Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data transmission method, device and system thereof

A data transmission method and a technology for disclosing parameters, which are applied in the field of devices and systems, and data transmission methods, can solve the problems of limited ability to resist man-in-the-middle attacks, do not support identity authentication of neighbor nodes, and cannot resist impersonation attacks, etc., to avoid counterfeiting attacks, Avoid node spoofing attacks and ensure the effect of security

Active Publication Date: 2015-01-14
CHINA MOBILE GRP HEILONGJIANG CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But its obvious disadvantage is that there must be a key pre-distribution process, that is, the symmetric key is stored in the node in advance, which is not flexible enough for adding and replacing nodes.
The disadvantage of using the symmetric key system in the WSN of the Internet of Things is that the ability to resist man-in-the-middle attacks is very limited, it does not support identity authentication of neighbor nodes, and it cannot resist impersonation attacks. With the increase of captured nodes, more key information will be exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method, device and system thereof
  • Data transmission method, device and system thereof
  • Data transmission method, device and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0083] Such as figure 1 As shown, a data transmission method for a node proposed by an embodiment of the present invention includes the following steps:

[0084] Step S101: use the first key to encrypt the request of the node to communicate with the private key generator, and generate a first ciphertext; wherein, the first key is a symmetric key previously assigned to the node by the key distribution center;

[0085] Step S102: sending the first ciphertext to the key distribution center;

[0086] Step S103: Receive and use the first key to decrypt the second ciphertext returned by the key distribution center, and obtain the current session key between the node and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission method, a device and a system thereof, wherein the data transmission method for a node comprises the steps of: generating a first cryptograph through a communication request of a first secret key encryption node and a private key generator, wherein the first secret key is a symmetrical secret key which is distributed by a secret key distribution center to the node; transmitting the first cryptograph to the secret key distribution center; receiving and using the first secret key for decrypting a second cryptograph which returns from the secret key distribution center, obtaining the secret key of a session at this time and a third cryptograph; forwarding the third cryptograph to the private key generator; and receiving and using the secret key of the session at this time for decrypting a fourth cryptograph which is transmitted by the private key generator and is encrypted by the secret key at this time, and obtaining a public parameter and the private key. According to the data transmission method, the node uses the secret key distribution center for communicating with the private key generator through one-time session keys which are distributed according to different symmetrical keys as nodes, thereby effectively preventing impersonation attacks to the node, and simultaneously ensuring high safety in distributing a public parameter and a private key of the node by a private key server.

Description

technical field [0001] The present invention relates to the security field of the Internet of Things, in particular to a data transmission method, device and system. Background technique [0002] The Internet of things (IoT) is to connect items with the Internet through radio frequency identification and other information sensing devices to realize intelligent identification and management. The core and foundation of the Internet of Things is still the Internet, which is an extended and expanded network based on the Internet. Its client end extends and extends to any item and item for information exchange and communication. The Internet of Things is mainly composed of a large number of wireless sensor nodes, wireless sensor networks and the Internet. Both the sensor nodes and the sensor network itself have certain resource limitations, which will directly affect the security mechanism of the Internet of Things. [0003] In all security solutions, authenticated encryption t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04L12/28
Inventor 陈强李晋宋刚戴毓丰李伟东于江
Owner CHINA MOBILE GRP HEILONGJIANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products