Electric power Internet-of-Things terminal NTRU security access method based on edge computing

An Internet of Things and edge computing technology, applied in the field of communication, can solve problems such as poor anti-quantum attack capability, Shor algorithm cracking, and low efficiency of dot multiplication operations

Active Publication Date: 2021-03-02
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the coexistence of multiple protocols in the power Internet of Things, the diversity of data sources and data types makes the security of the core system network layer of the power Internet of Things face great challenges.
Elliptic Curve Cryptography ECC (Elliptic Curve Cryptography) algorithm, which is commonly used in IoT authentication, has low efficiency of dot multiplication, poor ability to resist quantum attacks, and is easily cracked by Shor's algorithm.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power Internet-of-Things terminal NTRU security access method based on edge computing
  • Electric power Internet-of-Things terminal NTRU security access method based on edge computing
  • Electric power Internet-of-Things terminal NTRU security access method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings. However, it should be noted that these implementations are not limitations to the present invention, and the functions, methods, or structural equivalent transformations or substitutions made by those skilled in the art based on these implementations are all included in the protection scope of the present invention. .

[0049] like figure 1 As shown, the power Internet of Things is a large-scale industrial Internet of Things, and its architecture includes three typical network structures of the Internet of Things perception extension layer, network transmission layer and platform application layer. The present invention proposes the use of edge computing application layer Solve the power Internet of things network terminal equipment D i secure access and edge computing. In the edge computing application layer, the edge computing server is used to control the power IoT...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication, in particular to a power Internet-of-Things terminal NTRU security access method based on edge computing, which comprises the following steps: in an initialization stage, a system HSS server issues data information required by complete authentication; and when the power Internet-of-Things terminal equipment needs to initiate communication, sending authentication information to the edge computing MME server; after receiving the information, enabling the edge computing MME server to judge whether the access of the power Internet-of-Things terminal equipment is legal or not through computing comparison, and returning authentication information; and after receiving the authentication information of the edge computing MME server, enabling thepower Internet-of-Things terminal equipment to compare the local information with the authentication information, and if the comparison succeeds, establishing an encrypted security channel between the power Internet-of-Things terminal equipment and the edge computing MME server.

Description

technical field [0001] The present invention relates to the field of communication, in particular to an NTRU secure access method for an electric power Internet of Things network terminal based on edge computing. Background technique [0002] The essence of the power Internet of Things is the connection and interaction of information, which has the characteristics of data diversification, large amount of data, and complex data structure. Due to the coexistence of multiple protocols in the power Internet of Things, the diversity of data sources and data types makes the security of the core system network layer of the power Internet of Things face great challenges. However, the Elliptic Curve Cryptography (ECC) algorithm, which is commonly used in IoT authentication, has low efficiency of dot multiplication, poor anti-quantum attack capability, and is easily cracked by Shor's algorithm. Therefore, the power Internet of Things needs to be able to support the secure access of a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/08H04L63/0428H04L63/1458H04L63/02H04L9/085Y04S40/20
Inventor 李兴华李晓龙王峰闫振华段文奇朱东歌
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products