Supercharge Your Innovation With Domain-Expert AI Agents!

Subliminal channel hiding communication method based on authentication code

A communication method and authentication code technology, which are applied in the field of guaranteeing the hidden communication of data in the perception layer of the Internet of Things, can solve the problems of reducing computing overhead and communication overhead, high energy consumption of security mechanisms, and ciphertext being vulnerable to attacks, and achieves reduction in computing overhead, Increase the difficulty of deciphering and ensure the effect of authenticity and integrity

Active Publication Date: 2013-07-10
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problems of low security and high energy consumption of the security mechanism in the communication process of the perception layer of the Internet of Things, and propose a subthreshold channel concealment communication method suitable for the data communication of the perception layer of the Internet of Things. Information security and integrity, to solve the problem that ciphertext is more vulnerable to attacks in the traditional communication process. At the same time, the symmetric key encryption algorithm is used to embed sensitive information into the authentication code, which greatly reduces the calculation and communication overhead, and simplifies encryption. key management process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subliminal channel hiding communication method based on authentication code
  • Subliminal channel hiding communication method based on authentication code
  • Subliminal channel hiding communication method based on authentication code

Examples

Experimental program
Comparison scheme
Effect test

example

[0013] The implementation of the present invention will be further described in detail below with reference to the accompanying drawings and specific examples. The various data and methods in this embodiment are only a special example of a clear implementation method. The application of this patent is not limited to the data, methods, application scenarios, etc. in the examples.

[0014] The invention adopts the subthreshold channel concealment technology based on the authentication code to hide the sensitive information in the authentication code of the message sender. Therefore, the amount of hidden sensitive information is limited, but it is suitable for large-scale, high security requirements, node computing The Internet of Things perception layer network with limited capacity and storage capacity and less information sent by the sender, such as smart grid, smart home, industrial Internet of Things, etc. In the smart home, the terminal controller needs to receive and analy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a subliminal channel hiding communication method based on an authentication code. The subliminal channel hiding communication method is applied to perception layer communication of the internet of things. Sensitive information is embedded into the authentication code through a base station and is broadcasted and sent together with raw information, information authentication of all nodes is completed, and meanwhile the sensitive information can also be extracted from the authentication code which already passes through authentication through a hiding communication node. Other nodes cannot know whether hiding information is contained in a data package or not and cannot acquire any information from the data package, and difficulty of decoding of the sensitive information is increased. According to the method, a hiding channel of an existing algorithm is used, communication cost is not increased, and safety of data communication is improved at the same time.

Description

technical field [0001] The invention belongs to the field of the Internet of Things, and in particular relates to a method for ensuring data concealment communication of the perception layer of the Internet of Things. Background technique [0002] The sensing layer of the Internet of Things is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area, forming a multi-hop self-organizing network system through wireless communication. information and send it to observers. With the development of the Internet of Things, the existing functions are not only one-way collection and transmission of data by nodes, but in more applications, network managers or nodes need to send control information, management information, query information and interactive information, etc., to guide The sensor nodes complete the collection work. [0003] During the operation of the Internet of Things perception layer network, the attacker can obtain network information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/03
Inventor 王浩王浩星孙浩王平张晓李玉
Owner CHONGQING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More