Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Internet of Things terminal secure communication method based on a block chain technology

A technology for secure communication of IoT terminals, which is applied in the field of secure communication of IoT terminals based on blockchain technology, can solve problems such as limited resources of IoT devices, unrealized integrity protection of data, and increased central server load, etc. , to achieve the effect of ensuring that it is difficult to tamper with, realize high efficiency, and reduce load

Inactive Publication Date: 2019-05-07
HUNAN NORMAL UNIVERSITY
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This mechanism has certain shortcomings: (1) Many IoT devices usually use default factory usernames and passwords, which increases the possibility of brute force cracking
(2) Each IoT device session must be authenticated and transmitted by the central server. With the continuous increase of IoT devices, the load on the central server will be greatly increased.
(3) Routine storage of password data on the server side may easily cause user privacy leakage
(4) In terms of the reliability guarantee of data storage, the service center mostly adopts the master-slave backup mechanism, which can solve the problem of single point of failure, but does not realize the integrity protection of the data itself
To achieve storage and consensus between terminals, the calculation and storage overhead is relatively large, which does not meet the characteristics of limited resources of IoT devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Internet of Things terminal secure communication method based on a block chain technology
  • An Internet of Things terminal secure communication method based on a block chain technology
  • An Internet of Things terminal secure communication method based on a block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to reduce the load pressure of the service center, realize efficient and safe communication and data transmission between IoT terminal devices, ensure the non-tampering of data, and the convenience of equipment use, based on blockchain technology, a compromise Internet of Things is proposed. A method for secure transmission and storage of information between terminal devices, the security architecture of the system is as follows: figure 2 shown. This solution can solve remote communication and transmission security issues at the same time, and meet practical application requirements such as small load and safe storage. It mainly includes three aspects of work: (1) Starting from the separation of IoT device authorization and inter-device communication, based on asymmetric encryption algorithm and D-H key exchange mechanism, the secure communication of IoT terminal devices is realized; (2) Raft consensus is designed The algorithm meets the strong consistency an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things terminal secure communication method based on a block chain technology. The Internet of Things terminal secure communication method comprises the steps that an Internet of Things communication server generates a key; Each IoT device generates a key generation parameter and generates a respective private key; And the two communication parties calculaterespective public keys, obtain the secret keys of the Internet of Things communication server, submit the respective public keys to the Internet of Things communication server for storage, obtain thepublic keys of the communication parties through the Internet of Things communication server, calculate the communication secret key of the current communication and carry out secure communication through the communication secret key of the current communication. According to the invention, automatic encryption communication between the IoT device and the service center and between the IoT deviceand the IoT device is realized; The load capacity of the service center is reduced, and the high efficiency of data communication is realized; And finally, reliable storage of the IoT equipment publickey and other data based on the block chain is realized, the storage integrity and tamper resistance are ensured, and the requirement of storage security is met.

Description

technical field [0001] The present invention specifically relates to a secure communication method for an Internet of Things terminal based on block chain technology. Background technique [0002] With the development of economy and technology, the Internet of Things has been widely used in people's production and life, bringing endless convenience to people's production and life. [0003] From smart grids, smart transportation, smart cities to industry 4.0 and other application scenarios, Internet of Things (IoT) terminal devices and systems have grown explosively, and IoT applications are becoming more and more widespread. However, once a device is connected to the network, there is bound to be the possibility of being attacked. Once attacked, it will lead to data and privacy leakage, and serious accidents such as traffic paralysis and power grid interruption. The security of IoT systems has received more and more attention. [0004] At present, more traditional methods a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/30H04L29/08
Inventor 魏叶华赵艳杰蒋继强乐懿邢红星
Owner HUNAN NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products