CN103702325B - Lightweight wireless sensor network safety small data distribution method - Google Patents

Lightweight wireless sensor network safety small data distribution method Download PDF

Info

Publication number
CN103702325B
CN103702325B CN201310705568.9A CN201310705568A CN103702325B CN 103702325 B CN103702325 B CN 103702325B CN 201310705568 A CN201310705568 A CN 201310705568A CN 103702325 B CN103702325 B CN 103702325B
Authority
CN
China
Prior art keywords
packet
key
sensor node
mystery
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310705568.9A
Other languages
Chinese (zh)
Other versions
CN103702325A (en
Inventor
何道敬
黄子超
林涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN201310705568.9A priority Critical patent/CN103702325B/en
Publication of CN103702325A publication Critical patent/CN103702325A/en
Application granted granted Critical
Publication of CN103702325B publication Critical patent/CN103702325B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention discloses a lightweight wireless sensor network safety small data distribution method. The method comprises the following stages that: at a first stage, namely, a system initializing stage, a base station generates a one-way key chain, and adds a key chain commitment value into each sensor node before deploying each sensor node; at a second stage, namely, a data packet preprocessing stage, the base station constructs a legal data packet of specific data items by using a Hash function; at a third stage, namely, a data packet verification stage, each sensor node verifies the received data packet, the data packet is received and the sensor node is updated if the received data packet is a legal data packet, otherwise, the data packet is abandoned directly. Under the consideration of limitation on common sensor node resources, the lightweight wireless sensor network safety small data distribution method has the advantages of resistance to sensor node compromise, high robustness on the aspects of packet loss and data packet transmission out-of-sequence, no need of time synchronism between the base station and each sensor node, and the like. Meanwhile, the lightweight wireless sensor network safety small data distribution method has the excellent characteristics of high efficiency, saving in energy, low storage overhead, resistance to malicious attacks, and the like.

Description

The wireless sensor network security small data distribution method of lightweight
Technical field
The present invention relates to the technical field of radio communication, more particularly to a kind of wireless sensor network security of lightweight is little Data distributing method.
Background technology
At present, wireless sensor network is widely distributed, and application is also varied, including environmental monitoring, battlefield prison Depending on and data acquisition under harsh geographical environment.In wireless sensor network, can distribute small data in a network is One very useful operating function.It allows base station to write some little programs toward sensor node, orders, and inquiry and configuration are joined Number.It is emphasized that small data distribution protocol is different from the code distribution furtherd investigate(Also sometimes referred to as data Distribution is reprogrammed)Agreement.Code distribution is that new binary file is distributed in network, so as to realize complete system weight Programming.For example, the binary file for efficiently distributing tens of thousands of bytes needs code distribution agreement, and the several sizes of distribution are The configuration parameter of two bytes, needs small data distribution protocol.
Recently, some small data distribution protocols have been suggested.Wherein, Drip, DIP and DHV represent current level. In the environment of these agreements assume that wireless sensor network is operated in a trust, it is different from real practical situation.It is real In the situation of border, there may be attacker to intend the wireless sensor network of destruction operation.For example, when a wireless sensor network exists Remote districts work, to supervise unlawful activities, such as runs into gun unloading and illicit crop plantation, and attacker can be in the number of injection Include " net dormancy a very long time according to item(network dormancy for a long period)" order, so as to Close control function.
Therefore, the legitimacy of the data item of checking distribution is extremely important, and such sensor node can be verified from trusted The data item in the source appointed, and ensure that data item is not modified in transmitting procedure.Therefore, sensor node is needed by certification machine System, to guarantee that these are had not changed as from the data of the project of trusted sources in transportation.
Under normal circumstances, certification broadcast depends on digital signature(For example, the Rivest, Shamir, and Adleman (RSA) signs and Elliptic Curve Cryptography (ECC) signs)With their reinforcement variant version (For example, group ranking, ring signatures, Proxy Signature), mixed method and symmetric key encryption.Unfortunately, they are serving really When protecting small data distribution, also there are some security breaches and efficiency.For example, digital signature verification technology can cause very high meter Calculate and storage overhead, therefore, the method is not suitable for the sensor node of resource-constrained.
The content of the invention
It is an object of the invention to overcome the shortcoming and deficiency of prior art, there is provided a kind of wireless sensor network of lightweight The safe small data distribution method of network, it is ensured that the efficiency of small data distribution procedure and safety.
In order to achieve the above object, the present invention is employed the following technical solutions:
The wireless sensor network security small data distribution method of lightweight, including following three stage:
First stage:System initialisation phase, base station generate one-way key chain, and will before each sensor node deployment Key chain commitment value (key chain commitment) is added in each sensor node;
Second stage:Processing stage the early stage of packet, need to send the base station of data or sensor node utilizes Hash Function H (.), builds the legal data packet of specific data item;
Phase III:The packet authentication stage:Sensor node is verified to the packet for receiving, if received Packet be legal packet, then receive the packet and sensor node be updated, otherwise directly abandon the number According to bag.
The first stage comprises the following steps:
A, base station select a random number Kb
B, according to KbAn one-way key chain is generated, by K0,K1,…KbComposition, wherein Kj=H (Kj+1) (j=b-1, b- 2,…,0);
C, base station predistribution key chain, it is ensured that key chain commitment value K0Filled before sensor node network deployment It is downloaded in each sensor node.
In step B, described one-way key chain generation method is, using base station selected random number as one-way key chain Head node, the mystery key on each key chain node thereafter cross hash function by the mystery push-to on previous key chain node Carry out Hash and obtain, the length of one-way key chain can be it is arbitrary, but no less than in network lifecycle base station will point The data item number sent out.
The second stage is comprised the following steps:
I, for each wheel data distribution, it is assumed that for jth wheel, base station uses mystery key(puzzle key)Kj
II, by data item djIt is on duty by turns(round)It is set to j;
III, data item djAnd mystery key(puzzle key)KjConstitute a mystery with particular message(puzzle).
IIII, the above-mentioned mystery with particular message(puzzle)L is answered effectively with onejAlong with packet header(packet header)Constitute a legal packet(packet).One of them effectively answers LjSuch a number is referred to, it causes The front l positions of the Hash result of payload are all 0.Here payload refers to by mystery(puzzle)With answer LjThe item of composition, l Referred to as intensive parameter, its value are determined by base station.
Data item four-tuple in IIIII, step II(Round, key, version, data)It is to represent, on duty by turns here (round)Represent the distribution newness degree of data item(Round values are bigger, and the distribution of data item is newer), marking variable(key)Only One mark variable to be updated, version number(version)Represent the newness degree of data item(Version values are bigger, data item It is newer), data(data)Represent data to be distributed.
The phase III comprises the following steps:
A, sensor node receive a packet P from any one adjacent jump set sensor node or base stationi
B, checking receive packet it is on duty by turns(round), so that it is determined that the distribution of the packet is new and old(It is possible to as new One wheel distribution, same wheel distribution or old wheel distribution);
If c, packet are the packets of new round distribution, verification step is as follows:
1)Checking bag PjIn mystery key(puzzle key)KjIt is using effective hash function H (.) and key chain commitment value K0The result that obtains and verify that the mystery key was not used by any one valid data item before, if by checking, 2 are performed then), otherwise perform 5).
2)Check H (Pj) front l positions whether be 0, if front l positions be 0, perform 3), otherwise perform 5).
3)Check PjMiddle version number(version)And marking variable(key)Effectiveness, that is, confirm as redaction, such as Fruit confirms as redaction, then perform 4), otherwise perform 5).
4)According to the marking variable of packet(key)To update the data, while using PjIt is corresponding on duty by turns in bag(round)With Mystery key(puzzle key)It is on duty by turns come update that it is stored(round)With mystery key(puzzle key).
5)Abandon the packet.
If on duty by turns in d, packet(round)Currently stored with node is on duty by turns(round)Equal, i.e., node is current The packet that receives belongs to same wheel distribution with the last packet for receiving, then by Trickle algorithms increasing distribution Time interval;
If e, packet are the packets of old wheel distribution, the data stored by sensor node distribution its own Bag.
We provide the wireless sensor network security small data distribution method of lightweight(It is referred to as LightDrip, under Together), this method ensure that efficiency and the safety of small data distribution procedure.
Different from DIP and DHV, Drip is distributed each data item as an independent entity, thus logarithm There is preferably control according to the distribution time and speed of item.Here, energy is mainly concentrated on safe Drip agreements by us. In LightDrip, we are by the tlv triple of Drip(Key, version, data)It is extended to four-tuple(Round, key, Version, data)To represent a data item, round here represents the distribution newness degree of data item(Round values are got over Greatly, the distribution of data item is newer), and other three elements there is identical implication, i.e. key unique marks to want with existing protocol The variable being updated, version represent the newness degree of data item(Version values are bigger, and data item is newer), data is represented will The data of distribution.Especially, we illustrate how using its efficient basis distribution policy to develop a safety of Drip Extension(That is, Trickle).Obviously, same method can also be used for providing safety protection, example for other small data distribution protocols Such as DIP and DHV, between them, only difference is that how to search for different data item to realize efficiently between sensor node Message is transmitted.
We concentrate the security mechanism of research lightweight, design our agreement to share process as much as possible for base station Work.This agreement was made up of three stages:System initialization, the early stage of packet are processed, packet authentication.Hold before on-premise network Row system initialisation phase.In this stage, one-way key chain is set up in base station, and ensures for key chain commitment value to be loaded into each biography Sensor node.Then, before data distribution, base station is by answering mystery(puzzle)Information, obtains one and effectively answers, so Packet is constructed for data item afterwards, processing stage performing the early stage of packet.In the last stage, packet authentication rank Section, each sensor node individual authentication each packet for receiving.If the verification passes, then according to the data for receiving Updated data package.
In terms of safety and efficiency, security system of the LightDrip ratios based on PKC, mixed method, and based on symmetrical The Security solution of Key Encryption Technology is more particularly suitable.
The present invention is had the following advantages relative to prior art and effect:
(1)The compromise of opposing sensor node:No matter how many sensor node is destroyed, as long as not impaired biography The subset of sensor node remains to form a connected graph with base station, then agreement just has opposing bullet to the compromise of sensor node Property;
(2)There is high robust on packet loss and packet transmission are out-of-sequence:It is relatively large number of in wireless sensor network The arrival of data-bag lost event and out of order packet needs to tolerate what high rate of data loss and out of order packet were transmitted Design;
(3)Do not need between base station and sensor node temporal synchronous:Do not require between base station and sensor node It is synchronous.Therefore, without assume packet reach time interval, once packet is sent to sensor node, it can at once by Checking.
(4)Other advantages:It is energy-efficient(For communication and calculating), relatively low storage overhead can resist malicious attack etc..
Description of the drawings
Fig. 1 is the flow chart of the present invention.
Fig. 2 is the formation schematic diagram of one-way key chain.
Fig. 3 is the pie graph of the encrypted packet with particular message.
Specific embodiment
With reference to embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited In this.
Embodiment
As shown in figure 1, this agreement is divided into system initialization, the early stage of packet is processed and packet authentication three phases, It is specific as follows:
First stage:System initialisation phase, base station generate one-way key chain, and will before each sensor node deployment Key chain commitment value is added in sensor node;
Second stage:Processing stage the early stage of packet, base station utilizes hash function, builds the legal number of specific data item According to bag;
Phase III:Packet authentication stage, sensor node are verified to the packet for receiving, if received Packet be legal packet, then receive the packet and sensor node be updated, otherwise directly abandon the number According to bag.
In system initialisation phase, as shown in Fig. 2 a random number K is selected in base stationb, then generate an one-pass key Chain, by K0,K1,…KbComposition, wherein Kj=H (Kj+1) (j=b-1, b-2 ..., 0).Then, base station predistribution key chain, it is ensured that Key chain commitment value K0It was added in each sensor node before sensor node network deployment.Key K0,K1,…KbClaim For mystery key(puzzle key), mystery key(puzzle key)KjDistribute for jth wheel, wherein j > 0.Here length b of every chain It can be arbitrary, but the data item number that base station will be distributed no less than in network lifecycle.
In LightDrip, we are by the tlv triple of Drip(Key, version, data)It is extended to four-tuple(Round, Key, version, data)To represent a data item, round here represents the distribution newness degree of data item(Round values Bigger, the distribution of data item is newer), and other three elements have identical implication, i.e. key unique marks with existing protocol Variable to be updated, version represent the newness degree of data item(Version values are bigger, and data item is newer), data represents Data to be distributed.As the realization of Drip, marking variable(key)And version number(version)Length be respectively 2 bytes With 4 bytes.Their byte length can be arranged long enough, for example, 4 bytes, to avoid in wireless sensing by each wheel In device Network morals, they are looped around certain real number space always.However, in order to reduce expense, if surround(wrap around)If permission, it is possible to use the length of each byte 4.As expected distribution rate is not very high, it is allowed to ring Around(wrap around)The ambiguity on any sensor node should be unable to be caused.
After completion system initial phase, into packet early stage processing stage.If distribution such is thought in base station Individual data item:D={ round, key, version, data }, it can perform following steps to build the packet of d.Hereinafter, H (M) represents the cryptographic Hash of message M.
For each wheel, it is assumed that for jth wheel, base station uses mystery key(puzzle key)Kj, then by data item dj's Round values are set to j.Data item djAnd mystery key(puzzle key)KjConstitute a mystery with particular message(puzzle). As shown in figure 3, one is effectively answered LjFor to (dj‖Kj‖Lj) when applying hash function H (.), as a result front l positions of mirror image It is all 0.Parameter l determines mystery(puzzle)Intensity.Base station determines the value of l, and all of biography is loaded into before deployment In sensor node.Before packet is sent, base station is attempted by finding mystery(puzzle)Answer LjTo solve the mystery (puzzle).Subsequently, final packet P can be distributed in base stationj, it is by packet header and payload (dj‖Kj‖Lj) composition.
Three phases are the packet authentication stages.When sensor node receives a packet(The packet from Any one adjacent jump set sensor node or base station receive), each sensor node, it is assumed that for Si, perform following behaviour Make:
(1)If this is new round distribution(That is, it is on duty by turns in the packet for receiving(round)More than what is stored (Round, puzzle key)In it is on duty by turns(round)), sensor node SiThere is following checking order:
a)Checking bag PjIn mystery key(puzzle key)KjIt is using effective hash function H (.) and key chain commitment value K0The result that obtains and verify that the mystery key was not used by any one valid data item before, if by checking, B is performed then), otherwise perform e).
b)Check H (Pj) front l positions whether be 0, if front l positions be 0, perform c), otherwise perform e).
c)Check PjMiddle version number(version)And marking variable(key)Effectiveness, that is, confirm as redaction, such as Fruit confirms as redaction, then perform d), otherwise perform e).
d)According to the marking variable of packet(key)To update the data, while using PjIt is corresponding on duty by turns in bag(round)With Mystery key(puzzle key)It is on duty by turns come update that it is stored(round)With mystery key(puzzle key).
e)Abandon the packet.
(2)If sensor node SiOnce one was received recently distributed new and old identical packet with which(That is, receive Packet in it is on duty by turns(round)It is on duty by turns equal to what is stored(round)), it can increase distribution by Trickle algorithms Time interval.So when network is consistent, the energy expenditure of sensor node can be reduced by this method.
(3)If having currently encountered old wheel distribution(That is, it is on duty by turns in the packet for receiving(round)Less than depositing That what is stored up is on duty by turns(round)With mystery key(puzzle key)In it is on duty by turns(round)), that is to say, that its adjacent jump set sensor The packet distributed by node is old, then sensor node SiDistribute the packet stored by it.
The implication that technical term relevant in the present invention is represented is as follows:
KjRepresent the mystery key of jth wheel distribution(puzzle key);
djRepresent the content of j-th data item;
PjRepresent j-th packet;
H(Pj) represent packet PjCryptographic Hash;
LjRepresent that one, jth wheel is effectively answered.
Above-described embodiment is the present invention preferably embodiment, but embodiments of the present invention not by above-described embodiment Limit, other any spirit without departing from the present invention and the change, modification, replacement made under principle, combine, simplification, Equivalent substitute mode is should be, is included within protection scope of the present invention.

Claims (7)

1. the wireless sensor network security small data distribution method of lightweight, it is characterised in that include such as the next stage:
First stage:System initialisation phase, in this stage, one number of base station random choose, generates one unidirectionally according to the number Key chain, and key chain commitment value is added in each sensor node before each sensor node deployment;
Second stage:Processing stage the early stage of packet, hash function is utilized in this stage base station, that what is distributed as needed is specific Small data item, construct a legal data packet for belonging to the data item;
Phase III:Packet authentication stage, sensor node are verified to the packet for receiving, if the number for receiving It is legal packet according to bag, then receives the packet and sensor node is updated, otherwise directly abandon the packet;
The phase III comprises the following steps:
A, sensor node receive a packet from any one adjacent jump set sensor node or base station;
The packet that b, sensor node checking are received it is on duty by turns, so that it is determined that the distribution of the packet is new and old, if newly One wheel distribution, then execution step c, if same wheel distribution, then execution step d, if old wheel distribution, then execution step e;
If c, the packet for receiving are the packets of new round distribution, sensor node performs the checking step of packet Suddenly;The concrete grammar of the verification step that sensor node is performed is as follows:
1) verify that the mystery key in packet is that the result and checking being worth to is promised to undertake using effective hash function and key chain The mystery key was not used by any one valid data item before, if by checking, performing 2), otherwise performing 5);
2) value of the intensive parameter determined according to base station, before checking the packet cryptographic Hash some positions be zero digit whether with this Intensive parameter is equal, if equal, performs 3), otherwise performs 5);
3) effectiveness of version number and marking variable in the packet is checked, that is, confirms as redaction, if it is confirmed which is new 4) version, then perform, otherwise perform 5);
4) according to the marking variable of the packet updating the data, while with corresponding on duty by turns and mystery key in packet come more new biography The on duty by turns and mystery key stored by sensor node;
5) abandon the packet for receiving;
If d, the packet for receiving and current data packet belong to same wheel distribution, increase the number by Trickle algorithms According to the time interval of bag distribution;
If e, the packet for receiving are the packets of old wheel distribution, the number stored by sensor node distribution its own According to bag.
2. the wireless sensor network security small data distribution method of lightweight according to claim 1, it is characterised in that institute Stating the first stage comprises the steps:
A, base station select a random number;
B, base station generate an one-way key chain according to the random number using hash function, and the key on key chain is referred to as mystery Key;
C, base station are loaded into key chain commitment value in each sensor node, and last mystery key of wherein one-way key chain claims For key chain commitment value.
3. the wireless sensor network security small data distribution method of lightweight according to claim 2, it is characterised in that step In rapid B, described one-way key chain generation method is, using base station selected random number as the head node of one-way key chain, its The mystery key on each key chain node afterwards crosses hash function by the mystery push-to on previous key chain node carries out Hash And obtain, the length of one-way key chain can be arbitrary, but data that base station will be distributed no less than in network lifecycle Item number.
4. the wireless sensor network security small data distribution method of lightweight according to claim 1, it is characterised in that institute State second stage to comprise the following steps:
I, for each wheel data distribution, base station is using mystery key corresponding with the wheel distribution;
II, by the round for being set to the wheel on duty by turns of the data item wheel to be distributed;
III, wheel data item to be distributed and mystery key constitute a mystery with particular message;
Effectively answer adds packet header one legal packet of composition for IIII, the above-mentioned mystery with particular message and one; One of them is effectively answered and refers to such a number, and it causes payload after Hash, some before Hash result Position is zero, and zero digit is referred to as intensive parameter here.
5. the wireless sensor network security small data distribution method of lightweight according to claim 4, it is characterised in that In step I, from the beginning of the key chain commitment value of one-way key chain, we start from scratch to the mystery key on one-way key chain is carried out Numbering, when data distribution is carried out, according to current distribution round, we are using the mystery key that numbering is the round.
6. the wireless sensor network security small data distribution method of lightweight according to claim 4, it is characterised in that step In rapid II, described data item includes on duty by turns, marking variable, version number and data;Wherein, duty roster shows that the distribution of data item is new Old degree, marking variable unique mark variable to be updated, version number represent the newness degree of data item, and data are represented will divide The data sent out.
7. the wireless sensor network security small data distribution method of lightweight according to claim 4, it is characterised in that step Rapid payload described in IIII refers to the item being made up of mystery and the answer, and the value of intensive parameter is determined by base station.
CN201310705568.9A 2013-12-19 2013-12-19 Lightweight wireless sensor network safety small data distribution method Active CN103702325B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310705568.9A CN103702325B (en) 2013-12-19 2013-12-19 Lightweight wireless sensor network safety small data distribution method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310705568.9A CN103702325B (en) 2013-12-19 2013-12-19 Lightweight wireless sensor network safety small data distribution method

Publications (2)

Publication Number Publication Date
CN103702325A CN103702325A (en) 2014-04-02
CN103702325B true CN103702325B (en) 2017-04-19

Family

ID=50363699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310705568.9A Active CN103702325B (en) 2013-12-19 2013-12-19 Lightweight wireless sensor network safety small data distribution method

Country Status (1)

Country Link
CN (1) CN103702325B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141620A (en) * 2015-09-16 2015-12-09 华东师范大学 Small data distribution method enabling wireless sensor network security and denial of service attack defense
CN107294932B (en) * 2016-04-12 2019-11-15 中国电信股份有限公司 Method and server for centralized control type key management
CN105848150B (en) * 2016-05-19 2019-07-26 华东师范大学 A kind of wireless sensor network grouping small data safety distributing method
CN106792665A (en) * 2016-12-19 2017-05-31 华东师范大学 Wireless sensor network security small data distribution method based on short and small public-key cryptosystem

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005459A (en) * 2007-01-18 2007-07-25 西安电子科技大学 Radio sensor access control method based on key chain
CN101044754A (en) * 2004-11-12 2007-09-26 三星电子株式会社 Method of managing user key for broadcast encryption
CN101742490A (en) * 2009-12-02 2010-06-16 浙江大学 Safe and effective method for dynamically updating wireless sensor network program
CN103368731A (en) * 2013-07-23 2013-10-23 华南理工大学 Wireless sensor network security data discovery and dissemination method based on Hash tree

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101044754A (en) * 2004-11-12 2007-09-26 三星电子株式会社 Method of managing user key for broadcast encryption
CN101005459A (en) * 2007-01-18 2007-07-25 西安电子科技大学 Radio sensor access control method based on key chain
CN101742490A (en) * 2009-12-02 2010-06-16 浙江大学 Safe and effective method for dynamically updating wireless sensor network program
CN103368731A (en) * 2013-07-23 2013-10-23 华南理工大学 Wireless sensor network security data discovery and dissemination method based on Hash tree

Also Published As

Publication number Publication date
CN103702325A (en) 2014-04-02

Similar Documents

Publication Publication Date Title
Alladi et al. SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication
CN105228157B (en) A kind of wireless sensor network security light weight reprogramming method
CN108075890A (en) Data sending terminal, data receiver, data transmission method and system
CN103702325B (en) Lightweight wireless sensor network safety small data distribution method
CN103079198B (en) The key updating method and system of sensor node
He et al. Secure and distributed data discovery and dissemination in wireless sensor networks
CN114157415A (en) Data processing method, computing node, system, computer device and storage medium
Lee et al. Flexicast: Energy-efficient software integrity checks to build secure industrial wireless active sensor networks
Mtetwa et al. Secure firmware updates in the internet of things: A survey
CN103368731B (en) Wireless sensor network security data based on Hash tree find and transmission method
CN101789939B (en) Effective realization method for credible OpenSSH
CN115001723B (en) Group communication method and system based on tree structure and asymmetric key pool
CN109474438A (en) It is a kind of based on the intelligent terminal access authentication method selectively revealed
CN105848150B (en) A kind of wireless sensor network grouping small data safety distributing method
CN101834852B (en) Realization method of credible OpenSSH for protecting platform information
CN106792665A (en) Wireless sensor network security small data distribution method based on short and small public-key cryptosystem
Ghormare et al. Implementation of data confidentiality for providing high security in wireless sensor network
Mtetwa et al. OTA firmware updates for LoRaWAN using blockchain
Sivaraman et al. Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
Bagheri et al. Defending industry 4.0: an enhanced authentication scheme for IoT devices
CN103686715B (en) Lightweight secrete discovery and dissemination method for wireless body area network safety data
Hu et al. A Random Label and Lightweight Hash‐Based Security Authentication Mechanism for a UAV Swarm
CN103823691B (en) The online reprogramming method of wireless sensor network security based on network code
CN105141620A (en) Small data distribution method enabling wireless sensor network security and denial of service attack defense
Liu et al. A lightweight code-based authentication protocol for RFID systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant