CN101951602A - Key distribution method with self-healing and head node revoking functions - Google Patents
Key distribution method with self-healing and head node revoking functions Download PDFInfo
- Publication number
- CN101951602A CN101951602A CN2010105048390A CN201010504839A CN101951602A CN 101951602 A CN101951602 A CN 101951602A CN 2010105048390 A CN2010105048390 A CN 2010105048390A CN 201010504839 A CN201010504839 A CN 201010504839A CN 101951602 A CN101951602 A CN 101951602A
- Authority
- CN
- China
- Prior art keywords
- node
- group
- session
- key
- head
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a key distribution method with self-healing and head node revoking functions, comprising the following steps: secret information is preset before sensor nodes are spread into specific areas by a pre-distribution mode, and then group session keys are calculated by the secret information; and when messages are lost or certain sessions are missed, the nodes can recover the missed session keys according to the self-healing secret information before and after the sessions without retransmission of broadcast messages by a base station or head nodes, thus saving a great quantity of communication and energy expenditure for a network. In addition, if the head nodes in charge of group key distribution in the network are seized, an enemy possibly distributes the incorrect session keys by the head nodes, which causes unsafe communication of the whole network; and in this case, other nodes in the network can monitor the behavior of the head nodes according to the existing rules and work together to revoke the head nodes so as to provide mutual supervision mechanisms among the nodes for normal operation of the nodes in the network and guarantee safety of the key information in the network.
Description
Technical field
The present invention relates to a kind of network security technology, but particularly a kind of self-healing and take the lead the cryptographic key distribution method that node cancels.
Background technology
In wireless sensor network, in order to ensure information security, internodal communication often needs to adopt safety measure protection.In all security mechanisms, encryption technology is the basis, can realize demands for security such as sensor network authentication, confidentiality, non-repudiation, integrality by encrypting.For encryption technology, encrypt and mainly contain two chief components, i.e. algorithm and key.Through years of researches and development, cryptographic algorithm has had very ripe international standard, such as: DES, AES etc., we can select according to the concrete application of sensor network.But no matter how powerful cryptographic algorithm is, we need first arranging key when carrying out confidential corespondence, if the key generation method a little less than having used, whole system all is weak and do not spent and decoded cryptographic algorithm so.Therefore the prerequisite that is a robust system with a strong key schedule, key management that Here it is.Therefore the key management in the sensor network becomes the key factor that influences network security.
According to tracking and the analysis to the domestic and international research document, in recent years, scholars both domestic and external had proposed multiple IKMP at wireless sensor network.Yet what most of agreements were paid close attention to all is the performance of the aspects such as connectedness, survivability, validity and autgmentability of key.Ignored under the situation of wireless transmission, information is lost or the node that has may be in resting state in a certain period through regular meeting, and under these circumstances, the self-healing ability of key mechanism is with extremely important.
The self-healing mechanism of key management is to guarantee that wireless sensor network carries out the important means of secure group communication on unreliable channel. particularly, in the group key distribution procedure, group key distribution broadcast is useful to the group member that is authorized to only, legal group member can recover shared cluster conversation key in conjunction with pre-assigned privacy information from broadcast, reversed and uncommitted disabled user then can not obtain the information of relevant cluster conversation key from broadcast, when legal group member returns group at off-line after a period of time more again, do not need to retransmit extra information and just can recover the cluster conversation key of losing immediately. cure mechanism certainly and in the wireless sensor network group key management, have important researching value.
Existing key managing project with self-healing ability, they all concentrate on the research of cancelling the aspect of guaranteeing network security and ordinary node.But we know; in each session cycle; the head node of group all will be responsible for other group membership's node distribution secret informations; therefore; group's head node is taken as target of attack probably and becomes the safe weakness of group. after group's head node is captured; the secret information that it sent will be no longer safe; the information communication of whole network also all will be exposed to the assailants of malice. therefore; should cancel in time for group's head node of being captured or to group's head node of the misbehave of hatching a sinister plot; forbid that it continues the power of distributed key or list it in the person of capturing list no longer to receive and trust its message by other nodes; thereby the key of protection subsequent network no longer victim obtains, and then ensures the safety of subsequent network.But current transducer key managing project does not have so good method.
Summary of the invention
The present invention be directed to present transducer key managing project and have unsafe problem, but proposed a kind of self-healing and taken the lead the cryptographic key distribution method that node cancels, have self-healing ability and can cancel again under the situation of ordinary node, can also cancel the method for malice head node in the group based on cooperating mutually between node.
Technical scheme of the present invention is: but N={ N is supposed in a kind of self-healing and take the lead the cryptographic key distribution method that node cancels
1, N
2..., N
nBe all initial sets that participate in node in the group, and suppose that reversed node can not add network once more, is promptly cancelled node and has monotonicity, F
qBe a finite field, wherein q is a big prime number, and all mathematical operations are all at F
qIn carry out.If H and H ' be 0,1} → F
qOn band key hash function, n, t are system parameterss, the method concrete steps comprise as follows:
1) generation of secret information and node initializing: in the starting stage, the sensor node in the network has been divided into several groups according to their deployed position or function, to each group such as group
l, a shielding of base station selection at random multinomial
h l (x, y, z) ∈ F q (x, y, z),
Group
lIn node
N i To be deposited in privately owned secret
S i =h l (i, y, z), simultaneously, the base station will selection group randomly
lIn a node
N g As the head node of group, and deposited in the group secret information
G G, l ,
Next, head node N
gSelect a prime number as key seed at random
K 0 ∈ F q Generate the session key and secret preservation of group, then, head node N
gSelect an initial random number at random
s 0 ∈ F q N is got up in secret too preservation
gBe j session phase calculating of group again with one-way Hash function H
s j (
J 〉=1):
H j J Hash operation of (.) expression,
s 0 Be the seed key of one-way hash chain,
s j Group will be sent in confidence
lIn the node that is not cancelled;
2) secret information broadcasting: at j session phase of group, head node N
gProduce a random number earlier
As the self-healing secret information of the j time session, then, head node calculates the session key of group j session cycle with another one-way Hash function H ' ()
, here
------C,
Be located at j session cycle when beginning, base station and head node have all been known the malicious node set
,
,
,
s Max Be the predefined max-session periodicity of system, then, head node is broadcasted following message:
Here cancel multinomial
3) in j session, the checking of the recovery legitimacy of group session key and self-healing key: when a unrepealed node
N i Receive message
B j After, it will calculate according to equation D
A j (x)With
In a value at i place, thereby draw group
l jGroup key in the individual session:
Then, node
N i Calculate with equation D
Decrypt
Thereby, obtain the self-healing secret information
4) checking of self-healing property: suppose node
N i ∈ NAdd group j1 session phase, and j2 (
J1<j2) the individual session phase cancelled node by group
N i Receive the session secret information of broadcasting
B J1 (1≤j1) and
B J2 (1≤j1<j2), still lost the broadcast of j session phase
B j (j1<j<j2), when receiving broadcast
B J1 With
B J2 After, node
N i Can calculate corresponding session phase key with equation D
K J1 With
K J2 ; Then, node
N i With
K J2 Decrypt
Thereby, obtain j1 session phase to the self-healing secret information between j2 session phase
At last, node
N i Can recover the cluster conversation key that all are lost by following form with equation B:
5) adding of new node: when a newcomer after j session phase joins group, the session key of the interim group of session was not designated N with one now before it did not just allow to obtain
v∈
NNode join j session when interim, the manager of group such as head node will be node N
vDeposit message in
S v ={
s j , h l (v, g, z);
6) ordinary node and head node cancels
:
A) cancelling of ordinary node: when a reversed joint
N I ' When receiving broadcast message, promptly for any one node
N I ' ∈ R j , A j (i ')=0, can not calculate group key from our reversed as can be seen node of equation C;
B) cancelling of head node: in case a node N
uThe head node GH that detects its place group is captured or is worked not normally, and it is with node N
gDispose the same period enter network and also be ready to replace node N
gAnd become group
lNew head node, it can be initiated one and take turns the process of cancelling, so broadcast following message: Be-msg={ u, group header error type, group id
l, after other node among the group l receives these broadcasts, if certain node N
iAlso aware head node N
gMay be captured and be ready to select node N
uBe new head node, it will send message so
Msg (i, u)=
h l (i, u, s Max + 1)Give node N
u, here
s Max Be the predefined max-session periodicity of system and be disclosed parameter; Otherwise, node N
iThen can abandon node N
uBroadcast and do not do any response. as node N
uAfter receiving the answer message of its neighbor node, it can check whether the sender of message is cancelled, if node N
uSuccessfully obtained
2tIndividually do not cancelled the trust of node and receive interdependent answer message, it can calculate so
h l (x, u, s Max + 1), node N is issued in the base station during again in conjunction with deployment
uPrivate information
S u =h l (u, y, z), it will derive following multinomial:
So, node N
uWith head node N before
gJoin to be cancelled in the node set and get
, and select a key to generate seed at random
With
For generating, the key in next session cycle of its place group prepares, next, and node N
uCan be according to step 2) begin to provide the generation of key and self-healing to safeguard for the secure communication of group in the subsequent network.
Beneficial effect of the present invention is: but the present invention's self-healing and take the lead the cryptographic key distribution method that node cancels, the head node that when group key distribution, group key self-healing property are provided, can also cancel common malicious node and be captured, thereby both the normal operation for node in the network provided supervision mechanism, had also ensured the fail safe of key information in the network.
Embodiment
We suppose N={ N
1, N
2..., N
nBe all initial sets that participate in node in the group.And suppose that reversed node can not add network once more, is promptly cancelled node and has monotonicity. F
qBe a finite field, wherein q is a big prime number, and all mathematical operations are all at F
qIn carry out.If H and H ' be 0,1} → F
qOn keyed Hash function, n, t are system parameterss.
The present invention comprises six processes altogether: 1) generation of secret information and node initializing; 2), secret information broadcasting; 3) in j session, the checking of the recovery legitimacy of group session key and self-healing key; 4) checking of self-healing property; 5) adding of new node; 6) ordinary node and head node cancels.Concrete operating procedure is as follows:
1) process of the generation of secret information and node initializing is: at first, in the starting stage, the sensor node in the network has been divided into several groups according to their deployed position or function.To each group such as group
l, a shielding of base station selection immediately multinomial
h l (x, y, z) ∈ F q (x, y, z), here
Correspondingly, group
lIn node
N i To be deposited in privately owned secret
S i =h l (i, y, z), simultaneously, the base station will selection group randomly
lIn a node
N g As the head node of group, and deposited in the group secret information
G G, l , here
(2)
Next, head node N
gSelect a prime number as key seed at random
K 0 ∈ F q Generate the session key and secret preservation of group, then, head node N
gSelect an initial random number at random
s 0 ∈ F q N is got up in secret too preservation
gBe j session phase calculating of group again with one-way Hash function H
s j (
J 〉=1):
H j J Hash operation of (.) expression,
s 0 It is the seed key of one-way hash chain.Note, if a node has
s j It will be easy to use one-way Hash function H to calculate
s J ' (j '〉j), but can not calculate
s J ' ' (
J ' '<j).
s j Group will be sent in confidence
lIn the node that is not cancelled.
2) process of secret information broadcasting is: for j session phase of group, head node N
gProduce a random number earlier
Self-healing secret information as the j time session.Then, head node calculates the session key of group j session cycle with another one-way Hash function H ' ()
, here
(4) be located at j session cycle when beginning, base station and head node have all been known the malicious node set
,
,
,
s Max Be the predefined max-session periodicity of system, then, head node is broadcasted following message:
Here cancel multinomial
A j (x)Be to construct like this
, and
Be to use in the present invention as the shielding multinomial.
3) in j session, the process of the checking of the recovery legitimacy of group session key and self-healing key: when a unrepealed node
N i Receive message
B j After, it will calculate according to equation (5)
A j (x)With
h l (x, y, z)In a value at i place, thereby draw group
l jGroup key in the individual session:
Then, node
N i Calculate with equation (5)
Decrypt
Thereby, obtain the self-healing secret information
4) checking of self-healing property: from top description, the session key and the self-healing secret information of group all can recover as can be seen for we.
In order to further describe the self-healing property among the present invention, we suppose node
N i ∈ NAdd group j1 session phase, and j2 (
J1<j2) the individual session phase cancelled by group.Node
N i Receive the session secret information of broadcasting
B J1 (1≤j1) and
B J2 (1≤j1<j2), still lost (perhaps successfully not receiving) broadcast of j session phase
B j (j1<j<j2).We are demonstration one lower node now
N i How can utilize self-healing property to recover the session key of losing
K j (j1<j<j2).
At first, when receiving broadcast
B J1 With
B J2 After, node
N i Can calculate corresponding session phase key with equation (5)
K J1 With
K J2 ; Then, node
N i With
K J2 Decrypt
Thereby, obtain j1 session phase to the self-healing secret information between j2 session phase
At last, node
N i Can recover the cluster conversation key that all are lost by following form with equation (3):
5) adding of new node: when a newcomer after j session phase joins group, the session key of the interim group of session before it does not just allow to obtain.Be designated N with one now
v∈
NNode join j session when interim, the manager of group such as head node etc. will be node N
vDeposit message in
S v ={
s j , h l (v, g, z).
6) ordinary node and head node cancels
:
A) cancelling of ordinary node: when a reversed joint
N I ' When receiving broadcast message, even it is from the private information of oneself
S I ' In obtained corresponding message
It can not recover session key and the self-healing secret information of current sessions phase, because for any one node
N I ' ∈ R j , A j (i ')=0Can not calculate group key from our reversed as can be seen node of equation (4).
B) cancelling of head node: in case a node N
uDetect the head node N of its place group
gCaptured or work not normally, and it is with node N
gDispose the same period enter network and also be ready to replace node N
gAnd become group
lNew head node, it can be initiated one and take turns the process of cancelling, so broadcast following message: B
E-msg={ u, group header error type, group id
l.After other node among the group l receives these broadcasts, if certain node N
iAlso aware head node N
gMay be captured and be ready to select node N
uFor new head node (is found the method that certain node is captured and is selected the foundation of certain node to have a lot, but do not belong to the key issue of discussion required for the present invention, so supposition relies on existing some method node N here
iFind and selected), it will send message so
Msg (i, u)=
h l (i, u, s Max + 1)Give node N
u, here
s Max It is the predefined max-session periodicity of system; Otherwise, node N
iThen can abandon node N
uBroadcast and do not do any response. as node N
uAfter receiving the answer message of its neighbor node, it can check whether the sender of message is cancelled, thereby attacks if prevent to forge. node N
uSuccessfully obtained
2tIndividually do not cancelled the trust of node and receive interdependent answer message, it can calculate so
h l (x, u, s Max + 1). node N is issued in the base station during again in conjunction with deployment
uPrivate information
S u =h l (u, y, z), it will derive following multinomial:
So, node N
uWith head node N before
gJoin and cancelled node set
In and select key to generate seed at random
With
For generating, the key in next session cycle of its place group prepares. next, and node N
uCan process in accordance with the present invention 2 begin to provide the generation of key and self-healing to safeguard for the secure communication of group in the subsequent network.
Claims (1)
1. but a self-healing and take the lead the cryptographic key distribution method that node cancels is characterized in that, supposes N={ N
1, N
2..., N
nBe all initial sets that participate in node in the group, and suppose that reversed node can not add network once more, is promptly cancelled node and has monotonicity, F
qBe a finite field, wherein q is a big prime number, and all mathematical operations are all at F
qIn carry out, establish H and H ' and be 0,1} → F
qOn band key hash function, n, t are system parameterss, the method concrete steps comprise as follows:
1) generation of secret information and node initializing: in the starting stage, the sensor node in the network has been divided into several groups according to their deployed position or function, to each group such as group
l, a shielding of base station selection at random multinomial
h l (x, y, z) ∈ F q (x, y, z),
Group
lIn node
N i To be deposited in privately owned secret
S i =h l (i, y, z), simultaneously, the base station will selection group randomly
lIn a node
N g As the head node of group, and deposited in the group secret information
G G, l ,
Next, head node N
gSelect a prime number as key seed at random
K 0 ∈ F q Generate the session key and secret preservation of group, then, head node N
gSelect an initial random number at random
s 0 ∈ F q N is got up in secret too preservation
gBe j session phase calculating of group again with one-way Hash function H
s j (
J 〉=1):
H j J Hash operation of (.) expression,
s 0 Be the seed key of one-way hash chain,
s j Group will be sent in confidence
lIn the node that is not cancelled;
2) secret information broadcasting: at j session phase of group, head node N
gProduce a random number earlier
As the self-healing secret information of the j time session, then, head node calculates the session key of group j session cycle with another one-way Hash function H ' ()
, here
------C,
Be located at j session cycle when beginning, base station and head node have all been known the malicious node set
,
,
,
s Max Be the predefined max-session periodicity of system, then, head node is broadcasted following message:
3) in j session, the checking of the recovery legitimacy of group session key and self-healing key: when a unrepealed node
N i Receive message
B j After, it will calculate according to equation D
A j (x)With
In a value at i place, thereby draw group
l jGroup key in the individual session:
Then, node
N i Calculate with equation D
Decrypt
Thereby, obtain the self-healing secret information
4) checking of self-healing property: suppose node
N i ∈ NAdd group j1 session phase, and j2 (
J1<j2) the individual session phase cancelled node by group
N i Receive the session secret information of broadcasting
B J1 (1≤j1) and
B J2 (1≤j1<j2), still lost the broadcast of j session phase
B j (j1<j<j2), when receiving broadcast
B J1 With
B J2 After, node
N i Can calculate corresponding session phase key with equation D
K J1 With
K J2 ; Then, node
N i With
K J2 Decrypt
Thereby, obtain j1 session phase to the self-healing secret information between j2 session phase
At last, node
N i Can recover the cluster conversation key that all are lost by following form with equation B:
5) adding of new node: when a newcomer after j session phase joins group, the session key of the interim group of session was not designated N with one now before it did not just allow to obtain
v∈
NNode join j session when interim, the manager of group such as head node will be node N
vDeposit message in
S v ={
s j , h l (v, g, z);
6) ordinary node and head node cancels
:
A) cancelling of ordinary node: when a reversed joint
N I ' When receiving broadcast message, promptly for any one node
N I ' ∈ R j , A j (i ')=0, can not calculate group key from our reversed as can be seen node of equation C;
B) cancelling of head node: in case a node N
uThe head node GH that detects its place group is captured or is worked not normally, and it is with node N
gDispose the same period enter network and also be ready to replace node N
gAnd become group
lNew head node, it can be initiated one and take turns the process of cancelling, so broadcast following message: Be-msg={ u, group header error type, group id
l, after other node among the group l receives these broadcasts, if certain node N
iAlso aware head node N
gMay be captured and be ready to select node N
uBe new head node, it will send message so
Msg (i, u)=
h l (i, u, s Max + 1)Give node N
u, here
s Max Be the predefined max-session periodicity of system and be disclosed parameter; Otherwise, node N
iThen can abandon node N
uBroadcast and do not do any response. as node N
uAfter receiving the answer message of its neighbor node, it can check whether the sender of message is cancelled, if node N
uSuccessfully obtained
2tIndividually do not cancelled the trust of node and receive interdependent answer message, it can calculate so
h l (x, u, s Max + 1), node N is issued in the base station during again in conjunction with deployment
uPrivate information
S u =h l (u, y, z), it will derive following multinomial:
So, node N
uWith head node N before
gJoin to be cancelled in the node set and get
, and select a key to generate seed at random
With
For generating, the key in next session cycle of its place group prepares, next, and node N
uCan be according to step 2) begin to provide the generation of key and self-healing to safeguard for the secure communication of group in the subsequent network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105048390A CN101951602A (en) | 2010-10-13 | 2010-10-13 | Key distribution method with self-healing and head node revoking functions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105048390A CN101951602A (en) | 2010-10-13 | 2010-10-13 | Key distribution method with self-healing and head node revoking functions |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101951602A true CN101951602A (en) | 2011-01-19 |
Family
ID=43454929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010105048390A Pending CN101951602A (en) | 2010-10-13 | 2010-10-13 | Key distribution method with self-healing and head node revoking functions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101951602A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957101A (en) * | 2014-05-15 | 2014-07-30 | 三星电子(中国)研发中心 | Group key establishing method in group communication |
CN104168320A (en) * | 2014-08-19 | 2014-11-26 | 三星电子(中国)研发中心 | User data sharing method and system |
CN111918229A (en) * | 2019-05-08 | 2020-11-10 | 普天信息技术有限公司 | Method, device and storage medium for transmitting information by wireless sensor |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101110670A (en) * | 2006-07-17 | 2008-01-23 | 西安电子科技大学 | Key management method based on wireless Mesh netword |
CN101699891A (en) * | 2009-10-21 | 2010-04-28 | 西安西电捷通无线网络通信有限公司 | Method for key management and node authentication of sensor network |
-
2010
- 2010-10-13 CN CN2010105048390A patent/CN101951602A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101110670A (en) * | 2006-07-17 | 2008-01-23 | 西安电子科技大学 | Key management method based on wireless Mesh netword |
CN101699891A (en) * | 2009-10-21 | 2010-04-28 | 西安西电捷通无线网络通信有限公司 | Method for key management and node authentication of sensor network |
Non-Patent Citations (3)
Title |
---|
《Systems and Networks Communications,2006.ICSNC"06.International Conference on》 20061231 Li Hui等 《A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks》 正文第2页第III节-第5页左栏倒数第8行 1 , * |
LI HUI等: "《A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks》", 《SYSTEMS AND NETWORKS COMMUNICATIONS,2006.ICSNC"06.INTERNATIONAL CONFERENCE ON》, 31 December 2006 (2006-12-31) * |
RATNA DUTTA等: "《Improved Self-Healing Key Distribution with Revocation inWireless Sensor Network》", 《WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE,2007.WCNC 2007.IEEE》, 15 March 2007 (2007-03-15), pages 2965 - 2970 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957101A (en) * | 2014-05-15 | 2014-07-30 | 三星电子(中国)研发中心 | Group key establishing method in group communication |
CN103957101B (en) * | 2014-05-15 | 2017-05-24 | 三星电子(中国)研发中心 | Group key establishing method in group communication |
CN104168320A (en) * | 2014-08-19 | 2014-11-26 | 三星电子(中国)研发中心 | User data sharing method and system |
CN111918229A (en) * | 2019-05-08 | 2020-11-10 | 普天信息技术有限公司 | Method, device and storage medium for transmitting information by wireless sensor |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100596063C (en) | Distributing system, method and device for group key control message | |
Li et al. | Group device pairing based secure sensor association and key management for body area networks | |
Li et al. | Secure ad hoc trust initialization and key management in wireless body area networks | |
JP2022017542A (en) | Device and method for resonant encryption | |
KR101486030B1 (en) | Method for combining authentication and secret keys management mechanism in a sensor network | |
CN103427998B (en) | The authentication of a kind of Internet data distribution and data ciphering method | |
CN103037367B (en) | Cipher hash computing based authentication method in wireless sensor network | |
CN101908961B (en) | Multi-party secret handshaking method in short key environment | |
CN102098318A (en) | Method for performing end-to-end anonymity safety communication of hop network | |
CN102006595B (en) | Key management method of wireless sensor network | |
CN103051457B (en) | A kind of method for building up of social networks group security communication | |
CN102487503B (en) | Method for managing multi-stage security dynamic group security keys | |
Castiglione et al. | An efficient and transparent one-time authentication protocol with non-interactive key scheduling and update | |
CN104754569A (en) | Wireless sensor network group key management method | |
Wu et al. | A new mutual authentication and key agreement protocol in wireless body area network | |
CN101951602A (en) | Key distribution method with self-healing and head node revoking functions | |
CN101702807A (en) | Wireless security access authentication method | |
Imamoto et al. | Design and analysis of diffie-hellman-based key exchange using one-time ID by SVO logic | |
Jiang et al. | Multiple Key Sharing and Distribution Scheme With $(n, t) $ Threshold for NEMO Group Communications | |
CN106714153A (en) | Key distribution, generation and reception method, and related device | |
Martucci et al. | A lightweight distributed group authentication mechanism | |
Kumar et al. | A Construction of Smart Grid Authentication and Key Agreement System Using ECC Cryptography | |
Moon et al. | Authentication protocol using an identifier in an ad hoc network environment | |
CN118509180B (en) | Dynamic encryption communication method and device | |
CN103546889A (en) | Wireless sensor network key management method based on power |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110119 |