Key management method of Internet of Things (IOT) sensor system

A sensor system and key management technology, applied in the field of IoT security, can solve the problems of large losses, leakage, and high temptation, and achieve the effect of effective key security protection

Active Publication Date: 2014-03-26
中科微芯优联科技(成都)有限公司
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the deeper security and system performance issues in the above security mechanism have not been fully considered, and there is a lack of corresponding key management system
The following problems exist in the indefinite use of the encryption key: 1. The longer the key is used, the greater the chance of it being leaked; 2. If the key has been leaked, the longer the key is used, the greater the loss; 3. The key The longer it is used, the greater the temptation for people to spend energy to decipher it; 4. It is generally easier to cryptanalyze multiple ciphertexts encrypted with the same key
The greater the value and data transfer rate, the more frequent key changes are used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method of Internet of Things (IOT) sensor system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only parts related to the present invention are shown in the drawings but not all content.

[0027] Please refer to figure 1 as shown, figure 1 It is a flow chart of the key management method of the IoT sensor system provided by the embodiment of the present invention.

[0028] The key management method flow of the IoT sensor system in this embodiment specifically includes the following steps:

[0029] Step S101 , after the security-aware node is powered on, it first runs the registration of the sensory node and the authentication of the sensory node by the gateway.

[0030] Step S102, start the key management module, use the preset secret i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key management method of an Internet of Things (IOT) sensor system. The method comprises the following steps of: A. performing the registration of sensor nodes and the authentication of sensor nodes by a gateway. B. starting a key management module, using the preset secret information in the sensor nodes and the gateway, and generating key pairs and network keys of the gateway between the sensor nodes and the gateway according to the different security requirements of packets, and updating the key pairs and network keys periodically. The method supports the update of different keys in different periods of validity, and provides effective security protection for the keys for the gateway and the sensor network communication under the gateway.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a key management method for an Internet of Things sensor system. Background technique [0002] Sensor networks are widely used in the fields of urban public safety and home smart security. Different sensor networks gather information from various types of sensors (infrared sensors, door magnetic sensors, combustible gas sensors, smoke sensors, etc.), and use the comprehensive resources of the Internet to provide services for monitoring and security management. Under the realistic demands of severe urban public safety, establishing an efficient sensor security mechanism can not only solve prominent practical problems, but also is an important guarantee for promoting the development of the Internet of Things. [0003] The current relatively mature ZigBee security mechanism is provided by the security service provider layer. A shared security key is used. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/0433H04W12/06
Inventor 姚尧吕世超潘磊芦翔周新运孙利民
Owner 中科微芯优联科技(成都)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products