Encryption method for communication between IoT terminal and cloud

An Internet of Things terminal and encryption method technology, applied in the field of lightweight Internet of Things security solutions, can solve the problems of paralyzed Internet of Things terminals or clouds, no two-way authentication between terminals and clouds, etc., to meet security requirements, reliable two-way authentication, The effect of reducing consumption

Active Publication Date: 2019-01-08
上海崴澜网络科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) There is only one-way authentication in the cloud, and there is no two-way authentication between the terminal and the cloud. Once a hacker steals cloud data, it can simulate server data reverse attack and control IoT terminal equipment
[0007] 2) Long-term online IoT products require the terminal to maintain data communication with the cloud at any time. Hackers can directly capture the communication data between the terminal and the cloud, and replay attacks on either the IoT terminal or the cloud, thereby paralyzing the IoT terminal or the cloud.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for communication between IoT terminal and cloud
  • Encryption method for communication between IoT terminal and cloud
  • Encryption method for communication between IoT terminal and cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0027] image 3 It is a schematic diagram of the system architecture of the present invention for IoT terminal and cloud communication; Figure 4 It is a schematic diagram of the encrypted communication process between the Internet of Things terminal and the cloud according to the present invention.

[0028] See image 3 and Figure 4 , the components of the communication system between IoT terminal and cloud provided by the present invention mainly include three parts, cloud, router gateway device and IoT terminal, wherein the router gateway device is generally a transparent device for transparent transmission in communication. The key to this solution lies in two parts, one part is the fixed byte key part stored in the IoT terminal and the cloud at the same time, the secret key consists of several bytes of IoT terminal ID, AES key and several bytes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an encryption method used for communication between an Internet of Things terminal and a cloud end. The method comprises a first step that fixed-byte-number secret keys composed of an Internet of Things terminal ID, an AES secret key and an Auth code are pre-stored at the Internet of Things terminal and the cloud end at the same time; a second step that every time connection is established, the cloud end generates a new AES code at random, the Internet of Things terminal and the cloud end at carry out bidirectional authentication by comparing the new AES code and the pre-stored AES secret key, and after the authentication succeeds, the Internet of Things terminal updates the AES secret key into a new AES code; and a third step that the Internet of Things terminal and the cloud end carry out data communication after the connection succeeds, and the Internet of Things terminal sends KeepAlive packages to the cloud end at fixed time, thus to maintain that the connection is available. By presetting the fixed-byte-number secret key data at the Internet of Things terminal and the cloud end, reliable bidirectional authentication is realized, consumption of computing and storing resources is greatly reduced, and safety requirements of lightweight class Internets of Things are met.

Description

technical field [0001] The invention relates to a communication processing method, in particular to an encryption method for communication between an Internet of Things terminal and a cloud, and a lightweight Internet of Things security solution with two-way authentication. Background technique [0002] The current development of the Internet of Things has gradually entered the fast lane. The characteristics of Internet of Things products include: online at any time, remote control. As a result, IoT products must be able to connect to the cloud through the Internet, upload and receive data and related control requests anytime, anywhere, and any device connected to the Internet must take into account the possibility of hacker attacks, thus generating encryption requirements. Encryption requirements must be met There are two solutions: [0003] Simple account password encryption: It can be implemented on an MCU with limited resources, but it cannot complete two-way authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/08H04L29/06
Inventor 陆斌泉刘亚龙吴小平
Owner 上海崴澜网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products