Dynamic encryption method of IoT devices based on login serial number

An Internet of Things device and dynamic encryption technology, which is applied in the field of Internet of Things and data security, can solve problems such as low computing power, high requirements for processor computing speed and storage resources, and increase the risk of keys being cracked, and achieve storage resource The effect of low demand for computing power, increasing the difficulty of cracking, and increasing the cost of cracking

Active Publication Date: 2021-06-25
TAIHUA WISDOM IND GRP CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Due to limited equipment resources, it is difficult to apply complex algorithms
[0005] In traditional Internet communication, secure transport layer protocols such as SSL / TLS are usually used to implement data encryption to ensure data security, but secure transport layer protocols such as SSL / TLS often rely on asymmetric encryption algorithms such as RSA, which affects the computing speed of the processor. and high storage resource requirements
Due to its low cost and low power consumption, IoT devices usually use embedded microcontrollers with relatively low computing power and relatively tight storage resources as the main control chip, which makes it difficult to implement complex asymmetric encryption algorithms.
Therefore, it is difficult to directly apply the secure transmission protocols in the traditional Internet to IoT devices.
[0006] 2. The symmetric encryption method based on the static key has relatively low security
This method uses a symmetric encryption algorithm with less resource consumption and does not require dynamic key negotiation, which is convenient for application in embedded microcontrollers. However, the same static key is always used, and long-term use will increase the risk of the key being cracked. Effective defense against replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic encryption method of IoT devices based on login serial number
  • Dynamic encryption method of IoT devices based on login serial number
  • Dynamic encryption method of IoT devices based on login serial number

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0059] see figure 1 Shown is a specific embodiment of the method for dynamically encrypting Internet of Things devices based on the login serial number described in this application, and the method includes:

[0060] Step 101, the IoT device generates a first dynamic key:

[0061] The IoT device performs a one-way hash operation on the static key K and the login serial number L of the IoT device. The one-way hash operation includes the MD5 one-way hash algorithm and the SHA one-way hash algorithm to obtain the first Dynamic HMAC key HK, the one-way hash algorithm is not limited to MD5 one-way hash algorithm and SHA one-way hash algorithm, and can also include other one-way hash algorithms;

[0062] Utilize the dynamic HMAC key as the key of the HMAC algorithm to perform the HMAC operation on the static key K and the login serial number L of the IoT device, and use the operation result as the first dynamic encryption key EK;

[0063] The first dynamic key includes: the first ...

Embodiment 2

[0084] The present application provides another embodiment of a method for dynamically encrypting an IoT device based on a login serial number, and the method includes:

[0085] Step 201, the IoT device generates a first dynamic key:

[0086] The Internet of Things device performs a one-way hash operation on the static key K and the login sequence number L of the Internet of Things device. The one-way hash operation includes the MD5 one-way hash algorithm and the SHA one-way hash algorithm to obtain the first dynamic HMAC key HK, the one-way hash algorithm is not limited to MD5 one-way hash algorithm and SHA one-way hash algorithm, and can also include other one-way hash algorithms;

[0087] Utilize the dynamic HMAC key as the key of the HMAC algorithm to perform the HMAC operation on the static key K and the login serial number L of the IoT device, and use the operation result as the first dynamic encryption key EK;

[0088] The first dynamic key includes: the first dynamic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses a dynamic encryption method for an Internet of Things device based on a login serial number. The method includes: the Internet of Things device generates a first dynamic key; the Internet of Things device uses the generated first dynamic key to encrypt a login message to obtain an encrypted login message. Text; IoT device sends encrypted login message to IoT platform; IoT platform receives encrypted login message, verifies encrypted login message, and IoT platform generates login reply message after verification; IoT platform sends login reply The message is sent to the IoT device; the IoT device receives the login reply message, and verifies the login reply message; the two-way identity authentication between the IoT device and the IoT platform is successful, and the IoT platform and the IoT device send each other Ordinary datagram. The invention generates a pseudo-random dynamic key from the static key and the login serial number of the Internet of Things device, thereby improving the communication security between the Internet of Things device and the Internet of Things platform.

Description

technical field [0001] The present invention relates to the technical field of Internet of Things and data security, and more specifically, relates to a dynamic encryption method of an Internet of Things device based on a login serial number. Background technique [0002] The Internet of Things is a highly integrated and comprehensive application of the new generation of information technology, which is of great significance to the new round of industrial transformation and the green, intelligent and sustainable development of the economy and society. Because of its huge growth potential, it has become the strategic commanding heights of today's economic development and technological innovation, and has become the forerunner for various countries to build new social models and reshape the country's long-term competitiveness. At present, with the rapid development of the Internet of Things technology, the ecological circle is becoming more and more perfect, the application fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0861H04L9/0866H04L9/3239H04L63/08H04L63/0807H04L63/0869
Inventor 郝敬全孙文健王淑平马述杰
Owner TAIHUA WISDOM IND GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products