[go: up one dir, main page]

CN102045887A - Access authorization device and method for wireless sensing network - Google Patents

Access authorization device and method for wireless sensing network Download PDF

Info

Publication number
CN102045887A
CN102045887A CN2009102073519A CN200910207351A CN102045887A CN 102045887 A CN102045887 A CN 102045887A CN 2009102073519 A CN2009102073519 A CN 2009102073519A CN 200910207351 A CN200910207351 A CN 200910207351A CN 102045887 A CN102045887 A CN 102045887A
Authority
CN
China
Prior art keywords
node
access authorization
sensing
target
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009102073519A
Other languages
Chinese (zh)
Inventor
柯力群
惟佐·D·葛利果
李韩燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial Technology Research Institute ITRI
Carnegie Mellon University
Original Assignee
Industrial Technology Research Institute ITRI
Carnegie Mellon University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial Technology Research Institute ITRI, Carnegie Mellon University filed Critical Industrial Technology Research Institute ITRI
Priority to CN2009102073519A priority Critical patent/CN102045887A/en
Publication of CN102045887A publication Critical patent/CN102045887A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

An access authorization device for a wireless sensor network includes at least one base node and a wireless sensor network formed by a plurality of sensor nodes. The at least one base node sends a request message to a target sensing node in the wireless sensing network after obtaining an access authorization of a user. The target sensing node requests to return the sensing data to at least one control node in the wireless sensing network according to the request message, and determines whether the access authorization of the user is met by referring to the sensing data returned by the control node, so as to serve as a basis for whether the multimedia data meeting the access authorization is returned.

Description

无线感测网络的存取授权装置与方法 Access authorization device and method for wireless sensor network

技术领域technical field

本发明是关于一种无线感测网络(Wireless Sensor Network,WSN)的存取授权(access authorization)装置与方法。The present invention relates to a wireless sensor network (Wireless Sensor Network, WSN) access authorization (access authorization) device and method.

背景技术Background technique

无线传感器网络包括许多微小、分布式、低耗电及低复杂度的感测节点来相互合作地监测物理环境信息,例如环境的温度、湿度、震动、光度、压力、气体、浓度等。多媒体数据,例如图像或声音的数据,也可以通过无线感测网络收集并传送。所收集的数据大部分用来检测一些事件或触发其它的操作。无线感测网络的应用包含如建筑结构检测、地震活动检测、安全监控、森林火灾检测及战场监控等。Wireless sensor networks include many tiny, distributed, low-power and low-complexity sensing nodes to cooperatively monitor physical environment information, such as environmental temperature, humidity, vibration, luminosity, pressure, gas, concentration, etc. Multimedia data, such as image or sound data, can also be collected and transmitted through the wireless sensor network. Most of the collected data is used to detect some events or trigger other actions. Applications of wireless sensing networks include building structure detection, seismic activity detection, security monitoring, forest fire detection, and battlefield monitoring.

图1是一种无线传感器网络的应用架构的一个范例示意图。参考图1,多个感测节点所形成的无线传感器网络105中的感测节点,例如感测节点131,将感测到的数据以多跳式(multi-hop)传送到基地节点(Base Station,BS)110,基地节点110收集感测数据并通过因特网114传送到服务器(Server)116上,此服务器例如是一个网页服务器。使用者,例如118或120,可于远程通过因特网114联机登入至服务器116,由服务器116来验证使用者的身份及权限后,使用者就可以依照本身的权限来存取无线传感器网络110中感测节点的感测数据。FIG. 1 is a schematic diagram of an example of an application architecture of a wireless sensor network. Referring to FIG. 1 , the sensing nodes in the wireless sensor network 105 formed by a plurality of sensing nodes, such as the sensing node 131, transmit the sensed data to the base node (Base Station) with multi-hop (multi-hop). , BS) 110, the base node 110 collects sensing data and transmits it to a server (Server) 116 through the Internet 114, such as a web server. The user, such as 118 or 120, can remotely log in to the server 116 through the Internet 114, and after the server 116 verifies the user's identity and authority, the user can access the sensor in the wireless sensor network 110 according to its own authority. The sensor data of the measuring node.

无线传感器网络的应用中,感测数据的收集通常是将感测数据周期性地回传到基地节点或是以特殊的处理方式聚集后传回到基地节点,后端的服务器再进行感测数据的分析处理以让使用者读取。多媒体数据量相较于一般感测数据大很多,且考虑无线传感器网络的通讯能力与低功率(lower-power)传感器的限制,此类数据型态的收集大部分是使用者下命令后才将此数据收集回来。多媒体数据的收集也涉及了隐私性的问题。In the application of wireless sensor networks, the collection of sensing data is usually sent back to the base node periodically or aggregated in a special processing way and then sent back to the base node, and the back-end server then collects the sensing data. Parse processing for consumer readability. The amount of multimedia data is much larger than that of general sensing data, and considering the communication capabilities of wireless sensor networks and the limitations of low-power sensors, most of this type of data is collected after the user gives an order. This data is collected back. The collection of multimedia data also involves privacy issues.

例如,无线感测网络应用于安全监控时,使用者希望当有入侵者入侵时,警卫能够观看图像以补捉到入侵者的外貌作为追补入侵者的辅助信息,但又希望平常能够保有隐私权,不让警卫能够观看需要隐私的区域。如果无线感测网络不断地回报感测信息,通过基地节点然后传到服务器,服务器可以依照这些感测信息来判断是否发生特定事件,然后开启警卫或特定使用者的权限来进行存取图像数据。也就是说,使用者的存取授权条件来自可信赖元件所提供的信息,而存取授权的判断也是在一种隔离于攻击者且安全可信赖的环境或是元件上完成,例如安全的核心、可信赖的计算基础或是安全的计算装置上,所以,实体破坏攻击是假设不可能存在的。For example, when the wireless sensor network is used in security monitoring, the user hopes that when an intruder invades, the guard can watch the image to capture the appearance of the intruder as auxiliary information for supplementing the intruder, but they also hope that the privacy can be maintained normally , to prevent guards from viewing areas that require privacy. If the wireless sensor network continuously reports sensory information, it passes through the base node and then is transmitted to the server. The server can judge whether a specific event has occurred based on the sensory information, and then enable the security guard or a specific user to access the image data. That is to say, the user's access authorization conditions come from information provided by trusted components, and the judgment of access authorization is also completed in a safe and reliable environment or components that are isolated from attackers, such as the secure core , a trusted computing foundation or a secure computing device, so physical damage attacks are assumed to be impossible.

然而,此法会加速基地节点的邻近节点因为不断的路由(routing)封包而造成电源提早耗尽。因此,如何针对不同的使用者进行不同的存取权限(access privilege)控管以及在适当的时机,例如紧急事件发生时,让某些使用者能够获得实时读取多媒体数据的权限,并且设计出适合无线感测网络特性的安全存取控制技术也是无线传感器网络的关键技术之一。However, this method will speed up the power consumption of the adjacent nodes of the base node due to continuous routing packets. Therefore, how to control different access privileges for different users and at appropriate times, such as when an emergency occurs, allow some users to obtain the right to read multimedia data in real time, and design a The security access control technology suitable for the characteristics of wireless sensor network is also one of the key technologies of wireless sensor network.

图2的台湾专利公开号200614767揭露的数据授权方法的范例是用于两移动装置之间数据分享的授权操作。如图2的范例流程所示,由一移动装置A传送分享封包给移动装置B,封包内容包括分享的数据及对应的数据规则,移动装置B根据初始数据规则及环境感知信息判别是否有权限存取封包内分享的数据,也就是说,一移动装置将要分享的数据直接传给另一移动装置,由此另一装置判断本身是否有权限读取分享数据,其中,此判断存取授权规则的环境感知信息未包含任何物理环境信息。An example of the data authorization method disclosed in Taiwan Patent Publication No. 200614767 in FIG. 2 is an authorization operation for data sharing between two mobile devices. As shown in the example process in Figure 2, a mobile device A sends a sharing packet to a mobile device B. The content of the packet includes the data to be shared and the corresponding data rules. Get the data shared in the packet, that is to say, a mobile device directly transmits the data to be shared to another mobile device, so that the other device judges whether it has the authority to read the shared data. Among them, this judges the access authorization rule Environmental awareness information does not contain any physical environment information.

图3的美国专利号US7,447,494所揭露的安全无线授权系统(Secure Wireless Authorization System)的范例是用于两装置于远程通过一服务器进行存取授权验证,使得第三方装置可以存取到远程另一使用者装置,如图3的系统范例所示,使用者310以安全的方式登入至授权服务器(authorization server)312之后保持联机,然后远程第三方装置(remote third party entity)320发起授权请求,授权服务器312验证授权请求等相关信息后,同意远程第三方装置执行程序,也就是说,存取授权验证是完全由授权服务器312来进行的。The example of the Secure Wireless Authorization System (Secure Wireless Authorization System) disclosed in US Patent No. US7,447,494 in FIG. 3 is used for two devices to perform access authorization verification remotely through a server, so that a third-party device can access to another remote device. A user device, as shown in the system example of FIG. 3 , a user 310 logs in to an authorization server (authorization server) 312 in a secure manner and remains online, and then a remote third party device (remote third party entity) 320 initiates an authorization request, The authorization server 312 approves the remote third-party device to execute the program after verifying the authorization request and other related information. That is to say, the access authorization verification is completely performed by the authorization server 312 .

发明内容Contents of the invention

本发明的实施范例可提供一种无线感测网络的存取授权装置与方法。Embodiments of the present invention can provide an access authorization device and method for a wireless sensor network.

在一实施范例中,所揭露者是关于一种无线感测网络的存取授权装置。此装置包含至少一基地节点、以及由数个感测节点形成的一无线感测网络。此至少一基地节点取得一使用者的一存取授权后,发送一请求消息到此无线感测网络中的一目标感测节点。此目标感测节点根据此请求消息向此无线感测网络中的至少一控制节点,请求回传其感测数据,并参考此至少一控制节点回传的感测数据,来判断是否符合此使用者的存取授权,以作为是否回传符合此存取授权的多媒体数据的依据。In an embodiment, the disclosed is related to an access authorization device for a wireless sensor network. The device includes at least one base node and a wireless sensing network formed by several sensing nodes. After obtaining an access authorization from a user, the at least one base node sends a request message to a target sensor node in the wireless sensor network. According to the request message, the target sensor node requests at least one control node in the wireless sensor network to send back its sensing data, and refers to the sensing data returned by the at least one control node to determine whether it is suitable for this application. The access authorization of the user is used as the basis for whether to return the multimedia data conforming to the access authorization.

在另一实施范例中,所揭露者是关于一种无线感测网络的存取授权方法。此方法包含:通过至少一基地节点,取得一使用者的存取授权;从一无线感测网络的数个感测节点中选取至少一控制节点,以及选取由此基地节点到一目标感测节点的至少一中间路由节点;通过此基地节点,发送一请求消息到此目标感测节点,此请求消息至少备有验证信息;此目标感测节点根据此请求消息,向被选取的至少一控制节点请求回传其感测数据,并参考此回传的感测数据,来判断是否符合此使用者的存取授权,并发出一相对应的响应消息;此至少一中间路由节点根据此验证信息,检查此响应消息,以决定丢弃或是转送此响应消息;以及通过此基地节点,验证被转送的响应消息。In another embodiment, the disclosure relates to an access authorization method for a wireless sensor network. The method includes: obtaining a user's access authorization through at least one base node; selecting at least one control node from several sensor nodes in a wireless sensor network, and selecting the base node to a target sensor node at least one intermediate routing node; through the base node, send a request message to the target sensing node, the request message at least has verification information; the target sensing node sends at least one selected control node according to the request message Request to send back its sensing data, and refer to the returned sensing data to determine whether it meets the user’s access authorization, and send a corresponding response message; the at least one intermediate routing node according to the verification information, checking the response message to decide to discard or forward the response message; and verifying the forwarded response message through the base node.

兹配合下列图标、实施范例的详细说明及申请专利范围,将上述及本发明的其它目的与优点详述于后。The above and other objectives and advantages of the present invention will be described in detail below in conjunction with the following diagrams, detailed descriptions of implementation examples and scope of patent application.

附图说明Description of drawings

图1是一种无线传感器网络的应用架构的一个范例示意图。FIG. 1 is a schematic diagram of an example of an application architecture of a wireless sensor network.

图2是一种数据授权方法的一个范例流程图。Fig. 2 is an exemplary flow chart of a data authorization method.

图3是一种安全无线授权系统的一个范例示意图。FIG. 3 is a schematic diagram of an example of a secure wireless authorization system.

图4是无线感测网络端的使用情境的一个范例示意图,与所揭露的某些实施范例一致。FIG. 4 is a schematic diagram of an example of a usage scenario of a wireless sensor network, which is consistent with certain disclosed embodiments.

图5是影响传送消息的攻击模型的一个范例示意图。FIG. 5 is a schematic diagram of an example of an attack model that affects delivery of messages.

图6是破坏攻击目标感测节点的攻击模型的一个范例示意图。FIG. 6 is a schematic diagram of an example of an attack model for destroying an attack target sensing node.

图7是破坏攻击控制节点的攻击模型的一个范例示意图。FIG. 7 is a schematic diagram of an example of an attack model for destroying an attack control node.

图8是移动目标感测节点的攻击模型的一个范例示意图。FIG. 8 is a schematic diagram of an example of an attack model of a moving object sensing node.

图9是移动控制节点的攻击模型的一个范例示意图。FIG. 9 is a schematic diagram of an example of an attack model of a mobile control node.

图10是无线感测网络的存取授权装置的一个范例示意图,与所揭露的某些实施范例一致。FIG. 10 is a schematic diagram of an example of an access authorization device for a wireless sensor network, which is consistent with certain disclosed embodiments.

图11是无线感测网络的存取授权方法的一个范例流程图,与所揭露的某些实施范例一致。FIG. 11 is an exemplary flowchart of an access authorization method for a wireless sensor network, which is consistent with certain disclosed embodiments.

图12是基地节点的一个范例示意图,与所揭露的某些实施范例一致。FIG. 12 is an example schematic diagram of a base node, which is consistent with certain disclosed implementation examples.

图13是控制节点的一个范例示意图,与所揭露的某些实施范例一致。FIG. 13 is a schematic diagram of an example of a control node, which is consistent with certain disclosed embodiments.

图14是目标感测节点的一个范例示意图,与所揭露的某些实施范例一致。FIG. 14 is an exemplary schematic diagram of a target sensing node, consistent with certain disclosed embodiments.

图15是检测节点被移动的一个范例示意图,与所揭露的某些实施范例一致。FIG. 15 is a schematic diagram of an example of detecting that a node is moved, which is consistent with certain disclosed implementation examples.

图16是请求消息的通用格式的一个范例示意图,与所揭露的某些实施范例一致。FIG. 16 is a schematic diagram of an example of a general format of a request message, which is consistent with certain disclosed embodiments.

图17是一个范例示意图,说明中间路由节点处理请求消息的操作,与所揭露的某些实施范例一致。Fig. 17 is an exemplary schematic diagram illustrating the operation of the intermediate routing node for processing the request message, which is consistent with some disclosed embodiments.

图18是一个范例示意图,说明中间路由节点处理响应消息的操作,与所揭露的某些实施范例一致。FIG. 18 is an exemplary schematic diagram illustrating the operation of an intermediate routing node for processing a response message, which is consistent with certain disclosed embodiments.

[主要元件标号说明][Description of main component labels]

105无线传感器网络          110基地节点105 wireless sensor network 110 base nodes

114因特网                  116服务器114 Internet 116 Server

118、120使用者             131感测节点118, 120 users 131 sensing nodes

310使用者                  312授权服务器310 user 312 authorization server

320远程第三方装置320 remote third-party device

400无线感测网络的使用情境的范例400 Examples of Use Scenarios for Wireless Sensor Networks

402基地节点                404目标感测节点402 base node 404 target sensing node

406多跳式                  408区域406 multi-hop 408 area

411-41m中间路由节点        421-42k感测节点411-41m intermediate routing nodes 421-42k sensing nodes

410传递请求消息            420响应以多媒体数据410 delivery request message 420 response with multimedia data

504目标感测节点            505攻击者504 target sensing node 505 attacker

521-525控制节点521-525 control nodes

605攻击者605 Attacker

610攻击者破坏或攻击目标感测节点610 The attacker destroys or attacks the target sensing node

620将多媒体直接回传到基地节点620 returns the multimedia directly to the base node

705攻击者                  721-724控制节点705 attacker 721-724 control node

710传送假的感测数据给目标感测节点710 Send false sensing data to the target sensing node

805攻击者                          802区域805 Attacker 802 Area

804其它区域                        810移动目标感测节点804 other areas 810 moving target sensing node

905攻击者                          906其它区域905 attacker 906 other areas

904另一其它区域                    921、922控制节点904 another area 921, 922 control nodes

910、920移动控制节点910, 920 mobile control nodes

1002服务器                         1004基地节点1002 server 1004 base node

1006无线感测网络                   1008使用者1006 wireless sensor network 1008 users

1004a请求消息                      1008a存取授权1004a request message 1008a access authorization

1010目标感测节点                   1021-1024感测节点1010 target sensing nodes 1021-1024 sensing nodes

1110通过基地节点,取得使用者的存取授权1110 Obtain the user's access authorization through the base node

1120从无线感测网络的数个无线感测节点中选取至少一控制节点,以及选取由基地节点到目标感测节点的至少一中间路由节点1120 Select at least one control node from several wireless sensor nodes in the wireless sensor network, and select at least one intermediate routing node from the base node to the target sensor node

1130通过基地节点,发送一请求消息到目标感测节点,请求消息至少备有验证信息1130 Send a request message to the target sensing node through the base node, the request message is at least equipped with verification information

1140目标感测节点根据请求消息,向选取的至少一控制节点请求回传其感测数据,并参考此回传的感测数据,来判断是否符合使用者的存取授权,并发出一相对应的响应消息1140 The target sensing node requests at least one selected control node to return its sensing data according to the request message, and refers to the returned sensing data to determine whether the access authorization of the user is met, and sends a corresponding response message for

1150此至少一中间路由节点根据此验证信息,检查此响应消息,以决定丢弃或是转送此响应消息1150 The at least one intermediate routing node checks the response message according to the verification information to decide to discard or forward the response message

1160基地节点验证被转送的响应消息1160 base node verifies the forwarded response message

1210储存单元                        1220中央处理单元1210 storage unit 1220 central processing unit

1231第一通讯接口                    1232第二通讯接口1231 first communication interface 1232 second communication interface

1300控制节点                        1310传感器1300 control nodes 1310 sensors

1310a感测数据                       1320通讯接口1310a sensing data 1320 communication interface

1330中央处理单元1330 central processing unit

1410传感器                          1410a多媒体数据1410 sensor 1410a multimedia data

1420通讯接口                        1430中央处理单元1420 communication interface 1430 central processing unit

1510节点                            1520移动1510 nodes 1520 mobile

1531-1534邻居节点                   1540移动位置后的节点1531-1534 Neighbor Nodes 1540 Nodes After Moving Location

1550攻击者1550 attackers

MACL光度消息验证码            MACT温度消息验证码MAC L photometric message verification code MAC T temperature message verification code

MACH湿度消息验证码            SMAC多模式消息验证码MAC H Humidity Message Authentication Code SMAC Multimodal Message Authentication Code

Repl_message响应消息Repl_message response message

具体实施方式Detailed ways

本发明的实施范例提供一种无线感测网络的存取授权技术,其设计是将使用者的存取授权数据送到无线感测网络内的一目标感测节点,然后由无线感测网络内的其它感测节点相互合作,回报所感测的物理环境信息,例如环境的温度、湿度、光度、振动、压力、气体、浓度等信息,以进行分布式的存取授权判断,进而决定是否回传数据给使用者读取。此存取授权技术将可应用于多模式无线感测网络环境中,来作为使用者存取无线感测网络所检测到的多媒体数据,例如图像或声音数据,的存取授权控管。An embodiment of the present invention provides an access authorization technology for a wireless sensor network, which is designed to send the user's access authorization data to a target sensor node in the wireless sensor network, and then send the access authorization data to a target sensor node in the wireless sensor network. Other sensing nodes cooperate with each other to report the sensed physical environment information, such as environmental temperature, humidity, luminosity, vibration, pressure, gas, concentration and other information, in order to make distributed access authorization judgments, and then decide whether to send back The data is read by the user. The access authorization technology can be applied in a multi-mode wireless sensor network environment as an access authorization control for users to access multimedia data detected by the wireless sensor network, such as image or audio data.

图4是无线感测网络的使用情境的一个范例示意图,与所揭露的某些实施范例一致。图4的使用情境范例400中,假设从基地节点402到目标感测节点404中间有m个中间路由节点(intermediate routing node)411-41m,且无线感测网络400是以多跳式(multihop)406的方式进行数据传递从基地节点402到目标感测节点404的请求消息,如箭头410所指;在目标感测节点404的同一区域408内有多个感测节点,同一区域408代表目标感测节点404与其它感测节点可以互相通讯的范围,其中有数个感测节点,例如感测节点421-42k,可提供区域408的其它感测数据给目标感测节点404来进行使用者存取授权的判断,此类可提供同一区域内的其它感测数据给目标感测节点来进行使用者存符合取授权判断的感测节点称之为该区域的控制节点(controlling node)。目标感测节点404判断符合存取授权后,则响应以多媒体数据,如箭头420所指。FIG. 4 is a schematic diagram of an example of a usage scenario of a wireless sensor network, which is consistent with certain disclosed embodiments. In the usage scenario example 400 of FIG. 4 , it is assumed that there are m intermediate routing nodes (intermediate routing nodes) 411-41m between the base node 402 and the target sensor node 404, and the wireless sensor network 400 is multihop (multihop) 406 for data transmission from the base node 402 to the target sensor node 404 request message, as indicated by the arrow 410; there are multiple sensor nodes in the same area 408 of the target sensor node 404, and the same area 408 represents the target sensor The sensing node 404 and other sensing nodes can communicate with each other. There are several sensing nodes, such as sensing nodes 421-42k, which can provide other sensing data of the area 408 to the target sensing node 404 for user access. Judgment of authorization, this type of sensing node that can provide other sensing data in the same area to the target sensing node for user deposit and authorization judgment is called the controlling node of the area. After the target sensor node 404 determines that the access authorization is met, it responds with multimedia data, as indicated by the arrow 420 .

由于存取授权的判断是在感测节点上完成,因此感测节点可能遭受实体破坏攻击(node compromised attacks)。攻击者的目标是期望在没有有效的存取权限下企图绕过存取授权的判断,来得到某些区域的多媒体感测数据,也就是说,某一区域的感测数据并不符合存取授权的条件,而本发明的实施范例则是要能防止这些攻击者的可能攻击行为来企图绕过存取授权的判断,图5至图9分别列出五种可能的攻击模型的范例。此五种可能的攻击模型包括影响传送消息者、破坏攻击目标感测节点者、破坏攻击控制节点者、移动目标感测节点者、以及移动控制节点者。Since the judgment of access authorization is completed on the sensor node, the sensor node may be subject to entity destruction attacks (node compromised attacks). The goal of the attacker is to try to bypass the judgment of access authorization without effective access rights to obtain multimedia sensing data in certain areas, that is, the sensing data in a certain area does not meet the requirements of access authorization. Authorization conditions, and the implementation example of the present invention is to be able to prevent these attackers from attempting to bypass the judgment of access authorization. Figures 5 to 9 respectively list examples of five possible attack models. The five possible attack models include those who influence the message transmitter, those who destroy the attack target sensor node, those who destroy the attack control node, those who move the target sensor node, and those who move the control node.

图5的攻击模型的范例是攻击者影响或操作控制节点传送给目标感测节点的消息,来企图通过存取授权的判断,例如攻击者505修改或是重送控制节点521-525传送给目标感测节点404的符合存取授权判断的感测数据。图6的攻击模型的范例是攻击者605可破坏攻击目标感测节点504,如箭头610所指;然后,如箭头620所指,将多媒体直接回传到基地节点,而没有向周围控制节点询问其感测数据以判断环境信息是否符合存取授权。图7的攻击模型的范例是攻击者705可破坏或攻击控制节点721-724,然后传送假的感测数据给目标感测节点504来符合存取授权判断,如箭头710所指。The example of the attack model in Figure 5 is that the attacker influences or manipulates the message sent by the control node to the target sensing node in an attempt to pass the judgment of access authorization, for example, the attacker 505 modifies or resends the message sent by the control node 521-525 to the target The sensing data of the sensing node 404 conforms to the access authorization judgment. An example of the attack model of FIG. 6 is that the attacker 605 can destroy the attack target sensing node 504, as indicated by the arrow 610; then, as indicated by the arrow 620, the multimedia is directly returned to the base node without asking the surrounding control nodes It senses data to judge whether the environmental information meets the access authorization. An example of the attack model in FIG. 7 is that the attacker 705 can destroy or attack the control nodes 721 - 724 , and then send false sensing data to the target sensing node 504 to meet the access authorization decision, as indicated by the arrow 710 .

图8的攻击模型的范例是,若攻击805者有权限存取一区域802的目标图像或声音感测数据,攻击者805可移动目标感测节点404到其它区域804,如箭头810所指;而导致攻击者805可以非法取得其它区域804的多媒体数据。An example of the attack model in FIG. 8 is that if the attacker 805 has permission to access the target image or sound sensing data in an area 802, the attacker 805 can move the target sensing node 404 to other areas 804, as indicated by arrow 810; As a result, the attacker 805 can illegally obtain multimedia data in other areas 804 .

图9的攻击模型的范例是,攻击者移动控制节点到其它有符合存取授权条件的物理环境区域,例如,攻击者905移动控制节点921到其它区域906,如箭头910所指;攻击者905移动控制节点922到另一其它区域904,如箭头920所指;而导致攻击者可以非法取得多媒体数据。The example of the attack model of Fig. 9 is that the assailant moves the control node to other physical environment areas that meet the access authorization conditions, for example, the assailant 905 moves the control node 921 to other areas 906, as indicated by the arrow 910; the assailant 905 Move the control node 922 to another area 904, as indicated by the arrow 920; and an attacker can obtain multimedia data illegally.

由于感测节点所检测到的物理环境数据,例如温度、湿度、光度及振动等,是作为存取授权判断的条件,并且在资源有限的无线感测网络上进行传送多媒体之类的大量数据会造成一定的负担,也是通讯负担消耗电源的因素之一,因此,本发明的无线感测网络的存取授权装置的实施范例在设计上会对于物理环境数据检测的错误或攻击者的攻击破坏有相对应的机制来处理。例如将错误的消息,如上述攻击模型中被攻击者窜改或是不合法的响应消息等,在中间过程时就先滤除丢弃,不需要等到被回传到基地节点时才被发现丢弃,如此可避免中间路由节点耗费资源来传送此错误消息。Since the physical environment data detected by the sensor nodes, such as temperature, humidity, luminosity and vibration, etc., are used as the conditions for access authorization judgment, and the transmission of large amounts of data such as multimedia on the wireless sensor network with limited resources will It causes a certain burden, and it is also one of the factors that cause the communication burden to consume power. Therefore, the implementation example of the access authorization device for the wireless sensor network of the present invention is designed to have a certain impact on the error of physical environment data detection or the attack and destruction of the attacker. corresponding mechanism. For example, erroneous messages, such as tampered by attackers or illegal response messages in the above attack model, are filtered out and discarded in the middle process, and do not need to be discovered and discarded when they are sent back to the base node. Intermediate routing nodes can be avoided from expending resources to transmit this error message.

图10是无线感测网络的存取授权装置的一个范例示意图,与所揭露的某些实施范例一致。图10的范例中,存取授权装置1000包含至少一基地节点1004、以及由数个感测节点形成的一无线感测网络1006。至少一基地节点1004取得一使用者1008的一存取授权1008a后,发送一请求消息1004a到无线感测网络1006中的一目标感测节点1010,目标感测节点1010根据请求消息1004a,向无线感测网络1006中的至少一控制节点请求回传其感测数据,并根据此至少一控制节点回传的感测数据,来判断是否符合使用者1008的存取授权1008a,以作为是否回传符合存取授权1008a的多媒体数据的依据。FIG. 10 is a schematic diagram of an example of an access authorization device for a wireless sensor network, which is consistent with certain disclosed embodiments. In the example of FIG. 10 , the access authorization device 1000 includes at least one base node 1004 and a wireless sensor network 1006 formed by several sensor nodes. After at least one base node 1004 obtains an access authorization 1008a of a user 1008, it sends a request message 1004a to a target sensor node 1010 in the wireless sensor network 1006, and the target sensor node 1010 sends a request message 1004a to the wireless network. At least one control node in the sensing network 1006 requests to send back its sensing data, and judges whether the access authorization 1008a of the user 1008 is met according to the sensing data returned by the at least one control node, as whether to send back Evidence for multimedia data in compliance with access authorization 1008a.

此至少一控制节点皆为无线感测网络1006中的感测节点,例如感测节点1021-1024,可参考至少一类型的物理环境信息,例如环境的温度、湿度、光度、振动等信息,是否符合使用者1008的存取授权内所标示的条件,来决定是否回传其感测数据给目标感测节点1010来进行存取授权1008a的判断。回传的感测数据如果符合使用者1008的存取授权1008a,目标感测节点1010就传回符合存取授权1008a的多媒体数据,如图像或声音数据,给基地节点1004,基地节点1004再传回此多媒体数据给服务器,以提供给使用者。如果未符合使用者1008的存取授权1008a,目标感测节点1010则送回拒绝存取的消息。The at least one control node is all sensing nodes in the wireless sensing network 1006, such as sensing nodes 1021-1024, which can refer to at least one type of physical environment information, such as environmental temperature, humidity, luminosity, vibration and other information, whether The conditions marked in the access authorization of the user 1008 are met to determine whether to send back the sensing data to the target sensing node 1010 for the judgment of the access authorization 1008a. If the returned sensing data conforms to the access authorization 1008a of the user 1008, the target sensing node 1010 returns multimedia data conforming to the access authorization 1008a, such as image or audio data, to the base node 1004, and the base node 1004 transmits Return the multimedia data to the server to provide to the user. If the access authorization 1008a of the user 1008 is not met, the target sensor node 1010 sends back an access denied message.

参考由控制节点回传感测数据的方式可针对一种型态的感测数据来参考至少一个控制节点所回传的感测数据,然后计算所回传的感测数据的统计量,例如平均(average)、多数(majority)、最大(maximum)或最小值(minmum)等,作为最后参考的感测数据。Referring to the manner in which the sensing data is returned by the control node, it is possible to refer to the sensing data returned by at least one control node for one type of sensing data, and then calculate the statistics of the returned sensing data, such as the average (average), majority (majority), maximum (maximum) or minimum (minmum), etc., as the sensing data for the final reference.

基地节点1004发送的请求消息1004a还包括一验证参数,此验证信息是提供给由基地节点1004到目标感测节点1010的中间的一或多个路由节点的每一路由节点,可作为日后验证响应消息的一个参数,例如路由节点可用此参数来检查出有被攻击者窜改或是不合法的响应消息时,在中间过程就先丢弃此响应消息。The request message 1004a sent by the base node 1004 also includes a verification parameter, and this verification information is provided to each routing node of one or more routing nodes between the base node 1004 and the target sensing node 1010, which can be used as a verification response in the future A parameter of a message. For example, when a routing node can use this parameter to check out a response message that has been tampered with by an attacker or is illegal, the response message will be discarded in the middle process.

使用者1008可提出身份至识别及密码登入服务器1002,例如一网页服务器,然后服务器验证使用者身份后,可向基地节点1004发出一请求命令。根据请求命令1002a,基地节点1004可通过因特网,向至服务器1002取得使用者1008的存取授权1008a。The user 1008 can provide an identity to the identification and password login server 1002, such as a web server, and then the server can send a request command to the base node 1004 after verifying the user's identity. According to the request command 1002a, the base node 1004 can obtain the access authorization 1008a of the user 1008 from the server 1002 through the Internet.

承上述,图11是无线感测网络的存取授权方法的一个范例流程图,与所揭露的某些实施范例一致。此范例流程中,首先通过基地节点1004,取得使用者1008的存取授权,如步骤1110所示。从无线感测网络1006的数个无线感测节点中选取至少一控制节点,以及选取由基地节点1004到目标感测节点1010的至少一中间路由节点,如步骤1120所示。通过基地节点1004,发送一请求消息1004a到目标感测节点1010,请求消息1004a至少备有验证信息,如步骤1130所示。目标感测节点1010根据请求消息1004a,向选取的至少一控制节点请求回传其感测数据,并参考此回传的感测数据,来判断是否符合使用者1008的存取授权1008a,并发出一相对应的响应消息,如步骤1140所示。此至少一中间路由节点根据此验证信息,检查此响应消息,以决定丢弃或是转送此响应消息,如步骤1150所示。再由基地节点1004验证被转送的响应消息,如步骤1160所示。Based on the above, FIG. 11 is an exemplary flowchart of an access authorization method for a wireless sensor network, which is consistent with certain disclosed embodiments. In this exemplary process, firstly, the access authorization of the user 1008 is obtained through the base node 1004 , as shown in step 1110 . Select at least one control node from several wireless sensor nodes in the wireless sensor network 1006 , and select at least one intermediate routing node from the base node 1004 to the target sensor node 1010 , as shown in step 1120 . The base node 1004 sends a request message 1004 a to the target sensor node 1010 , the request message 1004 a has at least authentication information, as shown in step 1130 . The target sensing node 1010 requests at least one selected control node to return its sensing data according to the request message 1004a, and refers to the returned sensing data to determine whether it meets the access authorization 1008a of the user 1008, and sends A corresponding response message, as shown in step 1140 . The at least one intermediate routing node checks the response message according to the verification information to decide to discard or forward the response message, as shown in step 1150 . Then the base node 1004 verifies the forwarded response message, as shown in step 1160 .

承上述,基地节点1004可包括一储存单元、一中央处理单元、以及一第一通讯接口与一第二通讯接口。如图12的范例所示,储存单元1210进行数据的储存,储存数据例如使用者1008的存取授权、请求消息1004a、响应消息等。中央处理单元1220通过第二通讯接口1232,根据使用者的存取授权,下达传送请求消息1004a到目标感测节点1010,及通过第一通讯接口1231将目标感测节点1010回传的多媒体数据传送给服务器1002。第一通讯接口1231是与服务器1002进行双向沟通。第二通讯接口1232是与无线感测网络中的感测节点或是中间路由节点进行沟通。Based on the above, the base node 1004 may include a storage unit, a central processing unit, and a first communication interface and a second communication interface. As shown in the example of FIG. 12 , the storage unit 1210 stores data, such as the access authorization of the user 1008 , the request message 1004 a, the response message, and the like. The central processing unit 1220 issues a transmission request message 1004a to the target sensor node 1010 through the second communication interface 1232 according to the user's access authorization, and transmits the multimedia data returned by the target sensor node 1010 through the first communication interface 1231 to the server 1002. The first communication interface 1231 is for two-way communication with the server 1002 . The second communication interface 1232 communicates with sensing nodes or intermediate routing nodes in the wireless sensing network.

每一控制节点1300可包括至少一传感器、一通讯接口及一中央处理单元。如图13的范例所示,至少一传感器1310感测至少一类型的物理环境信息,例如温度、湿度、光度、压力、气体、浓度等。通讯接口1320与基地节点1004及目标感测节点1010进行双向沟通。中央处理单元1330可指挥传感器1310进行感测,并可通过通讯接口1320传回传感器1310的感测数据1310a给目标感测节点1010。Each control node 1300 may include at least one sensor, a communication interface and a central processing unit. As shown in the example of FIG. 13 , at least one sensor 1310 senses at least one type of physical environment information, such as temperature, humidity, luminosity, pressure, gas, concentration, and the like. The communication interface 1320 performs two-way communication with the base node 1004 and the target sensing node 1010 . The central processing unit 1330 can instruct the sensor 1310 to perform sensing, and can send back the sensing data 1310 a of the sensor 1310 to the target sensing node 1010 through the communication interface 1320 .

目标感测节点1010可包括至少一传感器、一通讯接口及一中央处理单元。如图14的范例所示,通讯接口1420与基地节点1004及每一控制节点进行双向沟通。中央处理单元1430根据基地节点1004发送的请求消息1004a,通过通讯接口1420,向每一控制节点请求感测数据,并根据此感测数据判断是否指挥至少一传感器1410撷取出多媒体数据1410a来回传给基地节点1004。The target sensing node 1010 may include at least one sensor, a communication interface and a central processing unit. As shown in the example of FIG. 14 , the communication interface 1420 communicates bidirectionally with the base node 1004 and each control node. The central processing unit 1430 requests the sensing data from each control node through the communication interface 1420 according to the request message 1004a sent by the base node 1004, and judges whether to instruct at least one sensor 1410 to capture the multimedia data 1410a and transmit it back and forth according to the sensing data. Give the base node 1004.

第二通讯接口1232、通讯接口1420、以及通讯接口1320可采用无线的传输方式,例如IEEE 802.15.4无线感测网络及BlueTooth等具多跳式的短距通讯协议。第一通讯接口1231则可采用有线或无线的传输方式,例如以太网络、IEEE 802.11无线网络、WiMax、3G、3.5G及GPRS等。The second communication interface 1232, the communication interface 1420, and the communication interface 1320 can adopt wireless transmission methods, such as IEEE 802.15.4 wireless sensor network and BlueTooth and other short-distance communication protocols with multiple hops. The first communication interface 1231 can adopt wired or wireless transmission methods, such as Ethernet, IEEE 802.11 wireless network, WiMax, 3G, 3.5G, and GPRS.

基地节点1004发送的请求消息1004a包括了验证信息,本发明的无线感测网络的存取授权的技术中,所有相关的响应消息也会包含一个证据,来证明此响应消息是经过存取授权的验证,例如,证明控制节点确实有回报感测数据给目标感测节点、目标感测节点确实有验证使用者的存取授权等。选取的中间路由节点随着请求消息传送不同的验证金钥,便能验证是否路由这些响应消息至下一个节点,也就是说,由中间的路由节点当中随机选取部分节点使其能够提早验证响应消息的正确性。The request message 1004a sent by the base node 1004 includes authentication information. In the wireless sensor network access authorization technology of the present invention, all relevant response messages will also contain a proof to prove that the response message is authorized by access Verification, for example, proves that the control node does report the sensing data to the target sensing node, the target sensing node does have the access authorization of the verified user, and so on. The selected intermediate routing node can verify whether to route these response messages to the next node by transmitting different verification keys along with the request message, that is, randomly select some nodes from the intermediate routing nodes to enable early verification of the response message correctness.

当基地节点发出请求消息,欲读取目标感测节点的多媒体的数据时,基地节点会根据使用者的存取授权来告知目标感测节点,需要向所属区域的哪一些控制节点请求感测读值。控制节点的选择与感测读值的计算方式可采用的范例有多种,例如,从多个同类型的控制节点当中随机或固定选取某一个控制节点来作为某一种类型的读值结果、从多个同类型的控制节点当中随机或固定选取部分或所有的控制节点并计算平均读值(average)或多数读值(majority)来作为某一种类型的读值结果。若是系统具备单一控制节点存在多种类型的传感器,也可以随机或固定选取单一或部分控制节点然后计算平均或多数读值,来作为某一种类型的读值结果。控制节点以随机或固定选取的方式来决定,可降低攻击者破坏部分控制节点所造成的影响,例如,破坏攻击部分控制节点以回报的假的感测消息或是破坏攻击中间路由节点以假造响应消息等。When the base node sends a request message to read the multimedia data of the target sensor node, the base node will inform the target sensor node according to the user's access authorization, which control nodes in the area need to request sensor reading value. There are many examples of the selection of the control node and the calculation of the sensing reading value. For example, a certain control node is randomly or fixedly selected from multiple control nodes of the same type as a certain type of reading result, A part or all of the control nodes are randomly or fixedly selected from a plurality of control nodes of the same type, and the average reading value (average) or the majority reading value (majority) is calculated as a certain type of reading value result. If the system has a single control node and there are multiple types of sensors, it is also possible to randomly or fixedly select a single or part of the control nodes and then calculate the average or majority reading value as a certain type of reading value result. Control nodes are determined by random or fixed selection, which can reduce the impact caused by attackers destroying some control nodes, for example, destroying some control nodes to report false sensing messages or destroying attack intermediate routing nodes to fake responses news etc.

本发明的实施范例中,采用一种节点移动检测协议(Node-Movement Detection Protocol),来防止节点如目标感测节点或控制节点,被移动位置。此协议可利用一节点的邻居节点来监控此节点的相对距离是否有变化,可作为防范节点被移动或攻击的对策。此协议的初始化的过程可在网络布建完成后,且没有攻击者介入的情况下来执行完成。例如,每一个节点广播n个信标(beacon)封包给邻居节点,然后每一个节点根据每一个邻居所发出的信标封包,来计算与每一个邻居节点之间的距离,再将计算结果记录下来并标示为参考集合{d1,d2,...,dn}。此协议初始化后,一个节点就可以执行此协议来检查自己本身是否被移动。In the implementation example of the present invention, a node-movement detection protocol (Node-Movement Detection Protocol) is adopted to prevent nodes such as target sensing nodes or control nodes from being moved. This protocol can use the neighbor nodes of a node to monitor whether the relative distance of the node changes, and it can be used as a countermeasure to prevent the node from being moved or attacked. The initialization process of this protocol can be executed after the network deployment is completed without the intervention of an attacker. For example, each node broadcasts n beacon packets to neighbor nodes, and then each node calculates the distance to each neighbor node according to the beacon packets sent by each neighbor, and then records the calculation results down and labeled as the reference set {d1,d2,...,dn}. Once this protocol is initialized, a node can execute this protocol to check whether itself has been moved.

执行此协议的操作说明如下。每一个节点广播n个信标封包给邻居节点,然后每一个邻居节点根据所收到的信标封包来计算与发出信标封包节点之间的距离,将计算结果记录下来并标示为测试集合{d1’,d2’,...,dn’},每一个邻居节点再比较两集合之间的差异。比较差异的方式有多种,例如,差异小于一个可容忍误差的门坎值时,则回报的值表示节点未被移动,反之,差异大于此可容忍误差的门坎值时,则回报的值表示节点已被移动。Instructions for performing this protocol follow. Each node broadcasts n beacon packets to neighbor nodes, and then each neighbor node calculates the distance from the node that sent the beacon packet according to the received beacon packets, records the calculation results and marks them as a test set{ d1', d2', ..., dn'}, each neighbor node compares the difference between the two sets. There are many ways to compare the difference. For example, when the difference is less than a threshold value of a tolerable error, the returned value indicates that the node has not been moved. Conversely, when the difference is greater than the threshold value of the tolerable error, the returned value indicates that the node has been moved.

如图15的范例所示,当一个节点1510被移动后(如箭头1520所指),此节点与每一个邻居节点,例如邻居节点1531-1534,的相对距离也会跟着改变,其中虚线标示为节点1510原本与邻居节点的距离,实线标示为移动位置后的节点1540与邻居节点的距离。因此,一节点若收到一个超过门坎值的回报距离时,表示本身已被移动,此节点即可判定本身已遭到攻击者1550移动。换句话说,利用邻居节点来计算与本身节点之间的距离并且与先前记录的距离做比较,每一个节点可由多数邻居节点来告知其位置是否已经遭攻击者移动。若要降低因环境所造成的误差,其方式例如可提高n的数量、或是增加邻居的节点数量、或是适当地调整门坎值等。As shown in the example of Figure 15, when a node 1510 is moved (as indicated by arrow 1520), the relative distance between this node and each neighbor node, such as neighbor nodes 1531-1534, will also change accordingly, where the dotted line is marked as The original distance between the node 1510 and the neighbor nodes, the solid line indicates the distance between the node 1540 and the neighbor nodes after the position is moved. Therefore, if a node receives a reported distance exceeding the threshold value, it indicates that it has been moved, and the node can determine that it has been moved by the attacker 1550 . In other words, by using the neighbor nodes to calculate the distance to its own node and comparing with the previously recorded distance, each node can be notified by the majority of neighbor nodes whether its location has been moved by the attacker. To reduce the error caused by the environment, for example, the number of n can be increased, or the number of neighbor nodes can be increased, or the threshold value can be adjusted appropriately.

以下定义一些符号及其意义,并以一工作范例来详细说明本发明的内容。Some symbols and their meanings are defined below, and a working example is used to describe the content of the present invention in detail.

A→B:M表示A传送消息M给B,A→B: M means that A sends a message M to B,

{M}k表示消息M加密,{M} k indicates that message M is encrypted,

MAC(M,K)表示用金钥K计算消息M的消息验证码,MAC(M, K) means to use the key K to calculate the message authentication code of the message M,

H(·)表示单向杂凑函式,H( ) represents a one-way hash function,

M//N表示消息M连接消息N,M//N indicates that message M is connected to message N,

表示异或XOR运算, Indicates exclusive or XOR operation,

IDi表示i的身份,ID i represents the identity of i,

Ri表示i的感测读值,R i represents the sensing reading value of i,

Ki表示i与基地节点共享的点对点金钥,以及K i represents the peer-to-peer key shared by i with the base node, and

Kij表示i与j共享的点对点金钥。K ij represents the point-to-point key shared by i and j.

以图4的无线感测网络端的使用情境为例,假设有一个使用者的存取授权的条件为:读取图像数据,其物理环境为温度高于30度、光度大于200流明、以及湿度低于30%。当基地节点402取得此使用者存取授权时,例如收到来自一服务器的命令时,假设基地节点402随机或固定选取的结果为参考区域408的某一光度传感器(标示为SC1)读值、参考区域408的某三个温度传感器(标示为SC2、SC3、SC4)的平均读值、以及参考区域408的某四个湿度传感器(标示为SC5、SC6、SC7、SC8)的多数读值,则由基地节点402发出传送到目标感测节点404的请求消息的通用格式的一个范例如图13所示,与所揭露的某些实施范例一致。Taking the usage scenario of the wireless sensor network terminal in Figure 4 as an example, assume that there is a user whose access authorization conditions are: to read image data, and its physical environment is that the temperature is higher than 30 degrees, the luminosity is higher than 200 lumens, and the humidity is low at 30%. When the base node 402 obtains the user access authorization, for example, when receiving a command from a server, it is assumed that the result selected by the base node 402 randomly or fixedly is the reading value of a photometric sensor (marked as SC1) in the reference area 408, The average reading values of three temperature sensors (marked as SC2, SC3, SC4) in the reference area 408 and the majority reading values of some four humidity sensors (marked as SC5, SC6, SC7, SC8) in the reference area 408, then An example of the general format of the request message sent by the base node 402 to the target sensor node 404 is shown in FIG. 13 , which is consistent with certain disclosed embodiments.

图16的范例中,通用格式的字段内容可包括此请求消息的身份QID、一验证参数C’、加密的使用者的存取授权{acc_auth}k、一随机随机数N、以及被选取到控制节点的感测数据型态与其计算方式、被选取到控制节点的身份、以及其感测数据的有效范围。以上述的基地节点402随机选取的结果为例,则由基地节点402传送给目标感测节点404的请求消息可包括QID、C’,{acc_auth}k、N、以及三种类型,即光度传感器(SC1)、三个温度传感器(SC2、SC3、SC4)、四个湿度传感器(SC5、SC6、SC7、SC8),的感测数据型态与其计算方式、此三种类型的传感器的身份与其感测数据的有效范围valid_range,并可表示如下:In the example of FIG. 16, the field content of the general format may include the identity QID of the request message, an authentication parameter C', the encrypted user's access authorization {acc_auth} k , a random random number N, and The sensing data type of the node and its calculation method, the identity of the selected control node, and the valid range of the sensing data. Taking the result of random selection by the base node 402 as an example, the request message sent by the base node 402 to the target sensing node 404 may include QID, C', {acc_auth} k , N, and three types, that is, the photometric sensor (SC1), three temperature sensors (SC2, SC3, SC4), four humidity sensors (SC5, SC6, SC7, SC8), the sensing data type and calculation method, the identity of these three types of sensors and their sensitivity The effective range valid_range of the measured data can be expressed as follows:

QID,C’,{acc_auth}k,N,QID, C', {acc_auth} k , N,

{光度_平均:IDSC1,第一有效范围},{photometric_average: id sc1 , first valid range},

{温度_平均:IDSC2,IDSC3,IDSC4,第二有效范围},{temperature_average: ID SC2 , ID SC3 , ID SC4 , second valid range},

{湿度_多数:IDSC5,IDSC6,IDSC7,IDSC8,第三有效范围),{humidity_majority: ID SC5 , ID SC6 , ID SC7 , ID SC8 , third valid range),

其中,第一有效范围是光度传感器SC1的光度读值的平均值结果,第二有效范围是三个温度传感器(SC2、SC3、SC4)的温度读值的平均值结果,第三有效范围是四个湿度传感器(SC5、SC6、SC7、SC8)的湿度读值的多数值结果。Among them, the first valid range is the average result of the photometric readings of the photometric sensor SC1, the second valid range is the average result of the temperature readings of the three temperature sensors (SC2, SC3, SC4), and the third valid range is four The multi-value result of the humidity readings from each of the humidity sensors (SC5, SC6, SC7, SC8).

验证参数C’是给由基地节点402到目标感测节点404的每一中间路由节点作为日后回传消息的一个参数。以上述的请求消息为例,则计算验证参数C’的一个范例方式如下:The verification parameter C' is given to each intermediate routing node from the base node 402 to the target sensing node 404 as a parameter for a future return message. Taking the above request message as an example, an example method of calculating the verification parameter C' is as follows:

Figure B2009102073519D0000121
i从1至8,make
Figure B2009102073519D0000121
i from 1 to 8,

Figure B2009102073519D0000122
则计算C’=h(CSC1)。and
Figure B2009102073519D0000122
Then calculate C'=h(C SC1 ).

当此请求消息送出后,从基地节点402到目标感测节点404中,中间路由节点411-41m的每一中间路由节点把QID及C’储存起来,并且路由此请求消息至下一个节点,如图17所示,与所揭露的某些实施范例一致。这些储存值可在响应消息回传后或是超过某一时间后由节点自动删除,以节省该节点的储存空间。After the request message is sent, from the base node 402 to the target sensor node 404, each intermediate routing node of the intermediate routing nodes 411-41m stores the QID and C', and routes the request message to the next node, such as As shown in FIG. 17 , it is consistent with some disclosed implementation examples. These stored values can be automatically deleted by the node after the response message is sent back or after a certain period of time, so as to save the storage space of the node.

当目标感测节点404收到此消息后,解密取出使用者的存取授权acc_auth并且可执行节点移动检测协议来判断本身的位置是否遭到移动,如果目标感测节点404发现自己位置已经遭到移动,则回报此事件给基地节点402并且终止后续操作;反之,目标感测节点404根据请求消息,执行下列操作来向控制节点请求感测读值:After the target sensing node 404 receives this message, it decrypts and takes out the user's access authorization acc_auth and can execute the node movement detection protocol to determine whether its position has been moved. If the target sensing node 404 finds that its position has been Move, then report this event to the base node 402 and terminate subsequent operations; otherwise, the target sensing node 404 performs the following operations to request the sensing reading value from the control node according to the request message:

目标感测节点→SC1:N,<光度>,Target Sensing Node → SC1:N, <luminosity>,

目标感测节点→SC2、SC3、SC4:N,<温度>,Target sensing node → SC2, SC3, SC4: N, <temperature>,

目标感测节点→SC5、SC6、SC7、SC8:N,<湿度>。Target sensing node → SC5, SC6, SC7, SC8: N, <humidity>.

控制节点收到来自目标感测节点404的消息后,可执行节点移动检测协议来判断本身的位置是否遭到移动,如果发现自己的位置已经遭到移动,则回报此事件给基地节点402进行后续处理;反之,控制节点执行下列操作来回报目标感测节点404所请求的感测读值:After the control node receives the message from the target sensing node 404, it can execute the node movement detection protocol to determine whether its position has been moved. If it finds that its position has been moved, it will report this event to the base node 402 for follow-up. processing; otherwise, the control node performs the following operations to report the sensing reading value requested by the target sensing node 404:

SCi→目标感测节点:RSCi,i从1至8。SCi→target sensing node: R SCi , i is from 1 to 8.

目标感测节点404收到控制节点回报的感测读值后,进行计算(例如平均值或多数值计算),然后检查计算结果是否符合使用者的存取授权acc_auth及有效范围,,如果有任何一项不符合,则回报次事件给基地节点402并且终止后续操作;反之目标感测节点404多媒体数据(image)并执行下列操作,来将加密的多媒体数据传送至每一控制节点:After the target sensing node 404 receives the sensing reading value reported by the control node, it performs calculation (for example, average value or multi-value calculation), and then checks whether the calculation result is consistent with the user's access authorization acc_auth and valid range, if there is any One does not match, then report the second event to the base node 402 and terminate subsequent operations; otherwise, the target sensing node 404 multimedia data (image) and performs the following operations to transmit the encrypted multimedia data to each control node:

目标感测节点→SCi:h({多媒体数据}k),i从1至8。Target sensing node→SCi: h({multimedia data} k ), i is from 1 to 8.

每一控制节点SCi收到上述消息后,可利用随机随机数N及本身与基地节点402共享的金钥KSCi,来算出CSCj,然后执行下列操作,来加密h(CSCi)并传送加密的h(CSCi)与一消息验证码i_MAC至目标感测节点404:After receiving the above message, each control node SCi can use the random random number N and the key K SCi shared with the base node 402 to calculate C SCj , and then perform the following operations to encrypt h(C SCi ) and transmit the encrypted h(C SCi ) and a message authentication code i_MAC to the target sensing node 404:

SCi→目标感测节点:{h(CSCi)}k,i_MAC,i从1至8,SCi→target sensing node: {h(C SCi )} k , i_MAC, i from 1 to 8,

其中,in,

i_MAC=MAC(RSCi//h({多媒体数据}k),h(CSCi//KSCi))。i_MAC=MAC(R SCi //h({multimedia data} k ), h(C SCi //K SCi )).

目标感测节点404解密取出每一个h(CSCi)以计算出出C值,并且也计算光度消息验证码MACL、温度消息验证码MACT、湿度消息验证码MACH,通过MACL、MACT、MACH,再计算出一多模式消息验证码SMAC值,各值计算如下:The target sensing node 404 decrypts and extracts each h(C SCi ) to calculate the C value, and also calculates the photometric message verification code MAC L , the temperature message verification code MAC T , and the humidity message verification code MAC H , through MAC L , MAC T , MAC H , and then calculate a multi-mode message authentication code SMAC value, each value is calculated as follows:

CC == hh (( CC SCSC 11 )) &CirclePlus;&CirclePlus; .. .. .. &CirclePlus;&CirclePlus; hh (( CC SCSC 88 )) ,,

Figure B2009102073519D0000132
Figure B2009102073519D0000132

Figure B2009102073519D0000134
Figure B2009102073519D0000134

Figure B2009102073519D0000135
Figure B2009102073519D0000135

SMACSMAC == MACMAC LL &CirclePlus;&CirclePlus; MACMAC TT &CirclePlus;&CirclePlus; MACMAC Hh ..

然后,目标感测节点404执行下列操作,来传送给基地节点402的响应消息Repl_message:Then, the target sensing node 404 performs the following operations to transmit the response message Repl_message to the base node 402:

目标感测节点→基地节点:Reply_message,其中,Target sensing node → base node: Reply_message, where,

响应消息Reply_message的内容包括如QID、C、配对{IDSCi:RSCi}、MACL、MACT、MACH、{多媒体数据}k、{SMAC}k,i从1至8;配对{IDSCi:RSCi}表示被基地节点402随机选取到的控制节点SCi的身份及此控制节点SCi所回报的感测读值。The content of the response message Reply_message includes such as QID, C, pairing {ID SCi : R SCi }, MAC L , MAC T , MAC H , {multimedia data} k , {SMAC} k , i from 1 to 8; pairing {ID SCi : R SCi } represents the identity of the control node SCi randomly selected by the base node 402 and the sensing reading value reported by the control node SCi.

当响应消息在回传的过程中,每一个中间路由节点根据QID验证h(C)使否等于C’,如果不是则舍弃该响应消息;反之则路由响应消息至下一个节点,如图18所示,与所揭露的某些实施范例一致。When the response message is in the process of returning, each intermediate routing node verifies whether h(C) is equal to C' according to the QID, and if not, discards the response message; otherwise, routes the response message to the next node, as shown in Figure 18 It is consistent with some disclosed implementation examples.

当响应消息传回到基地节点402后,基地节点402验证h(C)使否等于C’、所有的读值是否符合使用者的存取授权acc_auth及有效范围、以及SMAC值是否正确,如果都没问题,则将图像,即{多媒体数据}k,解密后回传到服务器,以提供给该使用者,反之则丢弃响应消息。After the response message is sent back to the base node 402, the base node 402 verifies whether h(C) is equal to C', whether all the read values conform to the user's access authorization acc_auth and the valid range, and whether the SMAC value is correct. If there is no problem, the image, namely {multimedia data} k , will be decrypted and sent back to the server to provide to the user, otherwise, the response message will be discarded.

接下来说明可增加中间路由节点的验证功能的MACL、MACT、MACH。当基地节点402一开始传送请求消息到目标感测节点404时,基地节点402可以随机选取部分中间路由节点并且随着请求消息传送不同的验证金钥给这些随机选取的中间路由节点,这些拥有部分验证金钥的中间路由节点便有能力可以验证MACL、MACT、MACHNext, MAC L , MAC T , and MAC H , which can increase the authentication function of the intermediate routing node, will be described. When the base node 402 initially transmits the request message to the target sensor node 404, the base node 402 can randomly select some intermediate routing nodes and send different verification keys to these randomly selected intermediate routing nodes along with the request message, and these owning part The intermediate routing node that verifies the key has the ability to verify MAC L , MAC T , MAC H .

举例来说,假设基地节点402分别传送验证金钥h(CSC2//KSC2)//h(CSC3//KSC3)//h(CSC4//KSC4)给一第一中间路由节点,以及验证金钥h(CSC1//KSC1)给一第二中间路由节点,则当目标感测节点404回传图像消息给基地节点402时,第一中间路由节点便可以验证MACT,而第二中间路由节点便可以验证MACL。如此,让不合法的响应消息可以在中间的传送过程中就被中间路由节点提早过滤掉,而不用等到传回到基地节点才发现,以节省传送不合法消息的资源。For example, assume that the base node 402 transmits the authentication key h(C SC2 //K SC2 )//h(C SC3 //K SC3 )//h(C SC4 //K SC4 ) to a first intermediate router respectively node, and the verification key h(C SC1 //K SC1 ) to a second intermediate routing node, then when the target sensing node 404 returns an image message to the base node 402, the first intermediate routing node can verify the MAC T , and the second intermediate routing node can verify MAC L . In this way, the illegal response message can be filtered out by the intermediate routing node in advance during the intermediate transmission process, instead of being found when it is transmitted back to the base node, so as to save resources for transmitting illegal messages.

本发明的无线感测网络的存取授权技术也可以抵抗如图5至图9的攻击模型,使得攻击者没有办法通过这些攻击来逃避存取授权的控管或是得到不应该有的存取权限。以下一一分析本发明的安全性。The access authorization technology of the wireless sensor network of the present invention can also resist the attack models shown in Figures 5 to 9, so that the attacker has no way to evade the control of access authorization or obtain undue access through these attacks authority. The security of the present invention is analyzed one by one below.

由于目标感测节点响应给基地节点的消息包含了参数C,而参数C是必须由所有被随机或固定选取到的控制节点来算出的信息,因此即使目标感测节点被攻击破坏了,也无法在未请求所有控制节点的感测读值前,响应消息给基地节点。攻击者也无法假造任何消息回传给基地节点;此外,每一中间路由节点也会验证参数C的正确性,未包含正确C的响应消息马上会被舍弃掉。Since the target sensing node responds to the base node with a parameter C, and the parameter C is information that must be calculated by all randomly or fixedly selected control nodes, even if the target sensing node is destroyed by an attack, it cannot Before requesting the sensing readings of all control nodes, a response message is sent to the base node. The attacker cannot forge any message and send it back to the base node; in addition, each intermediate routing node will also verify the correctness of the parameter C, and the response message that does not contain the correct C will be discarded immediately.

因为每一个由被随机或固定选取到的控制节点SCi所回传的感测读值RSCi都用其与基地节点共享的金钥组成的参数来计算消息验证码MAC,例如MACL、MACT、或MACH,并且随机选取到的中间节点以及基地节点都会验证MAC的正确性,任何未包含正确MAC的响应消息马上就会被舍弃掉。所以,被破坏攻击的目标感测节点无法假造符合存取授权的感测读值,攻击者也无法修改感测读值。Because each sensing reading value R SCi sent back by the randomly or fixedly selected control node SCi uses the parameters composed of the key shared with the base node to calculate the message authentication code MAC, such as MAC L , MAC T , or MAC H , and the randomly selected intermediate nodes and base nodes will verify the correctness of the MAC, and any response message that does not contain the correct MAC will be discarded immediately. Therefore, the target sensing node attacked by sabotage cannot forge the sensing read value conforming to the access authorization, and the attacker cannot modify the sensing read value.

因为计算MAC的金钥时,需包含参数CSCi,而参数CSCi是由基地节点每次产生的随机随机数N计算而来的,因此,攻击者无法重送感测读值及消息验证码MAC。Because when calculating the MAC key, the parameter C SCi needs to be included, and the parameter C SCi is calculated from the random number N generated by the base node every time, so the attacker cannot resend the sensing reading value and message verification code MAC.

因为任何被随机选取到的中间路由节点会验证部分的消息验证码MAC,例如MACL、MACT、或MACH,被窜改的多媒体数据在未回传到基地节点时就会被中间路由节点验证到而舍弃掉。因此,攻击者无法窜改目标感测节点回传的多媒体数据。Because any randomly selected intermediate routing node will verify part of the message authentication code MAC, such as MAC L , MAC T , or MAC H , the tampered multimedia data will be verified by the intermediate routing node before it is returned to the base node To give up. Therefore, an attacker cannot tamper with the multimedia data returned by the target sensing node.

虽然本发明的实施范例利用随机选取到的中间路由节点来提早验证消息验证码MAC的正确性,然而攻击者还是有部分机率可以攻击破坏被随机选取到的中间路由节点,然后假造感测读值及其MAC。因为被随机选取到的中间路由节点有验证MAC的金钥,便能计算出合法的MAC。然而,当基地节点收到响应的消息后,会解密及验证SMAC,因此任何被窜改的MAC,例如MACL、MACT、或MACH,最后在基地节点都会因为验证SMAC而被发现。Although the implementation example of the present invention uses randomly selected intermediate routing nodes to verify the correctness of the message authentication code MAC in advance, an attacker still has some chances to attack and destroy the randomly selected intermediate routing nodes, and then forge the sensing reading value and its MAC. Because the randomly selected intermediate routing nodes have the key for verifying the MAC, the legal MAC can be calculated. However, when the base node receives the response message, it will decrypt and verify the SMAC, so any tampered MAC, such as MAC L , MAC T , or MAC H , will be discovered at the base node by verifying the SMAC.

移动目标感测节点或是任何的控制节点将会被节点移动检测协议检测出来。因此,可以确保节点位置不会被移动到不该存在的位置或环境当中,而检测的精确度可视周围环境及硬件灵敏度等因素来决定。The moving target sensing node or any control node will be detected by the node movement detection protocol. Therefore, it can be ensured that the node position will not be moved to a location or environment that should not exist, and the detection accuracy can be determined by factors such as the surrounding environment and hardware sensitivity.

综上所述,本发明的实施范例可提供一种无线感测网络的存取授权装置与方法。其响应消息包含一个证明参数C,代表了响应消息的认证性及有效性。而随机或固定式的节点选择,包括控制节点的选择与验证请求或响应消息的中间路由节点的选择,加上参考多数感测节点回报的感测数据,可降低被攻击者破坏攻击的影响。错误的数据也会被中间路由节点发现并提早滤除,可节省无线感测网络的资源。本发明的实施范例只使用轻量化的计算方式,如异或、单向杂凑函式、对称式金钥加密等计算方法来实现安全性功能,因此也很适合于无线感测网络环境。To sum up, the exemplary embodiments of the present invention can provide an access authorization device and method for a wireless sensor network. The response message contains a certification parameter C, representing the authenticity and validity of the response message. Random or fixed node selection, including the selection of control nodes and the selection of intermediate routing nodes for verifying requests or responding messages, plus referring to the sensing data reported by most sensing nodes, can reduce the impact of sabotage attacks by attackers. Wrong data will also be found by the intermediate routing nodes and filtered out early, which can save the resources of the wireless sensor network. The implementation examples of the present invention only use lightweight calculation methods, such as XOR, one-way hash function, symmetric key encryption and other calculation methods to implement security functions, so they are also very suitable for wireless sensor network environments.

此外,每一中间路由节点只需要储存QID及C’(小于10字节),部分被随机选取到的中间路由节点也只需多存少许的验证金钥,例如若用AES-128,则储存一把金钥只需16字节的储存空间,这些储存值也可以在响应消息回传后或超过一时间后由节点自动删除。本发明的安全存取控制结构可防止节点遭受多种攻击模型的破坏或移动,也可用于多模式无线感测网络的存取授权,此多模式无线感测网络中的传感器例如用来感测温度、湿度、光度、压力、气体、浓度等各类型的环境数值。In addition, each intermediate routing node only needs to store QID and C' (less than 10 bytes), and some randomly selected intermediate routing nodes only need to store a little more verification keys. For example, if AES-128 is used, store A key only needs 16 bytes of storage space, and these storage values can also be automatically deleted by the node after the response message is returned or after a period of time. The secure access control structure of the present invention can prevent nodes from being damaged or moved by various attack models, and can also be used for access authorization of multi-mode wireless sensor networks. Sensors in this multi-mode wireless sensor network are used for sensing Various types of environmental values such as temperature, humidity, luminosity, pressure, gas, concentration, etc.

惟,以上所述者仅为本发明的实施范例,当不能依此限定本发明实施的范围。即大凡本发明权利要求范围所作的均等变化与修饰,皆应仍属本发明权利要求涵盖的范围。However, what is described above is only an implementation example of the present invention, and should not limit the implementation scope of the present invention accordingly. That is, all equivalent changes and modifications made within the scope of the claims of the present invention should still fall within the scope covered by the claims of the present invention.

Claims (25)

1.一种无线感测网络的存取授权装置,该装置包含:1. An access authorization device for a wireless sensor network, the device comprising: 至少一基地节点;以及at least one base node; and 由数个感测节点形成的一无线感测网络;a wireless sensor network formed by several sensor nodes; 其中,该至少一基地节点取得一使用者的一存取授权后,发送一请求消息到该无线感测网络中的一目标感测节点,该目标感测节点根据该请求消息向该无线感测网络中的至少一控制节点,请求回传其感测数据,并参考该至少一控制节点响应的感测数据,来判断是否符合该存取授权,以作为是否回传符合该存取授权的多媒体数据的依据。Wherein, after obtaining an access authorization of a user, the at least one base node sends a request message to a target sensing node in the wireless sensing network, and the target sensing node sends a request message to the wireless sensing node according to the request message. At least one control node in the network requests to send back its sensing data, and refers to the sensing data responded by the at least one control node to determine whether the access authorization is met, so as to return the multimedia in compliance with the access authorization Basis for data. 2.根据权利要求1所述的存取授权装置,其中该至少一控制节点皆为该无线感测网络中的无线感测节点,并提供至少一类型的物理环境信息的感测数据来回传给该目标感测节点。2. The access authorization device according to claim 1, wherein the at least one control node is a wireless sensor node in the wireless sensor network, and provides sensing data of at least one type of physical environment information to transmit back and forth to the target sensing node. 3.根据权利要求1所述的存取授权装置,其中该请求消息还包括一验证信息,该验证信息是提供给由该至少一基地节点到该目标感测节点的中间的一或多个路由节点的每一路由节点,并作为日后验证响应消息的一个参数。3. The access authorization device according to claim 1, wherein the request message further includes authentication information provided to one or more intermediate routes from the at least one base node to the target sensor node Each routing node of the node, and as a parameter of the future verification response message. 4.根据权利要求1所述的存取授权装置,其中该基地节点还包括:4. The access authorization device according to claim 1, wherein the base node further comprises: 一第一通讯接口与一第二通讯接口;a first communication interface and a second communication interface; 一储存单元,进行数据的储存;以及a storage unit for storing data; and 一中央处理单元,通过该第二通讯接口下达传送该存取授权到该目标感测节点,并且通过该第一通讯接口,将该目标感测节点回传的多媒体数据传送给一服务器。A central processing unit sends the access authorization to the target sensing node through the second communication interface, and transmits the multimedia data returned by the target sensing node to a server through the first communication interface. 5.根据权利要求1所述的存取授权装置,其中该至少一控制节点的每一控制节点还包括:5. The access authorization device according to claim 1, wherein each control node of the at least one control node further comprises: 至少一传感器,感测至少一类型的物理环境信息;at least one sensor for sensing at least one type of physical environment information; 一第三通讯接口,与该基地节点及该目标感测节点进行沟通;以及a third communication interface for communicating with the base node and the target sensing node; and 一第二中央处理单元,指挥该至少一传感器进行感测,并通过该第三通讯接口传回该至少一传感器的感测数据。A second central processing unit directs the at least one sensor to perform sensing, and returns the sensing data of the at least one sensor through the third communication interface. 6.根据权利要求1所述的存取授权装置,其中该目标感测节点还包括:6. The access authorization device according to claim 1, wherein the target sensing node further comprises: 至少一传感器,撷取出该多媒体数据;at least one sensor for capturing the multimedia data; 一第四通讯接口,与该基地节点及该少一控制节点进行沟通;以及a fourth communication interface for communicating with the base node and the at least one control node; and 一第三中央处理单元,根据该请求消息,通过该第四通讯接口,向该少一控制节点请求感测数据,并根据该感测数据判断是否回传该多媒体数据。A third central processing unit requests sensing data from the one less control node through the fourth communication interface according to the request message, and judges whether to return the multimedia data according to the sensing data. 7.根据权利要求1所述的存取授权装置,其中该请求消息中包含一验证信息,给由该至少一基地节点到该目标感测节点的中间至少一路由节点,来验证日后由该目标感测节点响应的消息。7. The access authorization device according to claim 1, wherein the request message includes verification information for at least one intermediate routing node from the at least one base node to the target sensing node to verify that the target The message that the sensor node responds to. 8.根据权利要求1所述的存取授权装置,其中该至少一控制节点执行一种节点移动检测协议,来判断其本身位置是否已被改变,并作为是否回传其感测数据的根据。8. The access authorization device according to claim 1, wherein the at least one control node executes a node movement detection protocol to determine whether its own location has been changed, and use it as a basis for whether to return its sensing data. 9.根据权利要求1所述的存取授权装置,其中该目标感测节点执行一种节点移动检测协议,来判断其本身位置是否已被改变,并作为是否回传其响应消息的根据。9. The access authorization device according to claim 1, wherein the target sensing node executes a node movement detection protocol to judge whether its own location has been changed, and use it as a basis for whether to send back its response message. 10.根据权利要求1所述的存取授权装置,其中该无线感测网络是一种多模式无线感测网络。10. The access authorization device of claim 1, wherein the wireless sensor network is a multi-mode wireless sensor network. 11.根据权利要求1所述的存取授权装置,其中该无目标感测节点的同一区域内有数个控制节点提供该区域的感测数据给该无目标感测节点,来进行该使用者的该存取授权的判断,该无目标感测节点的同一区域代表该目标感测节点与其它感测节点可以互相通讯的范围。11. The access authorization device according to claim 1, wherein several control nodes in the same area of the non-target sensing node provide the sensing data of the area to the non-target sensing node to perform the user's authentication. For the determination of the access authorization, the same area without the target sensor node represents the range where the target sensor node and other sensor nodes can communicate with each other. 12.一种无线感测网络的存取授权方法,该方法包括:12. An access authorization method for a wireless sensor network, the method comprising: 通过至少一基地节点,取得一使用者的存取授权;Obtaining a user's access authorization through at least one base node; 从一无线感测网络的数个感测节点中选取至少一控制节点,以及选取由该基地节点到一目标感测节点的至少一中间路由节点;selecting at least one control node from a plurality of sensing nodes in a wireless sensing network, and selecting at least one intermediate routing node from the base node to a target sensing node; 通过该基地节点,发送一请求消息到该目标感测节点,该请求消息至少备有验证信息;sending a request message to the target sensor node via the base node, the request message having at least verification information; 该目标感测节点根据该请求消息,向被选取的该至少一控制节点请求回传其感测数据,并参考该回传的感测数据,来判断是否符合该使用者的存取授权,再发出一相对应的响应消息;The target sensing node requests the selected at least one control node to send back its sensing data according to the request message, and refers to the returned sensing data to determine whether the access authorization of the user is met, and then Send a corresponding response message; 该至少一中间路由节点根据该验证信息,检查该响应消息,以决定丢弃或是转送该响应消息;以及The at least one intermediate routing node checks the response message according to the verification information to decide to discard or forward the response message; and 通过该基地节点,验证该被转送的响应消息。The forwarded response message is verified by the base node. 13.根据权利要求12所述的存取授权方法,其中该至少一控制节点是以随机选取或固定选取两者的其中一种方式被选出的节点。13. The access authorization method according to claim 12, wherein the at least one control node is a node selected in one of random selection and fixed selection. 14.根据权利要求12所述的存取授权方法,其中该至少一基地节点到该目标感测节点有数个中间路由节点,该至少一中间路由节点是以随机选取或固定选取两者的其中一种方式,从该数个中间路由节点当中被选出的部分节点。14. The access authorization method according to claim 12, wherein there are several intermediate routing nodes from the at least one base node to the target sensing node, and the at least one intermediate routing node is selected randomly or fixedly. In this way, some nodes are selected from the several intermediate routing nodes. 15.根据权利要求12所述的存取授权装置,该方法利用一节点的多数邻居节点来告知该节点的位置是否已经被移动,其中该节点是一控制节点或该目标感测节点两者的其中一种节点。15. The access authorization device according to claim 12, the method utilizes a majority of neighbor nodes of a node, wherein the node is a control node or both of the target sensing node, whether the node's location has been moved One of the nodes. 16.根据权利要求12所述的存取授权方法,该方法是针对一种型态的感测数据来参考该至少一个控制节点回传的感测数据,然后计算该回传的感测数据的统计量以判断是否符合该使用者的存取授权。16. The access authorization method according to claim 12, the method is to refer to the sensing data returned by the at least one control node for a type of sensing data, and then calculate the value of the returned sensing data Statistics to determine whether the user's access authorization is met. 17.根据权利要求12所述的存取授权方法,其中该请求消息中至少包括该请求消息的身份、一验证参数、加密的该使用者的存取授权、一随机随机数、该被选取到的该至少一控制节点的感测数据型态与其计算方式、以及该被选取到的该至少一控制节点的身份与其感测数据的有效范围。17. The access authorization method according to claim 12, wherein the request message at least includes the identity of the request message, an authentication parameter, encrypted access authorization of the user, a random random number, the selected The sensing data type and calculation method of the at least one control node, the identity of the selected at least one control node and the valid range of the sensing data. 18.根据权利要求17所述的存取授权方法,其中该验证参数是提供给该至少一中间路由节点,作为日后回传消息的一个参数。18. The access authorization method according to claim 17, wherein the verification parameter is provided to the at least one intermediate routing node as a parameter of a message sent back in the future. 19.根据权利要求17所述的存取授权方法,其中当该请求消息送出后,该至少一中间路由节点的每一中间路由节点把该请求消息的身份与该验证参数储存起来,并且路由该请求消息至下一个节点。19. The access authorization method according to claim 17, wherein after the request message is sent, each intermediate routing node of the at least one intermediate routing node stores the identity of the request message and the verification parameter, and routes the request message Request message to next node. 20.根据权利要求17所述的存取授权方法,其中当该目标感测节点收到该请求消息后,解密取出该使用者的存取授权,并且判断本身的位置是否遭到移动。20. The access authorization method according to claim 17, wherein after the target sensing node receives the request message, it decrypts and retrieves the user's access authorization, and judges whether its location has been moved. 21.根据权利要求12所述的存取授权方法,其中当该至少一控制节点收到来自该目标感测节点的该请求后,判断本身的位置是否遭到移动,如果发现该位置已经遭到移动,则回报该基地节点该位置已经遭到移动,反之,则回报其感测数据。21. The access authorization method according to claim 12, wherein when the at least one control node receives the request from the target sensing node, it judges whether its location has been moved, and if it is found that the location has been moved If it moves, it will report that the position of the base node has been moved; otherwise, it will report its sensing data. 22.根据权利要求19所述的存取授权方法,其中该目标感测节点收到该至少一控制节点回传的感测数据后,该目标感测节点与该至少一控制节点执行下列操作:22. The access authorization method according to claim 19, wherein after the target sensing node receives the sensing data returned by the at least one control node, the target sensing node and the at least one control node perform the following operations: 该目标感测节点计算该回传的感测数据的统计量来判断是否符合该使用者的存取授权;以及The target sensing node calculates statistics of the returned sensing data to determine whether the access authorization of the user is met; and 若符合,则该目标感测节点回传加密的多媒体数据给该至少一控制节点的每一控制节点;If so, the target sensor node returns encrypted multimedia data to each control node of the at least one control node; 每一控制节点收到该加密的多媒体数据后,以一相对应的加密参数与一相对应的消息验证码来响应该目标感测节点;以及After receiving the encrypted multimedia data, each control node responds to the target sensor node with a corresponding encryption parameter and a corresponding message authentication code; and 该目标感测节点将加密参数解密后,计算出该请求消息中的该验证信息与一多模式消息验证码。After the target sensing node decrypts the encrypted parameters, it calculates the verification information and a multi-mode message verification code in the request message. 23.根据权利要求22所述的存取授权方法,其中该目标感测节点回传该至少一基地节点一响应消息,该响应消息的内容至少包括该请求消息的身份、该验证信息、该加密的多媒体数据、该多模式消息验证码、以及每一控制节点的身份与该控制节点回传的感测数据。23. The access authorization method according to claim 22, wherein the target sensing node sends back a response message to the at least one base node, the content of the response message at least includes the identity of the request message, the authentication information, the encrypted multimedia data, the multi-mode message verification code, and the identity of each control node and the sensing data returned by the control node. 24.根据权利要求19所述的存取授权方法,其中当该响应消息在回传的过程中,每一个中间路由节点根据该请求消息的身份,验证一加密的该验证信息是否等于该验证参数,如果不是则舍弃该响应消息,反之则路由响应消息至下一个节点。24. The access authorization method according to claim 19, wherein when the response message is in the process of returning, each intermediate routing node verifies whether the encrypted verification information is equal to the verification parameter according to the identity of the request message , if not, the response message is discarded, otherwise, the response message is routed to the next node. 25.根据权利要求22所述的存取授权方法,其中该至少一基地节点验证一加密的该验证信息是否等于该验证参数,验证该至少一控制节点回传的感测数据是否符合该使用者的存取授权与该感测数据的有效范围,验证该多模式消息验证码是否正确,皆是的话,则回传该解密后的多媒体数据,以提供给该使用者。25. The access authorization method according to claim 22, wherein the at least one base node verifies whether the encrypted verification information is equal to the verification parameter, verifies whether the sensing data returned by the at least one control node conforms to the user The access authorization and the effective range of the sensing data are used to verify whether the multi-mode message verification code is correct, and if both are correct, the decrypted multimedia data is returned to provide to the user.
CN2009102073519A 2009-10-26 2009-10-26 Access authorization device and method for wireless sensing network Pending CN102045887A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102073519A CN102045887A (en) 2009-10-26 2009-10-26 Access authorization device and method for wireless sensing network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102073519A CN102045887A (en) 2009-10-26 2009-10-26 Access authorization device and method for wireless sensing network

Publications (1)

Publication Number Publication Date
CN102045887A true CN102045887A (en) 2011-05-04

Family

ID=43911499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102073519A Pending CN102045887A (en) 2009-10-26 2009-10-26 Access authorization device and method for wireless sensing network

Country Status (1)

Country Link
CN (1) CN102045887A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024060077A1 (en) * 2022-09-21 2024-03-28 Lenovo (Beijing) Limited Method and apparatus for integrated sensing and communication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020197979A1 (en) * 2001-05-22 2002-12-26 Vanderveen Michaela Catalina Authentication system for mobile entities
US6567121B1 (en) * 1996-10-25 2003-05-20 Canon Kabushiki Kaisha Camera control system, camera server, camera client, control method, and storage medium
CN1739039A (en) * 2003-01-15 2006-02-22 皇家飞利浦电子股份有限公司 System and method for providing subject location information
US20060126501A1 (en) * 2004-12-09 2006-06-15 Honeywell International Inc. Fault tolerance in a wireless network
CN1838600A (en) * 2005-03-24 2006-09-27 株式会社日立制作所 Sensor network system, data transmission method
US20080084294A1 (en) * 2006-10-05 2008-04-10 Electronics And Telecommunications Research Institute Wireless sensor network and adaptive method for monitoring the security thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6567121B1 (en) * 1996-10-25 2003-05-20 Canon Kabushiki Kaisha Camera control system, camera server, camera client, control method, and storage medium
US20030189649A1 (en) * 1996-10-25 2003-10-09 Canon Kabushiki Kaisha Camera control system, camera server, camera client, control method, and storage medium
US20020197979A1 (en) * 2001-05-22 2002-12-26 Vanderveen Michaela Catalina Authentication system for mobile entities
CN1739039A (en) * 2003-01-15 2006-02-22 皇家飞利浦电子股份有限公司 System and method for providing subject location information
US20060126501A1 (en) * 2004-12-09 2006-06-15 Honeywell International Inc. Fault tolerance in a wireless network
CN1838600A (en) * 2005-03-24 2006-09-27 株式会社日立制作所 Sensor network system, data transmission method
US20060242285A1 (en) * 2005-03-24 2006-10-26 Norihiko Moriwaki Sensor network system and data transfer method for sensing data
US20080084294A1 (en) * 2006-10-05 2008-04-10 Electronics And Telecommunications Research Institute Wireless sensor network and adaptive method for monitoring the security thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024060077A1 (en) * 2022-09-21 2024-03-28 Lenovo (Beijing) Limited Method and apparatus for integrated sensing and communication

Similar Documents

Publication Publication Date Title
TWI401979B (en) Access authorization method and apparatus for a wireless sensor network
Al‐Turjman et al. An overview of security and privacy in smart cities' IoT communications
Al-Hadhrami et al. DDoS attacks in IoT networks: a comprehensive systematic literature review
Hou et al. A survey on internet of things security from data perspectives
Miranda et al. A collaborative security framework for software-defined wireless sensor networks
Ashibani et al. Cyber physical systems security: Analysis, challenges and solutions
Karthiga et al. Intelligent intrusion detection system for VANET using machine learning and deep learning approaches
Rowan et al. Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels
Ssu et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Ghahramani et al. RSS: An energy-efficient approach for securing IoT service protocols against the DoS attack
Singh et al. Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks
Mahapatra et al. A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges
Qaddoori et al. An efficient security model for industrial internet of things (IIoT) system based on machine learning principles
KR101048509B1 (en) Method and apparatus for detecting civil attack node using location information and hash chain in ubiquitous sensor network
Ahamed Ahanger et al. Distributed blockchain‐based platform for unmanned aerial vehicles
Rudra Impact of Blockchain for internet of Things Security
Li et al. ZPA: A smart home privacy analysis system based on ZigBee encrypted traffic
Feraudo et al. DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA
Alrubaiei et al. Internet of Things in Cyber Security Scope
Thamilarasu et al. Intrusion detection in RFID systems
Acharjya et al. Recognizing attacks in wireless sensor network in view of internet of things
Parvathy et al. Certain Investigation of Attacks in the Field of Internet of Things and Blockchain Technology
Patel et al. Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities
Navinkumar et al. Developing an optimized routing protocol with rumor riding technique for detection of Sybil attack in VANET environment
CN102045887A (en) Access authorization device and method for wireless sensing network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110504