Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

End-to-end security assurance method under IoT (Internet of Things) cloud environment

A security guarantee and cloud environment technology, applied to secure communication devices, public keys for secure communications, and key distribution, can solve problems such as inability to flexibly implement resource control, achieve identity legitimacy, secure communications, and reduce authentication The effect of times

Active Publication Date: 2018-04-17
INST OF IND INTERNET CHONGQING UNIV OF POSTS & TELECOMM
View PDF9 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional Internet of Things technology uploads the collected information to the local server through the wireless sensor network, and cannot flexibly realize resource control. The emergence of cloud computing provides this possibility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end security assurance method under IoT (Internet of Things) cloud environment
  • End-to-end security assurance method under IoT (Internet of Things) cloud environment
  • End-to-end security assurance method under IoT (Internet of Things) cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0030] 1. The initialization process is as follows:

[0031] Such as figure 1 As shown in , the system administrator configures the identity ID and pre-shared key K for nodes and gateways P ; The gateway and the cloud server register with the RA registration center in the PKI system, and the CA certificate center generates and issues digital certificates CertA and CertB, which can be used to assist in the two-way authentication of the gateway and the cloud server. CertA={ID a ,PU a ,(d a ,s a ),e a , T a} is the digital certificate issued by CA for terminal entity A. Among them, ID a ID assigned to user A by CA; Y a is the public key of user A, Y a = r a ×P,r a ∈[1,n-1] is the private key of user A, where P is the point on E(a,b) on the elliptic curve, n is the order of P; e a Indicates that there is H(TD a ||Y a ||T a ) ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an end-to-end security assurance method under an IoT (Internet of Things) cloud environment, belonging to the fields of loT and cloud computing. Firstly, a PKI authenticationmechanism based on an ellipse curve algorithm is used to realize the authentication and key negotiation of a gateway and a cloud server, and establish a secure channel between the gateway and the cloud server; then the bidirectional authentication protocol based on the modified symmetric key is used to realize the authentication and key negotiation of a resource-limited node and the gateway; and finally a session key between the gateway and the cloud server is used to encrypt a session key between the node and the gateway, and the encrypted session key is sent to the cloud server, thus completing the establishment of the secure channel between the terminal node and the cloud server. The invention guarantees the identity validity of the node and the cloud server, and meanwhile, effectivelyreduces the computing cost of the sensor node. The authentication of the cloud server is indirectly realized by the gateway, thus reducing the authentication times between the gateway and the cloud server, and realizing the secure communication between the terminal node and the cloud server.

Description

technical field [0001] The invention belongs to the field of the Internet of Things and cloud computing, and relates to an end-to-end security guarantee method for the cloud environment of the Internet of Things. Background technique [0002] With the continuous development of information technology, emerging new technologies have brought great convenience to people's life. The Internet of Things has attracted people's attention with its flexible and efficient features. In order to make the Internet of Things play a greater role, it is necessary to combine cloud computing and Internet of Things technology, and use the advantages of cloud computing to make the development of the Internet of Things have a better foundation. Cloud computing can provide powerful computing and storage capabilities for the Internet of Things. On the basis of cloud computing, let the Internet of Things technology collect information through wireless sensors, and then transmit the collected inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0869H04L9/3066H04L9/3263
Inventor 王浩吴亚洲王平李勇胡润马展
Owner INST OF IND INTERNET CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products