Intelligent equipment network communication security implementation method based on Internet of Things

A smart device and network communication technology, applied in the field of network communication, can solve problems such as network communication links being tapped, communication links being tapped, keys easily leaked, etc., to achieve resistance to repeated data attacks, less MCU resources, and solve security problems. problem effect

Pending Publication Date: 2020-12-11
LIERDA SCI & TECH GRP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The present invention mainly solves the problems of eavesdropped communication links, forged identities, tampered data, and easily leaked keys in network communication in the existing technology; it provides a method for implementing network communication security of smart devices based on the Internet of Things, and improves network security. Communication security, to solve the problems of network communication links being eavesdropped, identities forged, data tampered and keys easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent equipment network communication security implementation method based on Internet of Things
  • Intelligent equipment network communication security implementation method based on Internet of Things
  • Intelligent equipment network communication security implementation method based on Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Embodiment 1: A method for realizing network communication security of smart devices based on the Internet of Things, such as figure 1 As shown, first set the key group, each key group is 2 M keys and 2 M key index, and the key group structure is shown in Table 2-1:

[0044] Table 2-1 Key group structure

[0045]

[0046] Encapsulate and encrypt the communication data. The structure of the encapsulated data packet is shown in Table 2-2:

[0047] Table 2-2 Data packet structure

[0048]

[0049] The data packet is divided into an encryption area and a verification area; all data in the encryption area is encrypted, including business data, unique serial number of the device, and signature data. The signature value of the requester or responder is stored in the verification area, which is used for identity verification and data tampering inspection.

[0050] The encryption process adopts the method of electronic signature. Through MD5 Message-Digest Algorithm, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent device network communication security implementation method based on the Internet of Things. The method comprises steps that an intelligent device initiates an authentication request; the intelligent device encrypts the service data packet and sends the encrypted service data packet to a server; the server verifies legality of the intelligent equipment; the server encrypts the service data packet and sends the encrypted service data packet to the intelligent device; the intelligent equipment verifies legality of the server; wherein the service data packetcomprises an encryption area and a verification area, all data in the encryption area is encrypted and comprises service data, a unique serial number of equipment and signature data, and a signaturevalue of a requester or a responder is stored in the verification area and is used for identity verification and data tampering check. According to the method, encryption and decryption keys and the identity authentication information of each communication change randomly, so repeated data attacks can be effectively resisted; secret key management is carried out by adopting a secret key group anda secret key index, and two communication parties do not carry out secret key related information interaction all the time, so security of a secret key is ensured.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for implementing network communication security of smart devices based on the Internet of Things. Background technique [0002] With the continuous development of the Internet of Things technology, the number of Internet of Things smart devices (hereinafter referred to as smart devices) is increasing exponentially, and the network communication methods are changed from the original Wi-Fi, GSM (Global System for Mobile Communications, Global System for Mobile Communications), LTE (Long Term Evolution, long-term evolution technology) has developed to the current NB-IoT (Narrow Band Internet of Things, narrowband Internet of Things). At present, most smart devices do not have any security measures for network communication due to the consideration of development costs and operation and maintenance costs, and only a small number of devices have adopted certain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/60G06F21/64G16Y10/75G16Y40/50
CPCG06F21/445G06F21/602G06F21/64G16Y10/75G16Y40/50
Inventor 杨守望焦绍华王哲豪葛淑君程晨瓯
Owner LIERDA SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products