股份有限公司 Key updating method and system for sensor node
CN103702325A (en) * 2013-12-19 2014-04-02 华南理工大学 Lightweight wireless sensor network safety small data distribution method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277265B (en) * 2008-05-07 2011-05-04 浙江大学 Method for accelerating loading ELF document in wireless sensing network

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487503A (en) * 2010-12-06 2012-06-06 中国航空工业集团公司第六三一研究所 Method for managing multi-stage security dynamic group security keys
CN102487503B (en) * 2010-12-06 2014-04-16 中国航空工业集团公司第六三一研究所 Method for managing multi-stage security dynamic group security keys
CN103079198A (en) * 2011-10-26 2013-05-01 中兴通讯股份有限公司 Key updating method and system for sensor node
CN103079198B (en) * 2011-10-26 2018-08-03 中兴通讯股份有限公司 The key updating method and system of sensor node
CN102612035A (en) * 2012-04-13 2012-07-25 北京工业大学 Energy-efficient identity authentication method in multi-level clustering wireless sensor network
CN102612035B (en) * 2012-04-13 2014-05-28 北京工业大学 Energy-efficient identity authentication method in multi-level clustering wireless sensor network
CN103702325A (en) * 2013-12-19 2014-04-02 华南理工大学 Lightweight wireless sensor network safety small data distribution method
CN103702325B (en) * 2013-12-19 2017-04-19 华南理工大学 Lightweight wireless sensor network safety small data distribution method

Also Published As

Publication number Publication date
CN101742490B (en) 2012-07-04

Similar Documents

Publication Publication Date Title
CN106951788B (en) Customer vehicle data security method
CN107426165B (en) Bidirectional secure cloud storage data integrity detection method supporting key updating
CN107688945B (en) Design method of efficient permission chain based on delay state consensus
Kim et al. An enhanced access reservation protocol with a partial preamble transmission mechanism in NB-IoT systems
CN101742490B (en) Safe and effective method for dynamically updating wireless sensor network program
EP3646536A1 (en) System and method for managing secure communications between modules in a controller area network
Liu et al. Quantized consensus of multi‐agent systems via broadcast gossip algorithms
CN104468697A (en) Radio station data transmission load distribution method
De Marco et al. Contention resolution in a non-synchronized multiple access channel
CN101765109B (en) Program dynamic updating method for wireless sensor network capable of resisting compromised node attack
CN110730081A (en) Block chain network-based certificate revocation method, related equipment and medium
EP3647979B1 (en) Device attestation techniques
CN102957666A (en) License control method and license control system
CN101526947A (en) SQL resisting injection technology using regular expression
CN101256572B (en) Method for operating XML document as well as XDMS
Hamed Azimi et al. Data preservation under spatial failures in sensor networks
CN117251889B (en) Block chain consensus method, related device and medium
DK1716705T3 (en) Method of pairing a number of N data receiving equipment with a number of M conditional access control cards
KR101329131B1 (en) Method for electing cluster head in sensor network and sensor node generation system in the sinsor network
CN109309671A (en) A kind of communications device data management method and device based on block chain
Zhong [Retracted] An ALOHA‐Based Algorithm Based on Grouping of Tag Prefixes for Industrial Internet of Things
CN114584326B (en) Block chain data processing method and device, electronic equipment and storage medium
CN103491113B (en) A kind of synchronous method, the apparatus and system of information fusion file
Kim et al. On the Discrete‐Time GeoX/G/1 Queues under N‐Policy with Single and Multiple Vacations
Zhao et al. Security‐Aware Scheduling for FlexRay‐Based Real‐Time Automotive Systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120704

Termination date: 20171202

CF01 Termination of patent right due to non-payment of annual fee