A key management method for an internet of things sensor system

A sensor system and key management technology, applied in the field of Internet of Things security, can solve the problems of large losses, lack of key management system, frequent key replacement, etc., and achieve the effect of effective key security protection

Active Publication Date: 2016-09-07
中科微芯优联科技(成都)有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the deeper security and system performance issues in the above security mechanism have not been fully considered, and there is a lack of corresponding key management system
The following problems exist in the indefinite use of the encryption key: 1. The longer the key is used, the greater the chance of it being leaked; 2. If the key has been leaked, the longer the key is used, the greater the loss; 3. The key The longer it is used, the greater the temptation for people to spend energy to decipher it; 4. It is generally easier to cryptanalyze multiple ciphertexts encrypted with the same key
The greater the value and data transfer rate, the more frequent key changes are used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key management method for an internet of things sensor system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only parts related to the present invention are shown in the drawings but not all content.

[0027] Please refer to figure 1 as shown, figure 1 It is a flow chart of the key management method of the IoT sensor system provided by the embodiment of the present invention.

[0028] The key management method flow of the IoT sensor system in this embodiment specifically includes the following steps:

[0029] Step S101 , after the security-aware node is powered on, it first runs the registration of the sensory node and the authentication of the sensory node by the gateway.

[0030] Step S102, start the key management module, use the preset secret i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key management method for an Internet of Things sensor system, which includes the following steps: A, registering a sensory node in operation and authenticating the sensory node by a gateway. B. Start the key management module, use the preset secret information in the sensing node and the gateway, according to the different security requirements of the data packet, generate and periodically update the pair key and the gateway network key between the sensing node and the gateway . The invention supports the renewal of different keys with different valid periods, and provides effective key security protection for the gateway and sensor network communication below the gateway.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a key management method for an Internet of Things sensor system. Background technique [0002] Sensor networks are widely used in the fields of urban public safety and home smart security. Different sensor networks gather information from various types of sensors (infrared sensors, door magnetic sensors, combustible gas sensors, smoke sensors, etc.), and use the comprehensive resources of the Internet to provide services for monitoring and security management. Under the realistic demands of severe urban public safety, establishing an efficient sensor security mechanism can not only solve prominent practical problems, but also is an important guarantee for promoting the development of the Internet of Things. [0003] The current relatively mature ZigBee security mechanism is provided by the security service provider layer. A shared security key is used. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/0433H04W12/06
Inventor 姚尧吕世超潘磊芦翔周新运孙利民
Owner 中科微芯优联科技(成都)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products