CN103929744B - A kind of key management method of wireless sensor network - Google Patents
A kind of key management method of wireless sensor network Download PDFInfo
- Publication number
- CN103929744B CN103929744B CN201410134463.7A CN201410134463A CN103929744B CN 103929744 B CN103929744 B CN 103929744B CN 201410134463 A CN201410134463 A CN 201410134463A CN 103929744 B CN103929744 B CN 103929744B
- Authority
- CN
- China
- Prior art keywords
- node
- cluster
- key
- leader cluster
- velskii
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000007726 management method Methods 0.000 title claims abstract description 15
- 241000854291 Dianthus carthusianorum Species 0.000 claims description 4
- 238000000034 method Methods 0.000 claims description 4
- 238000012217 deletion Methods 0.000 claims description 2
- 230000037430 deletion Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 claims 1
- 230000015572 biosynthetic process Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000005265 energy consumption Methods 0.000 description 2
- 101000896740 Solanum tuberosum Cysteine protease inhibitor 9 Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000004576 sand Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of key management method of wireless sensor network, including base station is all the sensors node distribution public private key pair according to the parameter for setting;Leader cluster node is elected from all the sensors node;The leader cluster node for electing sends information to ambient sensors node, and ambient sensors node chooses the leader cluster node of oneself according to information, forms cluster;Base station is the self-balancing binary search tree of each fasciation cluster inner sensor node(Adelson-Velskii-Landis tree);The information of other sensors node is inquired about between cluster inner sensor node according to Adelson-Velskii-Landis tree, exchange information is simultaneously mutually authenticated public key legitimacy, session key is shared after certification success.The present invention utilizes Adelson-Velskii-Landis tree mode storage of public keys and identity information, reduces search time and consumption;Encryption key distribution and management are realized using elliptic curve cryptosystems, network security higher has both been can guarantee that, computing cost can be as far as possible reduced again.
Description
Technical field
The invention belongs to technical field of network security, more particularly to a kind of key management method of wireless sensor network.
Background technology
Wireless sensor network is a large amount of sensor nodes composition being deployed in certain area, by wireless
The mode of communication forms an ad hoc network system for multi-hop, is generally deployed in unattended environment, even enemy
Region.Because wireless sensor network has such opening, the communication between node is caused easily to be eavesdropped, distorted or weight
Put, node itself is subject to capture, replicate or forge etc. attacks, so ensureing that network security turns into the research of wireless sensor network
One of emphasis, key management is then the basis for realizing wireless sensor network security.Due to the calculating energy of each sensor node
Power and storage capacity are limited, network topology dynamic change, and communication bandwidth is not enough so that existing some standardized key managements
Scheme, such as Diffie-Hellman IKEs, based on the scheme of KDC KDC, PKIX PKI etc.
Cannot be directly applied on wireless sensor network.Therefore a kind of new key management in Wireless Sensor Network is especially needed
Carry out the safety of Logistics networks.
The content of the invention
Goal of the invention:The present invention is intended to provide a kind of key management method of wireless sensor network.
Technical scheme:A kind of key management method of wireless sensor network, methods described includes:
(1)Base station is all the sensors node distribution public private key pair according to the parameter for setting;
(2)Leader cluster node is elected from all the sensors node;
(3)The leader cluster node for electing sends information to ambient sensors node, and ambient sensors node is selected according to information
Oneself leader cluster node is taken from, cluster is formed;
(4)Base station is the Adelson-Velskii-Landis tree of each fasciation cluster inner sensor node;
(5)The information of other sensors node is inquired about between cluster inner sensor node according to Adelson-Velskii-Landis tree, information is exchanged simultaneously mutually
Certification public key legitimacy, session key is shared after certification success.
Also include that new sensor node adds step:New sensor node sends application to the leader cluster node that need to be added first
Message, leader cluster node by the message with base station is transmitted to after the private key encryption of oneself, to new sensor node verify by base station,
Will confirm that message and new cluster interior nodes Adelson-Velskii-Landis tree are sent to leader cluster node after being verified, the tree is transferred to cluster by leader cluster node
Inner sensor node, new sensor node and neighbours' sensor node negotiating about cipher key shared.
Also include sensor node delete step:It is captured or energy when leader cluster node detects a certain sensor node
When exhausting, the sensor node is deleted, now leader cluster node sends sensor node information to base station, and base station regenerates the cluster
Adelson-Velskii-Landis tree and be sent to leader cluster node, leader cluster node update cluster inner sensor node Adelson-Velskii-Landis tree.
Also include key updating step:In the step(5)Between middle sensor node after negotiating about cipher key shared, sensor section
Point sets key usage cycles T, after elapsed time T, sensor node repeat step(5)More new session key.
Beneficial effect:The present invention utilizes self-balancing binary search tree(Adelson-Velskii-Landis tree)Mode storage of public keys and identity information, are reduced
Search time and consumption.Encryption key distribution and management are realized using elliptic curve cryptosystems, both can guarantee that network is higher
Security, can as far as possible reduce computing cost again.Using elliptic curve cryptography method, compared to common public key algorithm, can be used compared with
Short key realizes identical security, can preferably be applied to and require wireless sensor network higher to storing and calculating.
Using the ID and public key value of Adelson-Velskii-Landis tree storage sensor node, search time can be largely reduced, improve system effectiveness, reduce energy
Consumption.The present invention is also provided with regular key updating, can further improve the security of network, and with stronger expansible
Property, it is allowed to the addition and deletion of sensor node.
Brief description of the drawings
Fig. 1 is flow chart of the invention;
Fig. 2 is key agreement interaction schematic diagram between cluster inner sensor node of the present invention;
Fig. 3 is Adelson-Velskii-Landis tree generation of the present invention and inquiry schematic diagram.
Specific embodiment
The invention is described in further details below in conjunction with the accompanying drawings.
1st, network formation stages:
Referring to Fig. 1, the present invention is divided into 5 steps in network formation stages.
(1-1)Cipher key pre-distribution:
Base station sets certain parameter, and is all nodes(Including all leader cluster nodes and sensor node)Distribution public key
QiWith private key Si, and be stored in node.Base station generates initial shared key Ki, it is preset in all nodes.
(1-2)Leader cluster node is elected:
For the high energy consumption cost for ensuring data transfer is uniformly shared on all of sensor node, we use
LEACH algorithms elect leader cluster node from all of sensor node.Specific practice is:Each sensor node is sequentially generated
A random number between 0 to 1, first sensor node less than threshold values T (n) just turns into when the leader cluster node of front-wheel.
The computing formula of threshold values T (n) is:
Wherein, n represents sensor node, and C is the node set for not being elected to leader cluster node during this wheel is circulated, n ∈ C tables
Show that the sensor node was not elected to leader cluster node, P is the percentage that desired leader cluster node number is accounted in all the sensors node
Than r is election wheel number.
(1-3)Cluster formation stages:
The node of elected cluster head is entered after the ID and public key of oneself are encrypted using initial shared key to ambient sensors node
Row broadcast, after neighbours' sensor node receives message, the ID and public key for obtaining cluster head is decrypted using initial key, then
The leader cluster node of oneself can be selected according to signal intensity, signal to noise ratio etc., self ID and public key are then sent to leader cluster node,
Leader cluster node stores all the sensors nodal information tabulation in its cluster.
(1-4)Cluster Adelson-Velskii-Landis tree is generated:
The ID and list of public keys of cluster inner sensor node are sent to base station by leader cluster node, and base station is made into Adelson-Velskii-Landis tree
After return to each leader cluster node.The tree is broadcast to cluster inner sensor node by leader cluster node.
(1-5)Cluster inner sensor node key is consulted:
As shown in Fig. 2 sensor node A then inquires about the public key value of B to be communicated with sensor node B in Adelson-Velskii-Landis tree table,
And randomly generate for communicate session key KS, first by KSWith timestamp with the private key encryption of A again with the ID and public key of A together
With being sent to B after the public key encryption of B.B receives message and is decrypted with the private key of oneself, and verifies that the public key of A is closed in Adelson-Velskii-Landis tree table
Method, can use the public key decryptions session key K of A if legalSAnd timestamp, when the identity of A is verified with this and being verified
Between stab T and prevent multi-sending attack.B uses the private key encryption session key K of oneselfSWith timestamp ID and public key one again with oneself
Rise and be sent to A using session key, A is received after message with the identity of same step certification B.So far A and B are completed
It is mutually authenticated, and shared session key KS。
2nd, the network operation stage:
(2-1)New sensor node is added:
If there is new sensor node to add network, new node to be first stored in current cluster head list, sensor section in base station
The message that application is added is sent to the leader cluster node that need to be added first after point deployment, leader cluster node is by the message with the private key of oneself
Base station is transmitted to after encryption, base station is verified to new sensor node, message and new cluster internal segment are will confirm that after being verified
Point Adelson-Velskii-Landis tree is sent to leader cluster node, and the tree is broadcast to cluster inner sensor node by leader cluster node(Including the new sensor section for adding
Point), the new sensor node for adding just can be with neighbours' sensor node negotiating about cipher key shared.
(2-2)Sensor node is deleted:
If leader cluster node detect that a certain sensor node is captured or depleted of energy if need to delete the sensor node,
Now leader cluster node sends sensor node information to base station, and base station regenerates the Adelson-Velskii-Landis tree of the cluster and is sent to leader cluster node,
Leader cluster node updates cluster inner sensor node Adelson-Velskii-Landis tree.
(2-3)Key updating
To ensure that network has security higher, session key needs to change new key in use for some time.In rank
1 step of section(5)Between middle sensor node after negotiating about cipher key shared, sensor node sets key usage cycles T, elapsed time T
Afterwards, the step of sensor node duplication stages 1(5)More new session key.
Because wireless sensor network scale is generally than larger, a certain sensor node is searched in a large amount of sensor nodes
ID and public key value information will expend many times.And stored according to Adelson-Velskii-Landis tree and searching data, can greatly reduce search
Time, reduce and calculate consumption.For example searched in n sensor node a certain sensor node need average specific compared with(n+1)/ 2 times,
I.e. time complexity is O (n).According to Adelson-Velskii-Landis tree, its time complexity is O (log2n)。
The step of stage 1(4)Used in Adelson-Velskii-Landis tree generation and inquiry as shown in figure 3, by the ID and public affairs of sensor node
Key value generates Adelson-Velskii-Landis tree according to following rule:The value of all nodes is respectively less than the value of root node on left subtree;All sections on right subtree
The value of point is all higher than the value of root node;The difference of the height of the left and right subtree of any node of tree is no more than 1;The left and right subtree of tree
Also as above rule is all met.If a certain element need to be searched in the figure, citing:Search node 28 and 71.Search 28 first and root
Node 54 compares size, is then searched to the left less than root node, compares with 17 then searched to the right more than 17 to the left, then be eventually found
28。
Claims (4)
1. a kind of key management method of wireless sensor network, it is characterised in that methods described includes:
(1) base station is all the sensors node distribution public private key pair according to the parameter for setting;
(2) leader cluster node is elected from all the sensors node;
(3) leader cluster node for electing sends information to ambient sensors node, and ambient sensors node is selected from according to information
Oneself leader cluster node, forms cluster;
(4) base station is the Adelson-Velskii-Landis tree of each fasciation cluster inner sensor node;Leader cluster node is by the ID and public affairs of cluster inner sensor node
Key list is sent to base station, and base station returns to each leader cluster node after being made into Adelson-Velskii-Landis tree;Leader cluster node broadcasts the Adelson-Velskii-Landis tree
Give cluster inner sensor node;
(5) information of other sensors node is inquired about between cluster inner sensor node according to Adelson-Velskii-Landis tree, exchange information is simultaneously mutually authenticated
Public key legitimacy, session key is shared after certification success.
2. key management method of wireless sensor network according to claim 1, it is characterised in that also including new sensor
Node adds step:New sensor node sends solicitation message to the leader cluster node that need to add first, and leader cluster node is by the message
With base station is transmitted to after the private key encryption of oneself, base station is verified to new sensor node, and message is will confirm that after being verified
And new cluster interior nodes Adelson-Velskii-Landis tree is sent to leader cluster node, the tree is transferred to cluster inner sensor node, new sensor by leader cluster node
Node and neighbours' sensor node negotiating about cipher key shared.
3. key management method of wireless sensor network according to claim 1, it is characterised in that also including sensor section
Point deletion step:When leader cluster node detects captured a certain sensor node or depleted of energy, the sensor section is deleted
Point, now to base station transmission sensor node information, base station regenerates the Adelson-Velskii-Landis tree of the cluster and is sent to cluster head section leader cluster node
Point, leader cluster node updates cluster inner sensor node Adelson-Velskii-Landis tree.
4. key management method of wireless sensor network according to claim 1, it is characterised in that also including key updating
Step:Between sensor node in the step (5) after negotiating about cipher key shared, sensor node sets key usage cycles T, warp
After crossing time T, sensor node repeat step (5) more new session key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410134463.7A CN103929744B (en) | 2014-04-03 | 2014-04-03 | A kind of key management method of wireless sensor network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410134463.7A CN103929744B (en) | 2014-04-03 | 2014-04-03 | A kind of key management method of wireless sensor network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103929744A CN103929744A (en) | 2014-07-16 |
CN103929744B true CN103929744B (en) | 2017-06-23 |
Family
ID=51147793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410134463.7A Expired - Fee Related CN103929744B (en) | 2014-04-03 | 2014-04-03 | A kind of key management method of wireless sensor network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103929744B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883372B (en) * | 2015-06-19 | 2018-11-16 | 中国电子科技集团公司第五十四研究所 | A kind of data transmission method of anti-fraud and attack resistance based on mobile Ad hoc network |
CN106209384B (en) * | 2016-07-19 | 2019-09-10 | 上海电享信息科技有限公司 | Use the client terminal of security mechanism and the communication authentication method of charging unit |
CN108235402B (en) * | 2016-12-14 | 2021-07-13 | 扬州大学 | Wireless sensor network routing protocol based on improved tree type clustering |
CN108694186A (en) * | 2017-04-07 | 2018-10-23 | 阿里巴巴集团控股有限公司 | Data transmission method for uplink and server application, computing device and computer-readable medium |
CN110855435B (en) * | 2019-11-14 | 2022-04-19 | 北京京航计算通讯研究所 | Access control method based on attribute cryptosystem in wireless sensor network |
CN111278009B (en) * | 2020-02-18 | 2022-09-27 | 金陵科技学院 | Key distribution method based on physical unclonable function in wireless sensor network |
CN112887947B (en) * | 2021-01-14 | 2021-12-03 | 南通大学 | Bluetooth Mesh clustering networking method for double-layer block chain |
CN114679723B (en) * | 2022-03-16 | 2024-04-26 | 国网江苏省电力有限公司电力科学研究院 | Perception layer key management method and device based on credibility |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101110670A (en) * | 2006-07-17 | 2008-01-23 | 西安电子科技大学 | Key management method based on wireless Mesh netword |
CN102123393A (en) * | 2011-03-08 | 2011-07-13 | 东南大学 | Secret key management method for distributed wireless sensor network based on one-way function |
-
2014
- 2014-04-03 CN CN201410134463.7A patent/CN103929744B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101110670A (en) * | 2006-07-17 | 2008-01-23 | 西安电子科技大学 | Key management method based on wireless Mesh netword |
CN102123393A (en) * | 2011-03-08 | 2011-07-13 | 东南大学 | Secret key management method for distributed wireless sensor network based on one-way function |
Also Published As
Publication number | Publication date |
---|---|
CN103929744A (en) | 2014-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103929744B (en) | A kind of key management method of wireless sensor network | |
CN104780532B (en) | One cluster key management method that can be used for wireless sensor network | |
Yu et al. | FDAC: Toward fine-grained distributed data access control in wireless sensor networks | |
CN108880814A (en) | A kind of dynamic cluster wireless sensor network key management method | |
CN101155024A (en) | Effective key management method and its operation method for sensor network with clustering structure | |
CN102315935A (en) | Wireless sensor network and computer network fused network secret key management method | |
CN102123392B (en) | Secret key management method for distributed wireless sensor network | |
CN104247379A (en) | Method and devices for scalable replay counters | |
CN104980921A (en) | Method for key distribution in wireless sensor network | |
CN101984625A (en) | Safety start method of tree topology in IPv6 over low power wireless personal area network (6LoWPAN) | |
CN103731825A (en) | Bridge-type-based wireless sensing network key management scheme | |
CN102006595B (en) | Key management method of wireless sensor network | |
Li et al. | Certificateless online/offline signcryption scheme | |
CN101494861A (en) | Method for pre-distributing wireless sensor network cipher key | |
CN103825742A (en) | Authentication key agreement method applicable to large-scale sensor network | |
CN103731819A (en) | Authentication method of wireless sensor network nodes | |
CN102123393B (en) | Secret key management method for distributed wireless sensor network based on one-way function | |
CN104618904B (en) | A kind of packet-based wireless sensor network key distribution method | |
CN104980270A (en) | Wireless sensor network secret key management method based on identities | |
Bettayeb et al. | A robust and efficient vector-based key management scheme for IoT networks | |
CN103813320A (en) | Grouping cluster and master key based key management method | |
Saraswathi et al. | Dynamic and probabilistic key management for distributed wireless sensor networks | |
Zhou et al. | An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks | |
Rajamanickam et al. | Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks | |
Meharia et al. | A hybrid key management scheme for healthcare sensor networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170623 |
|
CF01 | Termination of patent right due to non-payment of annual fee |