Supercharge Your Innovation With Domain-Expert AI Agents!

A subliminal channel concealment communication method based on authentication code

A communication method and authentication code technology, which are applied in the field of guaranteeing the hidden communication of data in the perception layer of the Internet of Things, can solve the problems of reducing computing overhead and communication overhead, high energy consumption of security mechanisms, and ciphertext being vulnerable to attacks, and achieves reduction in computing overhead, Increase the difficulty of deciphering and ensure the effect of authenticity and integrity

Active Publication Date: 2016-06-29
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problems of low security and high energy consumption of the security mechanism in the communication process of the perception layer of the Internet of Things, and propose a subthreshold channel concealment communication method suitable for the data communication of the perception layer of the Internet of Things. Information security and integrity, to solve the problem that ciphertext is more vulnerable to attacks in the traditional communication process. At the same time, the symmetric key encryption algorithm is used to embed sensitive information into the authentication code, which greatly reduces the calculation and communication overhead, and simplifies encryption. key management process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A subliminal channel concealment communication method based on authentication code
  • A subliminal channel concealment communication method based on authentication code
  • A subliminal channel concealment communication method based on authentication code

Examples

Experimental program
Comparison scheme
Effect test

example

[0013] The implementation of the present invention will be further described in detail below with reference to the accompanying drawings and specific examples. The various data and methods in this embodiment are only a special example of a clear implementation method. The application of this patent is not limited to the data, methods, application scenarios, etc. in the examples.

[0014] The invention adopts the subthreshold channel concealment technology based on the authentication code to hide the sensitive information in the authentication code of the message sender. Therefore, the amount of hidden sensitive information is limited, but it is suitable for large-scale, high security requirements, node computing The Internet of Things perception layer network with limited capacity and storage capacity and less information sent by the sender, such as smart grid, smart home, industrial Internet of Things, etc. In the smart home, the terminal controller needs to receive and analy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes an authentication code-based subthreshold channel concealment communication method suitable for communication at the perception layer of the Internet of Things. The base station embeds sensitive information into the authentication code and broadcasts it together with the original information, so that all nodes complete the process of message authentication. At the same time, hidden communication nodes can also extract sensitive information from authenticated authentication codes. Other nodes cannot know whether the data packet contains hidden messages, nor can they obtain any information from the data packet, which increases the difficulty of deciphering sensitive information. The invention utilizes the hidden channel of the existing algorithm to improve the security of data communication without increasing the communication overhead.

Description

technical field [0001] The invention belongs to the field of the Internet of Things, and in particular relates to a method for ensuring data concealment communication of the perception layer of the Internet of Things. Background technique [0002] The sensing layer of the Internet of Things is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area, forming a multi-hop self-organizing network system through wireless communication. information and send it to observers. With the development of the Internet of Things, the existing functions are not only one-way collection and transmission of data by nodes, but in more applications, network managers or nodes need to send control information, management information, query information and interactive information, etc., to guide The sensor nodes complete the collection work. [0003] During the operation of the Internet of Things perception layer network, the attacker can obtain network information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28H04W12/02H04W12/06H04W12/03
Inventor 王浩王浩星孙浩王平张晓李玉
Owner CHONGQING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More