Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for internet of things information transmission

A technology for information transmission and the Internet of Things, which is applied in transmission systems, electrical components, user identity/authority verification, etc., and can solve problems such as preventing attack events, limited computing power bandwidth, and not supporting identity authentication of neighbor nodes

Active Publication Date: 2013-06-19
CHINA MOBILE GRP HEILONGJIANG CO LTD
View PDF4 Cites 82 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The implementation of the existing PKI / CA or Key Distribution center (KDC) is quite complex, and the implementation of PKI faces many complex issues such as certificate management, verification, revocation, and inter-domain cross-certification.
Especially in mobile networks, wireless sensor networks, RFID and other networks at the edge of the Internet of Things, due to the limited energy, computing power, memory, and bandwidth of the edge network nodes of the Internet of Things, complex asymmetric key encryption algorithms cannot be used to achieve security. Authentication, and these networks are characterized by mobility and cannot be simply set based on PKI / CA authentication methods, so traditional public key authentication methods such as PKI / CA, KDC, etc. cannot be directly used in IoT edge networks
[0010] In the RFID system of the Internet of Things, the existing security schemes require tags and readers to have strong computing power, and the protocol has obvious security weaknesses. Moreover, these authentication protocols ignore the communication between the legal reader and the legal tag from inside the system. Forgery and tampering problems, cannot comprehensively prevent attacks and other issues
[0011] The disadvantage of using the symmetric key system in the WSN of the Internet of Things is that the node's anti-capture ability is very poor, it does not support the identity authentication of neighbor nodes, and it cannot resist impersonation attacks. With the increase of captured nodes, more key information will be lost. exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for internet of things information transmission
  • Method and system for internet of things information transmission
  • Method and system for internet of things information transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0137] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0138] With the overall development of the Internet of Things, the basic network security issues that carry various services will be more complex and difficult to solve than the existing network systems. Authentication in IoT mainly includes identity authentication and message authentication. Identity authentication enables communicating parties to be sure of each other's identity and exchange session keys. Confidentiality and timeliness are two important issues in authenticated key exchange. In a heterogeneous network, different access authentication servers may not belong to the same network operator. If each pair of access authentication servers shares a key, it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for internet of things information transmission. Firstly, a public key infrastructure / certificate authority (PKI / CA) mechanism is established in the internet of things and an authentication key and an encryption key are distributed to an aggregation node of the internet of things; transmitted information is encrypted and authorized in an edge network of the internet of things; and key conversion is conducted after the encrypted and authorized information reaches the aggregation node of the internet of things and the information encrypted again is sent to an application management server of the internet of things. According to the method and the system for the internet of things information transmission, the internet of things can effectively resist interior attack, information safety transmission level is improved and complexity of encryption and safety authentication calculation in the edge network of the internet of things is reduced.

Description

technical field [0001] The invention relates to the technical fields of network security and cryptography of the Internet of Things, in particular to a method and system for information transmission of the Internet of Things. Background technique [0002] At present, the Internet of Things is developing very rapidly, and the security requirements of the Internet of Things are becoming more and more prominent, especially in the perception layer and transmission layer of the Internet of Things, it is necessary to ensure the integrity and confidentiality of data. The number of Internet of Things terminal system devices is nearly 100 million, and the Internet of Things is the largest application field in the future. It mainly involves the current Internet of Things core Internet, mobile networks at the edge of the Internet of Things, wireless sensor networks, RFID, etc., so security authentication is required to manage ultra-large-scale Internet of Things devices. The developme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 陈强于江
Owner CHINA MOBILE GRP HEILONGJIANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products