A method for secure transmission of Internet of Things data in a harsh wireless network environment
A network environment and data security technology, applied in the direction of digital transmission system, transmission system, electrical components, etc., can solve the problem of low security, achieve the effect of ensuring security, low cost, solving security and stability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] This embodiment is a method for secure transmission of Internet of Things data in a wireless harsh network environment. The process of the method is as follows: figure 1 shown. The system used in the method described in this embodiment includes: a smart device end, and the smart device end is connected to a measurement and control terminal through a wired network and a wireless network.
[0033] The smart device end can be various mechanical, electronic, electrical, chemical and other devices with or without sensors, such as: cameras that can perform three-dimensional rotation, robots, drones, and various smart home devices that can be connected to the Internet. Electrical appliances and other equipment. These devices can be simple sensors that can be operated remotely, such as cameras, which can be controlled remotely through the system. The lens of the camera can be rotated up and down, left and right, and monitor the surrounding environment in a wide range. It can ...
Embodiment 2
[0062] This embodiment is an improvement of the first embodiment, and is a refinement of the first embodiment regarding encryption. The encryption method described in "the step of encrypting the data code" and "the step of decrypting the data" described in this embodiment is an end-to-end one-way Hash function algorithm.
[0063]In this embodiment, an end-to-end encryption method is adopted to encrypt the transmitted data. Common data encryption methods mainly include symmetric encryption, asymmetric encryption methods, and hash algorithms. Since the operation speed of the asymmetric encryption algorithm is much slower than that of the symmetric encryption algorithm, when a large amount of data needs to be encrypted, the use of the symmetric encryption algorithm can increase the speed of encryption and decryption. At the same time, the symmetric encryption algorithm cannot realize the signature, and its key management is a complicated process. Therefore, this embodiment adop...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


