CN110730455A - Underwater node authentication method based on symmetric polynomial and ECC algorithm - Google Patents
Underwater node authentication method based on symmetric polynomial and ECC algorithm Download PDFInfo
- Publication number
- CN110730455A CN110730455A CN201910997937.3A CN201910997937A CN110730455A CN 110730455 A CN110730455 A CN 110730455A CN 201910997937 A CN201910997937 A CN 201910997937A CN 110730455 A CN110730455 A CN 110730455A
- Authority
- CN
- China
- Prior art keywords
- node
- key
- cluster head
- authentication
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B11/00—Transmission systems employing sonic, ultrasonic or infrasonic waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
- H04B13/02—Transmission systems in which the medium consists of the earth or a large mass of water thereon, e.g. earth telegraphy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an underwater node authentication method based on a symmetric polynomial and an ECC algorithm, which comprises the following steps: initialization, authentication and key exchange, group key exchange. The initialization means that a base station in the network distributes security parameters and algorithms for member nodes such as buoys, cluster heads, common nodes and the like, wherein the security parameters and the algorithms comprise symmetric polynomial shares, public and private keys, encryption algorithms and message authentication code functions. The authentication and key exchange mean that the cluster head and the common node realize the bidirectional authentication between the nodes through three times of communication, and the symmetric session key is successfully exchanged. The group key exchange means that after the authentication of the cluster head and all the member nodes in the cluster is successful, the cluster head needs to generate a unique symmetric group key shared with all the member nodes, so that the encrypted transmission of the cluster head broadcast message is realized, and the management of the cluster head to the member nodes is facilitated. The method solves the problem of higher communication overhead of underwater node authentication, and effectively reduces the probability of data collision.
Description
Technical Field
The invention relates to the technical field of node authentication, in particular to an underwater node authentication method based on a symmetric polynomial and an ECC algorithm.
Background
Abundant ocean resources and a large number of ocean application scenes make global researchers increasingly interested in the development of ocean resources and the technical research of underwater acoustic communication networks. Researchers around the world participate in the research of marine technology more widely, and the acquisition and processing of marine information are more and more emphasized in various countries. Ocean data is the key basis for all ocean technology applications, including data generation, acquisition, storage, transmission and processing, so the underwater acoustic communication gateway key technology gradually becomes the key research topic of each ocean nation. The underwater wireless communication network with low cost, high energy efficiency, safety and reliability is designed and developed, and plays a very important role in national defense and national economic construction.
Unlike wired or wireless transmission on land, unreliable underwater acoustic channels and complex underwater acoustic environments present many insurmountable obstacles for the design and study of underwater acoustic communication network security schemes. The underwater acoustic channel has the following basic characteristics: the transmission delay of sound waves in water can reach 0.67 s/km; when sound waves are transmitted in the sea, the received signals are easily distorted due to multipath effects caused by refraction and sea bottom and sea surface reflection; the transmission delay between Communication nodes of an Underwater Acoustic Communication Network (UACN) is a binary function of time and space, and the time-space uncertainty of an underwater acoustic channel increases the probability of receiving and transmitting collisions and collision of data packets. When designing a safety mechanism suitable for an underwater acoustic communication network, characteristics of low bandwidth, high time delay, multipath effect, communication conflict and the like of an underwater acoustic channel need to be considered, and requirements on clock synchronization are reduced.
The identity authentication technology is the first barrier of a security system, legal nodes and illegal nodes can be efficiently identified through identity authentication, an unauthorized third party is prohibited from accessing a network, authorized access of the legal nodes to the network is allowed, and legal service is provided for the network. The main purpose of identity authentication is to ensure that the identities of all nodes accessing the network are legitimate and to ensure the authenticity of the source of messages within the network. Due to the difference between the underwater acoustic communication Network and the Terrestrial Wireless Sensor Network (TWSN), the existing Terrestrial wireless sensor Network security technology and mechanism cannot be directly transplanted into the underwater acoustic communication Network. Therefore, in order to secure the underwater acoustic communication network, an authentication and intrusion detection technology suitable for the underwater acoustic communication network must be designed and proposed.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an underwater node authentication method based on a symmetric polynomial and an ECC algorithm, solve the problem of high communication overhead of underwater node authentication and effectively reduce the probability of data collision.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
an underwater node authentication method based on a symmetric polynomial and an ECC algorithm comprises the following steps:
(1) carrying out initialization;
(101) the base station selects and generates security parameters required by network authentication and stores the security parameters in all network nodes; the network nodes comprise gateway nodes, cluster head nodes and common nodes;
(102) the base station distributes unique identity IDs for all network nodes;
(103) the base station calculates public and private key Pairs (PUs) for all network nodesi,PRi) Unique identity key pair (ID)i,PUi,PRi) Storing in corresponding network nodes, then the base station deletes the private keys of all network nodes, and only stores the identity public key pair (ID) of each network nodei,PUi);
(104) The base station selects a ternary high-order symmetric polynomial f (x, y, z), generates a random number r, makes z equal to r to obtain f (x, y, r), and distributes polynomial share f (ID) to all network nodesi,y,r);
(105) The base station selects a symmetric encryption algorithm and a message authentication code function for realizing the encryption transmission of the key data of the network node and verifying the integrity of the message;
(106) the base station selects a binary hash function H (x, y) as a message authentication code function, and inputs the ID and the symmetric encryption key K of a cluster head node j and a common node iijObtain the corresponding MAC key MKij,
(2) Authentication and key exchange are carried out between the cluster head node j and the common node i;
(201) cluster head node j broadcasting including cluster head identification IDjAnd a temporary interaction number n1Authentication request M of0;
(202) Reception of M by ordinary node i in network0Then, according to the ID of the cluster headjAnd polynomial share f (ID) in memoryiY, r), generating temporary message authentication key MTK between local node and cluster head nodeji=f(IDi,IDjR) and generates a random number as a temporary interaction number n2The temporary interaction number n of the node is used2ID, ID informationiPublic key PUiAnd the temporary message authentication code is packaged in M1Is sent to the cluster head node;
(203) cluster head node receives M1Then, the identity information ID of the common node is obtainediAnd public key PUiUsing M1Identity information ID in (1)iAnd polynomial share generating temporary authentication key f (ID)j,IDiR) from the symmetry f (ID) of a polynomiali,IDj,r)=f(IDj,IDiR) to verify M1If the matching result shows that the message is not tampered, the cluster head node calculates the symmetric key K of the cluster head node and the common nodeji=PRjPUi=PRjPRiG and generates a corresponding MAC keyThe cluster head sends the identity information ID of the nodejPublic key PUjTemporary interaction number and temporary message authentication code are packaged in M2Sending the data to a common node; wherein G is a conversion function of the public key and the private key;
(204) when the common node receives the message M2Thereafter, using the temporary authentication key MTKjiGenerating a temporary message authentication code by a message authentication code function, verifying M2If the message integrity is matched, the message is not tampered, and the common node calculates the symmetric key K of the common node and the cluster head nodeji=PRiPUj=PRiPRjG=PRjPUiAnd generates a corresponding MAC keyThe cluster head and the common node complete key exchange, and the two have the same symmetric encryption key KjiAnd the same authentication key MKji;
(3) Group key exchange is carried out between the cluster head node j and the common node i;
(301) when the authentication between the cluster head node j and all the common nodes i is finished, the cluster head node calculates the public value PUjiThe calculation method is as follows
Wherein N isjRepresenting the number of common nodes in the cluster j, wherein i represents the ID of the common nodes;
(302) cluster head node j performs NjSub-broadcast, broadcast message being MiMessage MiThe contents contained are as follows:
Mi=IDi||PUji||MAC(MTKji,IDi|PUji)
(303) ordinary node i receives MiThen, calculating to obtain a group key K of the cluster jj:
Wherein KijIndicating the process of the session key exchanged by the cluster head j and the member node i in the networking authentication phase or the new node joining phase.
The invention has the beneficial effects that: the invention adopts an authentication mode based on a symmetric polynomial and an ECC algorithm to realize key exchange of the cluster head and the node, realizes authentication of the cluster head and the node only by three times of communication, reduces communication conflicts and collisions of underwater nodes, generates an MAC key by using the symmetric polynomial to verify the message integrity of an initial plaintext, can effectively resist man-in-the-middle attacks in the communication process, generates a group key which can be used for encrypting broadcast messages in a cluster, is convenient for the management of the cluster head to member nodes, and has less communication overhead and higher safety strength.
Drawings
FIG. 1 is a schematic diagram of a topology structure of a deep sea underwater acoustic communication network in the invention.
Fig. 2 is a schematic diagram of secure communication of a network node according to the present invention.
Fig. 3 is a schematic diagram of an authentication method of a cluster head and a node according to the present invention.
Detailed Description
As shown in fig. 1 and fig. 2, a method for authenticating an underwater node based on a symmetric polynomial and an ECC algorithm includes the following steps:
(1) initialization
1) The base station selects and generates security parameters required by network authentication and stores the security parameters in all network nodes. The network nodes comprise gateway nodes, cluster head nodes and common nodes.
2) The base station assigns a unique identity ID to all physical components within all networks.
3) The base station calculates public and private key Pairs (PUs) for all network nodesi,PRi) And storing in corresponding node, deleting private keys of all nodes by base station after calculation, and storing only identity public key pair (ID) of nodei,PUi). After the public and private keys of all nodes are calculated, the unique identity key pair (ID) is usedi,PUi,PRi) Stored in IDiAmong the nodes of (1). Then the base station deletes the private keys of all the nodes and only stores the identity public key pair (ID) of each nodei,PUi)。
4) The base station selects a ternary high-order symmetric polynomial f (x, y, z), generates a random number r, makes z equal to r to obtain f (x, y, r), and distributes polynomial share f (ID) to all network nodesi,y,r);
5) The base station selects a symmetric encryption algorithm and a message authentication code function which are respectively used for realizing encryption transmission of key data of the network node and verifying the integrity of the message, such as authentication data and collected important service data.
6) The base station selects a binary hash function H (x, y) as a message authentication code function, and inputs the ID and the symmetric encryption key K of a cluster head node j and a common node iijObtain the corresponding MAC key MKij,
(2) The cluster head node and all the common nodes perform authentication and key exchange, and the cluster head 1 and the common nodes 2 are taken as an example for explanation;
1) cluster head 1 broadcast including cluster head identification ID1And a temporary interaction number n1Authentication request M of0,M0The composition is shown in figure 3;
2) reception of M by a common node 2 within the network0Then, according to the ID of the cluster head1And polynomial share f (ID) in memory2Y, r), generating an interim message authentication key MTK between the own node and the cluster head 112=f(ID2,ID1R), the ordinary node generates a random number as a temporary interaction number n2ID of the identity information of the common node2Temporary interaction number and public key PU2And the temporary message authentication code is packaged in M1To cluster head 1, M1The composition is shown in figure 3;
3) cluster head 1 receives M1Then, the identity information ID of the node 2 is acquired2And public key PU2. Using M1Node ID and polynomial share in (c) generates a temporary authentication key f (ID)1,ID2R) from the symmetry of the polynomial f (ID)1,ID2,r)=f(ID2,ID1R) to verify M1Message integrity of (2). Once the MAC match indicates that the message has not been tampered with, the cluster head 1 can calculate its symmetric key K with the node 212=PR1PU2=PR1PR2G and generates a corresponding K12MAC key ofThe cluster head 1 sends the identity information ID of the nodejPublic key PUjTemporary interaction number and temporary message authentication code are packaged in M2To the ordinary node, M2The composition is shown in figure 3; where G is the transfer function of the public and private keys. And a symmetric encryption algorithm is adopted when the temporary interaction number is packaged.
4) When node 2 receives message M2Then, firstly, using temporary authentication key MTK12Generating a message authentication code with a message authentication function, verifying M2Message integrity of (2). The MAC matching indicates that the message is not tampered, and the node 2 calculates the symmetric key K of the node and the cluster head 112=PR2PU1=PR2PR1G=PR1PU2And generating K12Corresponding MAC key ofThus, the cluster head 1 and the node 2 realize key exchange, and the two have the same symmetric encryption key K12And the same authentication key MK12。
(3) Group key exchange
When the authentication between the cluster head node j and all the common nodes i is finished, the cluster head calculates the public value PUjiThe calculation method is as follows
Wherein N isjRepresents the number of common nodes in the cluster j, and i represents the ID of the common nodes.
Cluster head node j performs NjSub-broadcast, broadcast message being MiMessage MiThe contents contained are as follows:
Mi=IDi||PUji||MAC(MTKji,IDi||PUji)
ordinary node i receives MiThen, calculating to obtain a group key K of the cluster jj:
Wherein KijIndicating the process of the session key exchanged by the cluster head j and the member node i in the networking authentication phase or the new node joining phase.
The invention adopts an authentication mode based on a symmetric polynomial and an ECC algorithm to realize key exchange of the cluster head and the node, realizes authentication of the cluster head and the node only by three times of communication, reduces communication conflicts and collisions of underwater nodes, generates an MAC key by using the symmetric polynomial to verify the message integrity of an initial plaintext, can effectively resist man-in-the-middle attacks in the communication process, generates a group key which can be used for encrypting broadcast messages in a cluster, is convenient for the management of the cluster head to member nodes, and has less communication overhead and higher safety strength.
Claims (1)
1. An underwater node authentication method based on a symmetric polynomial and an ECC algorithm is characterized by comprising the following steps:
(1) carrying out initialization;
(101) the base station selects and generates security parameters required by network authentication and stores the security parameters in all network nodes; the network nodes comprise gateway nodes, cluster head nodes and common nodes;
(102) the base station distributes unique identity IDs for all network nodes;
(103) the base station calculates public and private key Pairs (PUs) for all network nodesi,PRi) Unique identity key pair (ID)i,PUi,PRi) Storing in corresponding network nodes, then the base station deletes the private keys of all network nodes, and only stores the identity public key pair (ID) of each network nodei,PUi);
(104) The base station selects a ternary high-order symmetric polynomial f (x, y, z), generates a random number r, makes z equal to r to obtain f (x, y, r), and distributes polynomial share f (ID) to all network nodesi,y,r);
(105) The base station selects a symmetric encryption algorithm and a message authentication code function for realizing the encryption transmission of the key data of the network node and verifying the integrity of the message;
(106) the base station selects a binary hash function (x, y) as a message authentication code function, and inputs the ID and the symmetric encryption key K of a cluster head node j and a common node iijObtain the corresponding MAC key MKij,
(2) Authentication and key exchange are carried out between the cluster head node j and the common node i;
(201) cluster head node j broadcasting including cluster head identification IDiAnd a temporary interaction number n1Authentication request M of0;
(202) Reception of M by ordinary node i in network0Then according to the cluster headIdentity IDjAnd polynomial share f (ID) in memoryiY, r), generating temporary message authentication key MTK between local node and cluster head nodeji=f(IDi,IDjR) and generates a random number as a temporary interaction number n2The temporary interaction number and the identity information ID of the node are usediPublic key PUiAnd the temporary message authentication code is packaged in M1Is sent to the cluster head node;
(203) cluster head node receives M1Then, the identity information ID of the common node is obtainediAnd public key PUiUsing M1Identity information ID in (1)iAnd polynomial share generating temporary authentication key f (ID)j,IDiR) from the symmetry f (ID) of a polynomiali,IDj,r)=f(IDj,IDiR) to verify M1If the matching result shows that the message is not tampered, the cluster head node calculates the symmetric key K of the cluster head node and the common nodeji=PRjPUi=PRjPRiG and generates a corresponding MAC keyThe cluster head sends the identity information ID of the nodejPublic key PUjTemporary interaction number and temporary message authentication code are packaged in M2Sending the data to a common node; wherein G is a conversion function of the public key and the private key;
(204) when the common node receives the message M2Thereafter, using the temporary authentication key MTKjiGenerating a temporary message authentication code by a message authentication code function, verifying M2If the message integrity is matched, the message is not tampered, and the common node calculates the symmetric key K of the common node and the cluster head nodeji=PRiPUj=PRiPRjG=PRjPUiAnd generates a corresponding MAC keyThe cluster head and the common node complete the key exchange and have the same phaseSame symmetric encryption key KjiAnd the same authentication key MKji;
(3) Group key exchange is carried out between the cluster head node j and the common node i;
(301) when the authentication between the cluster head node j and all the common nodes i is finished, the cluster head node calculates the public value PUjiThe calculation method is as follows
Wherein N isjRepresenting the number of common nodes in the cluster j, wherein i represents the ID of the common nodes;
(302) cluster head node j performs NjSub-broadcast, broadcast message being MiMessage MiThe contents contained are as follows:
Mi=IDi||PUji||MAC(MTKji,IDi||PUji)
(303) ordinary node i receives MiThen, calculating to obtain a group key K of the cluster jj:
Wherein KijIndicating the process of the session key exchanged by the cluster head j and the member node i in the networking authentication phase or the new node joining phase.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910997937.3A CN110730455B (en) | 2019-10-21 | 2019-10-21 | Underwater node authentication method based on symmetric polynomial and ECC algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910997937.3A CN110730455B (en) | 2019-10-21 | 2019-10-21 | Underwater node authentication method based on symmetric polynomial and ECC algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110730455A true CN110730455A (en) | 2020-01-24 |
CN110730455B CN110730455B (en) | 2022-02-18 |
Family
ID=69221618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910997937.3A Active CN110730455B (en) | 2019-10-21 | 2019-10-21 | Underwater node authentication method based on symmetric polynomial and ECC algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110730455B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112383884A (en) * | 2020-11-25 | 2021-02-19 | 海南大学 | A secure MAC protocol initiated by a receiver |
CN112566105A (en) * | 2021-01-13 | 2021-03-26 | 海南大学 | Design of fusion mechanism of underwater communication key and identity authentication based on cluster |
CN115361682A (en) * | 2022-08-10 | 2022-11-18 | 东莞理工学院 | Secret key pre-distribution method for underwater wireless sensor network |
CN115623001A (en) * | 2022-10-08 | 2023-01-17 | 中国人民解放军国防科技大学 | Cloud edge service trusted access and traceable service cooperation method based on block chain |
CN115866554A (en) * | 2023-03-02 | 2023-03-28 | 吉林省信息技术研究所 | Information security transmission system of Internet of things |
CN116528235A (en) * | 2023-06-30 | 2023-08-01 | 华侨大学 | Vehicle-ground wireless communication authentication method and system based on extended chebyshev polynomial |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080292105A1 (en) * | 2007-05-22 | 2008-11-27 | Chieh-Yih Wan | Lightweight key distribution and management method for sensor networks |
CN103813320A (en) * | 2014-01-14 | 2014-05-21 | 东北大学 | Grouping cluster and master key based key management method |
CN104980270A (en) * | 2014-04-01 | 2015-10-14 | 东南大学 | Wireless sensor network secret key management method based on identities |
CN107231200A (en) * | 2017-05-18 | 2017-10-03 | 哈尔滨工程大学 | A kind of water sound sensor network blending agent access control communication means based on sub-clustering |
CN108880814A (en) * | 2018-06-28 | 2018-11-23 | 西安理工大学 | A kind of dynamic cluster wireless sensor network key management method |
-
2019
- 2019-10-21 CN CN201910997937.3A patent/CN110730455B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080292105A1 (en) * | 2007-05-22 | 2008-11-27 | Chieh-Yih Wan | Lightweight key distribution and management method for sensor networks |
CN103813320A (en) * | 2014-01-14 | 2014-05-21 | 东北大学 | Grouping cluster and master key based key management method |
CN104980270A (en) * | 2014-04-01 | 2015-10-14 | 东南大学 | Wireless sensor network secret key management method based on identities |
CN107231200A (en) * | 2017-05-18 | 2017-10-03 | 哈尔滨工程大学 | A kind of water sound sensor network blending agent access control communication means based on sub-clustering |
CN108880814A (en) * | 2018-06-28 | 2018-11-23 | 西安理工大学 | A kind of dynamic cluster wireless sensor network key management method |
Non-Patent Citations (2)
Title |
---|
任超群等: "基于簇的水声传感器网络的安全认证协议", 《计算机科学》 * |
黄彬等: "基于簇的三维水声传感器网络的密钥管理方案", 《计算机科学》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112383884A (en) * | 2020-11-25 | 2021-02-19 | 海南大学 | A secure MAC protocol initiated by a receiver |
CN112566105A (en) * | 2021-01-13 | 2021-03-26 | 海南大学 | Design of fusion mechanism of underwater communication key and identity authentication based on cluster |
CN115361682A (en) * | 2022-08-10 | 2022-11-18 | 东莞理工学院 | Secret key pre-distribution method for underwater wireless sensor network |
CN115361682B (en) * | 2022-08-10 | 2024-05-07 | 东莞理工学院 | Underwater wireless sensor network key pre-allocation method |
CN115623001A (en) * | 2022-10-08 | 2023-01-17 | 中国人民解放军国防科技大学 | Cloud edge service trusted access and traceable service cooperation method based on block chain |
CN115623001B (en) * | 2022-10-08 | 2024-04-12 | 中国人民解放军国防科技大学 | Cloud edge service trusted access and traceable service cooperation method based on blockchain |
CN115866554A (en) * | 2023-03-02 | 2023-03-28 | 吉林省信息技术研究所 | Information security transmission system of Internet of things |
CN116528235A (en) * | 2023-06-30 | 2023-08-01 | 华侨大学 | Vehicle-ground wireless communication authentication method and system based on extended chebyshev polynomial |
CN116528235B (en) * | 2023-06-30 | 2023-10-20 | 华侨大学 | Vehicle-ground wireless communication authentication method and system based on extended chebyshev polynomial |
Also Published As
Publication number | Publication date |
---|---|
CN110730455B (en) | 2022-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110730455B (en) | Underwater node authentication method based on symmetric polynomial and ECC algorithm | |
Chaudhry et al. | Securing demand response management: A certificate-based access control in smart grid edge computing infrastructure | |
Chaudhry et al. | A lightweight authentication scheme for 6G-IoT enabled maritime transport system | |
Wei et al. | A privacy-preserving fog computing framework for vehicular crowdsensing networks | |
Zhang et al. | Intelligent drone-assisted anonymous authentication and key agreement for 5G/B5G vehicular ad-hoc networks | |
EP2534809A1 (en) | Trust discovery in a communications network | |
CN115022879B (en) | Enhanced Beidou user terminal access authentication method and system based on position key | |
CN109510706B (en) | Heterogeneous wireless communication method and system based on photon super-entangled state | |
CN110730452A (en) | Performance analysis method of combined relay and interference selection scheme in wireless communication system | |
Manikandan et al. | A comprehensive survey on various key management schemes in WSN | |
CN102123392A (en) | Secret key management method for distributed wireless sensor network | |
CN114928835B (en) | Dynamic wireless sensor network construction method based on blockchain and key management | |
KR100892616B1 (en) | Method For Joining New Device In Wireless Sensor Network | |
CN110113344B (en) | Offshore multi-mobile-platform identity recognition method based on distributed encryption | |
CN110392040B (en) | Underwater mobile node re-authentication method based on trust chain | |
CN112187770A (en) | Multisource ocean data safety fusion and statistics method based on near-shore Internet of things | |
CN116599653A (en) | Dynamic security management method, system and storage medium for satellite communication network | |
Sang et al. | A shared-secret free security infrastructure for wireless networks | |
CN112911599B (en) | Low-energy-consumption data fusion recessive method supporting integrity verification of wireless sensor network | |
CN115277000A (en) | Information transmission method based on menuo currency | |
Li et al. | Sustainable and round-optimized group authenticated key exchange in vehicle communication | |
Anbarasi et al. | Enhanced secure data transmission protocol for cluster-based wireless sensor networks | |
Huang et al. | An Improved μTESLA Protocol Based on Queuing Theory and Benaloh‐Leichter SSS in WSNs | |
Wan et al. | SRDA: A Secure Routing and Data Aggregation Approach for Wireless Smart Meter. | |
Yang et al. | A distributed secure monitoring system based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |