CN103929744B - A kind of key management method of wireless sensor network - Google Patents

A kind of key management method of wireless sensor network Download PDF

Info

Publication number
CN103929744B
CN103929744B CN201410134463.7A CN201410134463A CN103929744B CN 103929744 B CN103929744 B CN 103929744B CN 201410134463 A CN201410134463 A CN 201410134463A CN 103929744 B CN103929744 B CN 103929744B
Authority
CN
China
Prior art keywords
node
cluster
key
leader cluster
velskii
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410134463.7A
Other languages
Chinese (zh)
Other versions
CN103929744A (en
Inventor
秦中元
张新帅
黄杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201410134463.7A priority Critical patent/CN103929744B/en
Publication of CN103929744A publication Critical patent/CN103929744A/en
Application granted granted Critical
Publication of CN103929744B publication Critical patent/CN103929744B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of key management method of wireless sensor network, including base station is all the sensors node distribution public private key pair according to the parameter for setting;Leader cluster node is elected from all the sensors node;The leader cluster node for electing sends information to ambient sensors node, and ambient sensors node chooses the leader cluster node of oneself according to information, forms cluster;Base station is the self-balancing binary search tree of each fasciation cluster inner sensor node(Adelson-Velskii-Landis tree);The information of other sensors node is inquired about between cluster inner sensor node according to Adelson-Velskii-Landis tree, exchange information is simultaneously mutually authenticated public key legitimacy, session key is shared after certification success.The present invention utilizes Adelson-Velskii-Landis tree mode storage of public keys and identity information, reduces search time and consumption;Encryption key distribution and management are realized using elliptic curve cryptosystems, network security higher has both been can guarantee that, computing cost can be as far as possible reduced again.

Description

A kind of key management method of wireless sensor network
Technical field
The invention belongs to technical field of network security, more particularly to a kind of key management method of wireless sensor network.
Background technology
Wireless sensor network is a large amount of sensor nodes composition being deployed in certain area, by wireless The mode of communication forms an ad hoc network system for multi-hop, is generally deployed in unattended environment, even enemy Region.Because wireless sensor network has such opening, the communication between node is caused easily to be eavesdropped, distorted or weight Put, node itself is subject to capture, replicate or forge etc. attacks, so ensureing that network security turns into the research of wireless sensor network One of emphasis, key management is then the basis for realizing wireless sensor network security.Due to the calculating energy of each sensor node Power and storage capacity are limited, network topology dynamic change, and communication bandwidth is not enough so that existing some standardized key managements Scheme, such as Diffie-Hellman IKEs, based on the scheme of KDC KDC, PKIX PKI etc. Cannot be directly applied on wireless sensor network.Therefore a kind of new key management in Wireless Sensor Network is especially needed Carry out the safety of Logistics networks.
The content of the invention
Goal of the invention:The present invention is intended to provide a kind of key management method of wireless sensor network.
Technical scheme:A kind of key management method of wireless sensor network, methods described includes:
(1)Base station is all the sensors node distribution public private key pair according to the parameter for setting;
(2)Leader cluster node is elected from all the sensors node;
(3)The leader cluster node for electing sends information to ambient sensors node, and ambient sensors node is selected according to information Oneself leader cluster node is taken from, cluster is formed;
(4)Base station is the Adelson-Velskii-Landis tree of each fasciation cluster inner sensor node;
(5)The information of other sensors node is inquired about between cluster inner sensor node according to Adelson-Velskii-Landis tree, information is exchanged simultaneously mutually Certification public key legitimacy, session key is shared after certification success.
Also include that new sensor node adds step:New sensor node sends application to the leader cluster node that need to be added first Message, leader cluster node by the message with base station is transmitted to after the private key encryption of oneself, to new sensor node verify by base station, Will confirm that message and new cluster interior nodes Adelson-Velskii-Landis tree are sent to leader cluster node after being verified, the tree is transferred to cluster by leader cluster node Inner sensor node, new sensor node and neighbours' sensor node negotiating about cipher key shared.
Also include sensor node delete step:It is captured or energy when leader cluster node detects a certain sensor node When exhausting, the sensor node is deleted, now leader cluster node sends sensor node information to base station, and base station regenerates the cluster Adelson-Velskii-Landis tree and be sent to leader cluster node, leader cluster node update cluster inner sensor node Adelson-Velskii-Landis tree.
Also include key updating step:In the step(5)Between middle sensor node after negotiating about cipher key shared, sensor section Point sets key usage cycles T, after elapsed time T, sensor node repeat step(5)More new session key.
Beneficial effect:The present invention utilizes self-balancing binary search tree(Adelson-Velskii-Landis tree)Mode storage of public keys and identity information, are reduced Search time and consumption.Encryption key distribution and management are realized using elliptic curve cryptosystems, both can guarantee that network is higher Security, can as far as possible reduce computing cost again.Using elliptic curve cryptography method, compared to common public key algorithm, can be used compared with Short key realizes identical security, can preferably be applied to and require wireless sensor network higher to storing and calculating. Using the ID and public key value of Adelson-Velskii-Landis tree storage sensor node, search time can be largely reduced, improve system effectiveness, reduce energy Consumption.The present invention is also provided with regular key updating, can further improve the security of network, and with stronger expansible Property, it is allowed to the addition and deletion of sensor node.
Brief description of the drawings
Fig. 1 is flow chart of the invention;
Fig. 2 is key agreement interaction schematic diagram between cluster inner sensor node of the present invention;
Fig. 3 is Adelson-Velskii-Landis tree generation of the present invention and inquiry schematic diagram.
Specific embodiment
The invention is described in further details below in conjunction with the accompanying drawings.
1st, network formation stages:
Referring to Fig. 1, the present invention is divided into 5 steps in network formation stages.
(1-1)Cipher key pre-distribution:
Base station sets certain parameter, and is all nodes(Including all leader cluster nodes and sensor node)Distribution public key QiWith private key Si, and be stored in node.Base station generates initial shared key Ki, it is preset in all nodes.
(1-2)Leader cluster node is elected:
For the high energy consumption cost for ensuring data transfer is uniformly shared on all of sensor node, we use LEACH algorithms elect leader cluster node from all of sensor node.Specific practice is:Each sensor node is sequentially generated A random number between 0 to 1, first sensor node less than threshold values T (n) just turns into when the leader cluster node of front-wheel.
The computing formula of threshold values T (n) is:
Wherein, n represents sensor node, and C is the node set for not being elected to leader cluster node during this wheel is circulated, n ∈ C tables Show that the sensor node was not elected to leader cluster node, P is the percentage that desired leader cluster node number is accounted in all the sensors node Than r is election wheel number.
(1-3)Cluster formation stages:
The node of elected cluster head is entered after the ID and public key of oneself are encrypted using initial shared key to ambient sensors node Row broadcast, after neighbours' sensor node receives message, the ID and public key for obtaining cluster head is decrypted using initial key, then The leader cluster node of oneself can be selected according to signal intensity, signal to noise ratio etc., self ID and public key are then sent to leader cluster node, Leader cluster node stores all the sensors nodal information tabulation in its cluster.
(1-4)Cluster Adelson-Velskii-Landis tree is generated:
The ID and list of public keys of cluster inner sensor node are sent to base station by leader cluster node, and base station is made into Adelson-Velskii-Landis tree After return to each leader cluster node.The tree is broadcast to cluster inner sensor node by leader cluster node.
(1-5)Cluster inner sensor node key is consulted:
As shown in Fig. 2 sensor node A then inquires about the public key value of B to be communicated with sensor node B in Adelson-Velskii-Landis tree table, And randomly generate for communicate session key KS, first by KSWith timestamp with the private key encryption of A again with the ID and public key of A together With being sent to B after the public key encryption of B.B receives message and is decrypted with the private key of oneself, and verifies that the public key of A is closed in Adelson-Velskii-Landis tree table Method, can use the public key decryptions session key K of A if legalSAnd timestamp, when the identity of A is verified with this and being verified Between stab T and prevent multi-sending attack.B uses the private key encryption session key K of oneselfSWith timestamp ID and public key one again with oneself Rise and be sent to A using session key, A is received after message with the identity of same step certification B.So far A and B are completed It is mutually authenticated, and shared session key KS
2nd, the network operation stage:
(2-1)New sensor node is added:
If there is new sensor node to add network, new node to be first stored in current cluster head list, sensor section in base station The message that application is added is sent to the leader cluster node that need to be added first after point deployment, leader cluster node is by the message with the private key of oneself Base station is transmitted to after encryption, base station is verified to new sensor node, message and new cluster internal segment are will confirm that after being verified Point Adelson-Velskii-Landis tree is sent to leader cluster node, and the tree is broadcast to cluster inner sensor node by leader cluster node(Including the new sensor section for adding Point), the new sensor node for adding just can be with neighbours' sensor node negotiating about cipher key shared.
(2-2)Sensor node is deleted:
If leader cluster node detect that a certain sensor node is captured or depleted of energy if need to delete the sensor node, Now leader cluster node sends sensor node information to base station, and base station regenerates the Adelson-Velskii-Landis tree of the cluster and is sent to leader cluster node, Leader cluster node updates cluster inner sensor node Adelson-Velskii-Landis tree.
(2-3)Key updating
To ensure that network has security higher, session key needs to change new key in use for some time.In rank 1 step of section(5)Between middle sensor node after negotiating about cipher key shared, sensor node sets key usage cycles T, elapsed time T Afterwards, the step of sensor node duplication stages 1(5)More new session key.
Because wireless sensor network scale is generally than larger, a certain sensor node is searched in a large amount of sensor nodes ID and public key value information will expend many times.And stored according to Adelson-Velskii-Landis tree and searching data, can greatly reduce search Time, reduce and calculate consumption.For example searched in n sensor node a certain sensor node need average specific compared with(n+1)/ 2 times, I.e. time complexity is O (n).According to Adelson-Velskii-Landis tree, its time complexity is O (log2n)。
The step of stage 1(4)Used in Adelson-Velskii-Landis tree generation and inquiry as shown in figure 3, by the ID and public affairs of sensor node Key value generates Adelson-Velskii-Landis tree according to following rule:The value of all nodes is respectively less than the value of root node on left subtree;All sections on right subtree The value of point is all higher than the value of root node;The difference of the height of the left and right subtree of any node of tree is no more than 1;The left and right subtree of tree Also as above rule is all met.If a certain element need to be searched in the figure, citing:Search node 28 and 71.Search 28 first and root Node 54 compares size, is then searched to the left less than root node, compares with 17 then searched to the right more than 17 to the left, then be eventually found 28。

Claims (4)

1. a kind of key management method of wireless sensor network, it is characterised in that methods described includes:
(1) base station is all the sensors node distribution public private key pair according to the parameter for setting;
(2) leader cluster node is elected from all the sensors node;
(3) leader cluster node for electing sends information to ambient sensors node, and ambient sensors node is selected from according to information Oneself leader cluster node, forms cluster;
(4) base station is the Adelson-Velskii-Landis tree of each fasciation cluster inner sensor node;Leader cluster node is by the ID and public affairs of cluster inner sensor node Key list is sent to base station, and base station returns to each leader cluster node after being made into Adelson-Velskii-Landis tree;Leader cluster node broadcasts the Adelson-Velskii-Landis tree Give cluster inner sensor node;
(5) information of other sensors node is inquired about between cluster inner sensor node according to Adelson-Velskii-Landis tree, exchange information is simultaneously mutually authenticated Public key legitimacy, session key is shared after certification success.
2. key management method of wireless sensor network according to claim 1, it is characterised in that also including new sensor Node adds step:New sensor node sends solicitation message to the leader cluster node that need to add first, and leader cluster node is by the message With base station is transmitted to after the private key encryption of oneself, base station is verified to new sensor node, and message is will confirm that after being verified And new cluster interior nodes Adelson-Velskii-Landis tree is sent to leader cluster node, the tree is transferred to cluster inner sensor node, new sensor by leader cluster node Node and neighbours' sensor node negotiating about cipher key shared.
3. key management method of wireless sensor network according to claim 1, it is characterised in that also including sensor section Point deletion step:When leader cluster node detects captured a certain sensor node or depleted of energy, the sensor section is deleted Point, now to base station transmission sensor node information, base station regenerates the Adelson-Velskii-Landis tree of the cluster and is sent to cluster head section leader cluster node Point, leader cluster node updates cluster inner sensor node Adelson-Velskii-Landis tree.
4. key management method of wireless sensor network according to claim 1, it is characterised in that also including key updating Step:Between sensor node in the step (5) after negotiating about cipher key shared, sensor node sets key usage cycles T, warp After crossing time T, sensor node repeat step (5) more new session key.
CN201410134463.7A 2014-04-03 2014-04-03 A kind of key management method of wireless sensor network Expired - Fee Related CN103929744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410134463.7A CN103929744B (en) 2014-04-03 2014-04-03 A kind of key management method of wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410134463.7A CN103929744B (en) 2014-04-03 2014-04-03 A kind of key management method of wireless sensor network

Publications (2)

Publication Number Publication Date
CN103929744A CN103929744A (en) 2014-07-16
CN103929744B true CN103929744B (en) 2017-06-23

Family

ID=51147793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410134463.7A Expired - Fee Related CN103929744B (en) 2014-04-03 2014-04-03 A kind of key management method of wireless sensor network

Country Status (1)

Country Link
CN (1) CN103929744B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883372B (en) * 2015-06-19 2018-11-16 中国电子科技集团公司第五十四研究所 A kind of data transmission method of anti-fraud and attack resistance based on mobile Ad hoc network
CN106209384B (en) * 2016-07-19 2019-09-10 上海电享信息科技有限公司 Use the client terminal of security mechanism and the communication authentication method of charging unit
CN108235402B (en) * 2016-12-14 2021-07-13 扬州大学 Wireless sensor network routing protocol based on improved tree type clustering
CN108694186A (en) * 2017-04-07 2018-10-23 阿里巴巴集团控股有限公司 Data transmission method for uplink and server application, computing device and computer-readable medium
CN110855435B (en) * 2019-11-14 2022-04-19 北京京航计算通讯研究所 Access control method based on attribute cryptosystem in wireless sensor network
CN111278009B (en) * 2020-02-18 2022-09-27 金陵科技学院 Key distribution method based on physical unclonable function in wireless sensor network
CN112887947B (en) * 2021-01-14 2021-12-03 南通大学 Bluetooth Mesh clustering networking method for double-layer block chain
CN114679723B (en) * 2022-03-16 2024-04-26 国网江苏省电力有限公司电力科学研究院 Perception layer key management method and device based on credibility

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110670A (en) * 2006-07-17 2008-01-23 西安电子科技大学 Key management method based on wireless Mesh netword
CN102123393A (en) * 2011-03-08 2011-07-13 东南大学 Secret key management method for distributed wireless sensor network based on one-way function

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110670A (en) * 2006-07-17 2008-01-23 西安电子科技大学 Key management method based on wireless Mesh netword
CN102123393A (en) * 2011-03-08 2011-07-13 东南大学 Secret key management method for distributed wireless sensor network based on one-way function

Also Published As

Publication number Publication date
CN103929744A (en) 2014-07-16

Similar Documents

Publication Publication Date Title
CN103929744B (en) A kind of key management method of wireless sensor network
CN104780532B (en) One cluster key management method that can be used for wireless sensor network
Yu et al. FDAC: Toward fine-grained distributed data access control in wireless sensor networks
CN108880814A (en) A kind of dynamic cluster wireless sensor network key management method
CN101155024A (en) Effective key management method and its operation method for sensor network with clustering structure
CN102315935A (en) Wireless sensor network and computer network fused network secret key management method
CN104247379A (en) Method and devices for scalable replay counters
CN104980921A (en) Method for key distribution in wireless sensor network
CN101984625A (en) Safety start method of tree topology in IPv6 over low power wireless personal area network (6LoWPAN)
CN103731825A (en) Bridge-type-based wireless sensing network key management scheme
CN102123392B (en) Secret key management method for distributed wireless sensor network
CN102006595B (en) Key management method of wireless sensor network
Li et al. Certificateless online/offline signcryption scheme
CN101494861A (en) Method for pre-distributing wireless sensor network cipher key
CN103825742A (en) Authentication key agreement method applicable to large-scale sensor network
CN103731819A (en) Authentication method of wireless sensor network nodes
CN102123393B (en) Secret key management method for distributed wireless sensor network based on one-way function
CN104618904B (en) A kind of packet-based wireless sensor network key distribution method
CN104980270A (en) Wireless sensor network secret key management method based on identities
Bettayeb et al. A robust and efficient vector-based key management scheme for IoT networks
CN103813320A (en) Grouping cluster and master key based key management method
Saraswathi et al. Dynamic and probabilistic key management for distributed wireless sensor networks
Zhou et al. An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks
Rajamanickam et al. Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks
Meharia et al. A hybrid key management scheme for healthcare sensor networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170623

CF01 Termination of patent right due to non-payment of annual fee