CN105636044A - Identity authentication method for low-rate wireless network - Google Patents

Identity authentication method for low-rate wireless network Download PDF

Info

Publication number
CN105636044A
CN105636044A CN201610131905.1A CN201610131905A CN105636044A CN 105636044 A CN105636044 A CN 105636044A CN 201610131905 A CN201610131905 A CN 201610131905A CN 105636044 A CN105636044 A CN 105636044A
Authority
CN
China
Prior art keywords
node
wireless network
order
low
disabler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610131905.1A
Other languages
Chinese (zh)
Inventor
施友岚
钱超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Black Box Technology Co Ltd
Original Assignee
Foshan Black Box Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Black Box Technology Co Ltd filed Critical Foshan Black Box Technology Co Ltd
Priority to CN201610131905.1A priority Critical patent/CN105636044A/en
Publication of CN105636044A publication Critical patent/CN105636044A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The present invention discloses an identity authentication method for a low-rate wireless network. The method is applied to a ZigBee wireless network. Identity authentication involves two nodes: a node A and a node B. The node A has a command for disabling the Node B. In order to execute the command, identity authentication has to be performed, to determine the node A has the right to execute the operation. A feasible identity authentication mechanism is added to a low-rate low-overhead wireless network, thereby achieving the technical effects that identity authentication can be effectively performed on a low-rate wireless network, and the operation can be performed normally by using a low-bit micro control unit.

Description

A kind of identity identifying method for low rate wireless network
Technical field
The present invention relates to wireless network data process field, specifically, it relates to a kind of identity identifying method for low rate wireless network.
Background technology
ZigBee is the low-power consumption local area network agreement based on IEEE802.15.4 standard. According to international standard regulation, ZigBee technology is the wireless communication technology of a kind of short range, low-power consumption. Be characterized in closely, low complex degree, self-organization, low-power consumption, low data speed. Mainly it is suitable for control and remote control field automatically, it is possible to embed various equipment. In brief, ZigBee is exactly cheaply a kind of, the near radio networking communication technology of low-power consumption.
Ripe wireless communication protocol Zigbee protocol, has encryption function in agreement, but certification is not machine-processed. In this case once after saboteur cracks out the secret key of encryption of AES, it is exactly transparent by network function, thus can say without any safety. Low rate wireless network is different from wifi, the wireless networks such as GSM, and speed is low, and the requirement due to cost control, cannot use existing complicated authentication protocol. Complicated protocol authentication is it is intended that effect in order to reach certification, and the performance of treater must be upgraded doubly a lot, and data volume can increase greatly, and the magnitude being increased to is that low rate wireless network cannot bear. Existing wireless low rate Networking protocol is all only do encryption there is no certification.
In sum, present inventor is in the process realizing inventive technique scheme in the embodiment of the present application, it has been found that above-mentioned technology at least exists following technical problem:
In the prior art, there is the technical problem that cannot effectively carry out authentication in existing low rate wireless network.
Summary of the invention
The present invention provides a kind of identity identifying method for low rate wireless network, solve existing low rate wireless network and there is the technical problem that cannot effectively carry out authentication, achieve and can effectively carry out authentication on low rate wireless network, and the technique effect that normally can run at low position micro-control unit.
For solving the problems of the technologies described above, the embodiment of the present application provides a kind of identity identifying method for low rate wireless network, described method is applied in ZigBee wireless network, described method is in low rate, the wireless network of low expense adds feasible authentication mechanism, authentication mechanism uses that frequency is too high is still likely cracked, and is only thus just can be required to use at key order in the method, reduces use frequency to reduce the possibility being cracked.
Wherein, the concrete certification process of present method is:
Authentication relates to 2 nodes, for the time being called after node A and Node B. Node B is had an order that Node B was lost efficacy by node A, if to be started this order, has to pass through authentication, it is determined that node A has permission and carries out this operation.
S1: node A sends disable command to Node B, wherein comprises the MAC address of node A, and the authority information of node A, and the mixed sequence of randomized number (random sequence);
S2: Node B receives disabler order, resolves, it has been found that this order is disabler order. Node B is selected out a series of from polynomial expression group, after being encrypted by the MAC of node A, is placed in authentication request and is sent to node A;
S3: node A receives ID authentication request, corresponding encrypted polynomial is found out in step-by-step, and returns to Node B by after the MAC address encryption of Node B;
S4: Node B receives new encrypted result, and by the new Comparative result of new encrypted result and oneself calculating, if consistent, jump to S5, otherwise jump to S6;
S5: certification success, Node B n-back test expiration operation;
S6: certification failure, continues to perform the function of Node B;
Before being held into the random sequence of following table 1(in the data message of disable command):
Table 1
After random sequence: 0xaa01aa02bb03cc04dd06ee07ff08;
The authentication request that Node B sends, (before random sequence) as shown in table 2:
Table 2
After random sequence: 0xee01aa0203bb0405cc06070809dd;
Node A sends new encrypted result (before random sequence) as shown in table 3:
Table 3
After random sequence: 0xee01020aa3040bb50cc60708dd09;
Encrypted polynomial group is preset in node A and Node B, for node, the MAX of self is substituted into all encrypted polynomials and carries out the time that exhaustive computing expends and can accept, because polynomial expression group length is limited.
The one or more technical schemes provided in the embodiment of the present application, at least have following technique effect or advantage:
Owing to have employed, the identity identifying method for low rate wireless network is designed to, described method is applied in ZigBee wireless network, described method comprises: S1: node A sends disabler order to Node B, disabler order comprises: the MAC address of node A, and the authority information of node A, and the mixed sequence of randomized number, S2: Node B receives disabler order and resolves, confirms that this order is disabler order, and Node B is selected row from polynomial expression group and is encrypted by the MAC of node A, and will add confidential information and be placed in ID authentication request to be sent to node A, S3: node A receives ID authentication request, corresponding encrypted polynomial is found out in step-by-step, and returns to Node B by after the MAC address encryption of Node B, S4: Node B receives encrypted result, and the encrypted result of reception is mated with the encrypted result oneself calculated, if the match is successful, jump to S5, if it fails to match, jump to S6, S5: certification success, Node B n-back test expiration operation, S6: certification failure, continue to perform the technical scheme of the function of Node B, namely authentication relates to 2 nodes and is respectively node A and Node B, Node B is had an order that Node B was lost efficacy by node A, authentication is then had to pass through to start this order, determine that node A has permission and carry out this operation, in low rate, the wireless network of low expense adds feasible authentication mechanism, authentication mechanism uses that frequency is too high is still likely cracked, thus it is only just can be required to use at key order, reduce and use frequency to reduce the possibility being cracked, present method is mainly for low power consumption wireless network, node processing device data bus figure place is lower than 16, it mostly is 8 MCU, the identifying algorithm of low expense, to such an extent as to can also run on 8 mcu, so, efficiently solve existing low rate wireless network and there is the technical problem that cannot effectively carry out authentication, and then achieve and can effectively carry out authentication on low rate wireless network, and the technique effect that normally can run at low position micro-control unit.
Further, existing wireless low rate Networking protocol is all only do encryption there is no certification, can also illustrate from this starting point, low rate wireless network does certification, it is meaningful, consider again low-speed wireless network adds certification mechanism, owing to the topological framework of network is often netted net or tree network, this is different from ripe Star Network topology, the technology point that present method mainly overcomes is computing time: the power consumption that wireless transmission once needs originally is 0.001mAh, before launching, encryption algorithm needs the power consumption running 1S calculating formula CPU to be 0.0005mAh, owing to the introducing of ciphering process causes the power consumption of single checking to add 50%, the battery of same capacity to be reduced 1/3rd work-ing life, and the mechanism of the present invention is simple, checking number of times is few, and calculate not complicated, it is that low rate wireless network can accept.
Accompanying drawing explanation
Accompanying drawing described herein be used to provide to the embodiment of the present invention it is further understood that form the application a part, do not form the restriction to the embodiment of the present invention, in the accompanying drawings:
Fig. 1 is the schematic flow sheet of identity identifying method for low rate wireless network in the embodiment of the present application one.
Embodiment
The present invention provides a kind of identity identifying method for low rate wireless network, solve existing low rate wireless network and there is the technical problem that cannot effectively carry out authentication, achieve and can effectively carry out authentication on low rate wireless network, and the technique effect that normally can run at low position micro-control unit.
In order to better understand technique scheme, below in conjunction with Figure of description and concrete enforcement mode, technique scheme is described in detail.
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, and the exemplary embodiment of the present invention and explanation thereof are only for explaining the present invention, not as a limitation of the invention.
Embodiment one:
In embodiment one, please refer to Fig. 1, it provides a kind of identity identifying method for low rate wireless network, described method is applied in ZigBee wireless network, and described method comprises:
S1: node A sends disabler order to Node B, disabler order comprises: the MAC address of node A, and the authority information of node A, and the mixed sequence of randomized number;
S2: Node B receives disabler order and resolves, confirms that this order is disabler order, and Node B is selected row from polynomial expression group and is encrypted by the MAC of node A, and will add confidential information and be placed in ID authentication request to be sent to node A;
S3: node A receives ID authentication request, corresponding encrypted polynomial is found out in step-by-step, and returns to Node B by after the MAC address encryption of Node B;
S4: Node B receives encrypted result, and the encrypted result of reception is mated with the encrypted result oneself calculated, if the match is successful, jump to S5, if it fails to match, jump to S6;
S5: certification success, Node B n-back test expiration operation;
S6: certification failure, continues to perform the function of Node B.
Wherein, in the embodiment of the present application, the treater of described node A and described Node B is the micro-control unit lower than 16.
For a concrete example, the method in the application is introduced below:
There are a wireless switching and a water pump in certain farm, controls by node A and Node B respectively. Owing to water pump control is most important, thus this operation has to pass through authentication, it is determined that node A has permission and carries out this operation.
S1: node A sends water pump control command to Node B, wherein comprises the MAC address of node A, and the authority information of node A, and the mixed sequence of randomized number (random sequence);
S2: Node B receives order, resolves, it has been found that this order is water pump control command. Node B is selected out a series of from polynomial expression group, after being encrypted by the MAC of node A, is placed in authentication request and is sent to node A;
S3: node A receives ID authentication request, corresponding encrypted polynomial is found out in step-by-step, and returns to Node B by after the MAC address encryption of Node B;
S4: Node B receives new encrypted result, and by the new Comparative result of new encrypted result and oneself calculating, if consistent, jump to S5, otherwise jump to S6;
S5: certification success, Node B performs water pump control operation;
S6: certification failure, does not perform any operation;
Wherein, in the embodiment of the present application, the certification achieving the wireless switching to farm and water pump in low rate wireless network is achieved by the authentication method of the application, without the need to network and the equipment of complexity, certification is convenient, and the treater without the need to a high position, the identifying algorithm of low expense, to such an extent as to can also run on 8 mcu, and it is not easy to be cracked.
Technical scheme in above-mentioned the embodiment of the present application, at least has following technique effect or advantage:
Owing to have employed, the identity identifying method for low rate wireless network is designed to, described method is applied in ZigBee wireless network, described method comprises: S1: node A sends disabler order to Node B, disabler order comprises: the MAC address of node A, and the authority information of node A, and the mixed sequence of randomized number, S2: Node B receives disabler order and resolves, confirms that this order is disabler order, and Node B is selected row from polynomial expression group and is encrypted by the MAC of node A, and will add confidential information and be placed in ID authentication request to be sent to node A, S3: node A receives ID authentication request, corresponding encrypted polynomial is found out in step-by-step, and returns to Node B by after the MAC address encryption of Node B, S4: Node B receives encrypted result, and the encrypted result of reception is mated with the encrypted result oneself calculated, if the match is successful, jump to S5, if it fails to match, jump to S6, S5: certification success, Node B n-back test expiration operation, S6: certification failure, continue to perform the technical scheme of the function of Node B, namely authentication relates to 2 nodes and is respectively node A and Node B, Node B is had an order that Node B was lost efficacy by node A, authentication is then had to pass through to start this order, determine that node A has permission and carry out this operation, in low rate, the wireless network of low expense adds feasible authentication mechanism, authentication mechanism uses that frequency is too high is still likely cracked, thus it is only just can be required to use at key order, reduce and use frequency to reduce the possibility being cracked, present method is mainly for low power consumption wireless network, node processing device data bus figure place is lower than 16, it mostly is 8 MCU, the identifying algorithm of low expense, to such an extent as to can also run on 8 mcu, so, efficiently solve existing low rate wireless network and there is the technical problem that cannot effectively carry out authentication, and then achieve and can effectively carry out authentication on low rate wireless network, and the technique effect that normally can run at low position micro-control unit.
Although having described the preferred embodiments of the present invention, but those skilled in the art once the substantially creative concept of cicada, then these embodiments can be made other change and amendment. Therefore, it is intended that the appended claims shall be construed comprise preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, the present invention can be carried out various change and modification and not depart from the spirit and scope of the present invention by the technician of this area. Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these change and modification.

Claims (2)

1. the identity identifying method for low rate wireless network, it is characterised in that, described method is applied in ZigBee wireless network, and described method comprises:
S1: node A sends disabler order to Node B, disabler order comprises: the MAC address of node A, and the authority information of node A, and the mixed sequence of randomized number;
S2: Node B receives disabler order and resolves, confirms that this order is disabler order, and Node B is selected row from polynomial expression group and is encrypted by the MAC of node A, and will add confidential information and be placed in ID authentication request to be sent to node A;
S3: node A receives ID authentication request, corresponding encrypted polynomial is found out in step-by-step, and returns to Node B by after the MAC address encryption of Node B;
S4: Node B receives encrypted result, and the encrypted result of reception is mated with the encrypted result oneself calculated, if the match is successful, jump to S5, if it fails to match, jump to S6;
S5: certification success, Node B n-back test expiration operation;
S6: certification failure, continues to perform the function of Node B.
2. the identity identifying method for low rate wireless network according to claim 1, it is characterised in that, the treater of described node A and described Node B is the micro-control unit lower than 16.
CN201610131905.1A 2016-03-09 2016-03-09 Identity authentication method for low-rate wireless network Pending CN105636044A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610131905.1A CN105636044A (en) 2016-03-09 2016-03-09 Identity authentication method for low-rate wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610131905.1A CN105636044A (en) 2016-03-09 2016-03-09 Identity authentication method for low-rate wireless network

Publications (1)

Publication Number Publication Date
CN105636044A true CN105636044A (en) 2016-06-01

Family

ID=56050434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610131905.1A Pending CN105636044A (en) 2016-03-09 2016-03-09 Identity authentication method for low-rate wireless network

Country Status (1)

Country Link
CN (1) CN105636044A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825742A (en) * 2014-02-13 2014-05-28 南京邮电大学 Authentication key agreement method applicable to large-scale sensor network
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function
CN104658090A (en) * 2015-01-29 2015-05-27 杭州晟元芯片技术有限公司 Smart lock with security module and ZigBee wireless communication module inside
WO2015075012A1 (en) * 2013-11-21 2015-05-28 Koninklijke Philips N.V. System for sharing a cryptographic key

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015075012A1 (en) * 2013-11-21 2015-05-28 Koninklijke Philips N.V. System for sharing a cryptographic key
CN103825742A (en) * 2014-02-13 2014-05-28 南京邮电大学 Authentication key agreement method applicable to large-scale sensor network
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function
CN104658090A (en) * 2015-01-29 2015-05-27 杭州晟元芯片技术有限公司 Smart lock with security module and ZigBee wireless communication module inside

Similar Documents

Publication Publication Date Title
WO2020177768A1 (en) Network verification method, apparatus, and system
US11627623B2 (en) Connection resume request method and apparatus
CN110289952B (en) Quantum data link security terminal and security communication network
CN110139271A (en) A kind of method, system and device that smart home device batch configuration networks
WO2015148165A2 (en) Secure and simplified procedure for joining a social wi-fi mesh network
WO2021103772A1 (en) Data transmission method and apparatus
TWI568234B (en) Anonymity authentication method for global mobility networks
Liu et al. Research on end-to-end security authentication protocol of NB-IoT for smart grid based on physical unclonable function
CN108494764B (en) Identity authentication method and device
CN104038931A (en) LTE (Long Term Evolution) network based power distribution and utilization communication system and communication method thereof
Liu et al. Research on terminal security technology of ubiquitous power internet of things based on PUF and SM3
CN105472764A (en) Method of being accessed to LTE (Long Term Evolution) network and electronic device
CN109660564B (en) Cloud computing-based dynamic internet of things unlocking system
CN109842484B (en) Method, device and equipment for updating next-hop chain counter
CN105636044A (en) Identity authentication method for low-rate wireless network
WO2020258988A1 (en) Access request transmission and processing methods, and device
CN106535178B (en) Access layer and Non-Access Stratum key safety insulating device and its method
Cheng et al. The authentication of the grid monitoring system for wireless sensor networks
CN104486082A (en) Authentication method and router
RU2746890C1 (en) Method, device and system of access rejection, data carrier and processor
CN112235799A (en) Network access authentication method and system for terminal equipment
JPWO2007138876A1 (en) Communication node authentication system and method, communication node authentication program
KR101785382B1 (en) Method for authenticating client, operation method of client, server enabling the method, and communication software enabling the operation method
CN103856939A (en) Two-stage identity authentication method based on random number
RU2772617C2 (en) Method and apparatus for requesting reconnection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20200110

AD01 Patent right deemed abandoned