透過您的圖書館登入
IP:3.139.80.216
  • 期刊

The Study on the Key Management and Billing for Wireless Sensor Networks

摘要


The sensing items of the wireless sensor network include sound waves, electromagnetic waves, positioning, temperature, air pressure, humidity, light brightness, speed measuring devices, etc. The sensors are mainly used in difficult-to-care environments-for example, military environment, forest fire sensing, and seawater quality sensing. Nowadays, sensing devices are more used in household appliances or highways. As a result, wireless sensor networks are becoming more popular and gradually becoming an indispensable infrastructure in urban and rural areas. However, the sensor networks must overcome many security issues in wireless sensor networks. For example, an attacker can easily eavesdrop on sensor data, invade legitimate sensors, and even spread malicious sensor information in an attempt to influence data center decisions. Therefore, to resist various attacks, many scholars are devoted to the research of related information security. However, the sensor has a primary microprocessor, scarce memory, and limited power. Therefore, asymmetric fundamental encryption mechanisms or trusted third-party mechanisms are generally not suitable for use in sensor networks. In other words, the sensor networks must use a lightweight group key replacement. This article aims to propose security and pricing strategies in wireless sensor networks to solve the above problems. First, we propose a series of mechanisms for group key creation and replacement. By using group key replacement, intrusive sensors can be excluded, thereby protecting legitimate sensors. Second, we suggest using polynomial operations and hierarchical essential management techniques in wireless sensor networks. Thus, let the future wireless sensor network system be safe, effective, and practical. In addition, we also proposed directly performing user identification between sensors; There is no need to temporarily store relevant certificate information and pass it to the authentication node. Finally, through an appropriate pricing mechanism, prevent hidden leakage on the user side, and build a complete information security mechanism.

延伸閱讀