Zigbee initial secret key distribution method based on RSSI covert communication

A technology of initial key and distribution method, applied in wireless communication, security devices, electrical components, etc., can solve the problems of network security threats, impossible keys, encryption, etc., and achieve the effect of network security

Active Publication Date: 2016-04-20
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the new node and the encrypted network node have no prior knowledge, it is impossible to encrypt the key when transmitting the key, and the key can only be transmitted in plain text
There is a very dangerous stage, that is, before applying fo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zigbee initial secret key distribution method based on RSSI covert communication
  • Zigbee initial secret key distribution method based on RSSI covert communication
  • Zigbee initial secret key distribution method based on RSSI covert communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 2 It is the steps of the trust center node solution in a specific embodiment, and those skilled in the art should understand that the steps in this embodiment are regarded as a preferred implementation mode of the present invention, and are not understood as limiting the protection scope of the present invention, that is, The following specific steps are only as a preferred mode of the technical solution of the present invention.

[0044] Specifically, it can be achieved through the following preferred implementation method:

[0045] Step 101: The trusted node randomly generates a bit string S (b1, b2, b3, ..., bn) as prior knowledge for generating a symmetric key.

[0046] Step 102: According to the modulation rule, judge whether the i-th bit of the bit string is 0, if it is 0, execute step 103, and send a low-power data packet, otherwise execute step 104, and send a high-power data packet.

[0047] Step 103: the optional transmitting power of Zigbee terminal...

Embodiment 2

[0054] In a specific embodiment, such as image 3 As shown, when there is a newly joined node, the distribution of keys and the establishment of secure communication can be realized in the following ways:

[0055] Step 201: Waiting for the trusted node to transmit the data packet.

[0056] Step 202: when the network access node receives the data packet, record the received signal strength value (RSSI) and the sequence of each data packet, and the arrival sequence of the i data packet is i, so that a data packet is recorded for each data packet Two-tuple (S, I), S represents the signal reception strength of the packet, and I is the arrival sequence of the packet.

[0057] Step 203: When the data payload of the received packet is all 0, it means that the peer end has completed the data transmission in secret, go to step 203, otherwise go to step 201.

[0058] Step 204: After the network access node receives all n packets from the trusted node, the network access node obtains a...

Embodiment 3

[0063] In order to further describe the technical solution of the present invention in detail, the method steps of the present invention are described below with a specific example of communication steps:

[0064] After the trust center node authenticates the node to be joined and allows it to join the network, the initial key distribution is about to start, which is the method described in the present invention.

[0065] 1) The trust center node randomly generates a 13-bit bit string 0100110010111 as public prior knowledge.

[0066] 2) The trusted node modulates the above 13-bit prior knowledge through RSSI strength, and modulates the 13-bit string into 13 data packets. The trusted node transmits 13 data packets to the network access node to covertly transmit the prior knowledge of 0100110010111. The data in the packet can be arbitrary without any practical meaning. The modulation rule is: bit0 is modulated with low RSSI, and bit1 is modulated with high RSSI. For example, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a Zigbee initial secret key distribution method. The method comprises the steps that a bit string S generated randomly by a trusted node is used as priori knowledge for generating a symmetric key; the S is modulated and sent; whether transmission of a modulated data packet is completed or not is judged; if transmission is completed, a packet with all the data payloads being 0 is transmitted for representing that transmission of secret data is completed; a bit string A is randomly generated by the trusted center node, B is generated based on the A and the S, and the B is transmitted to a network access node; a data packet transmitted by the network access node is waited for, if the data packet is received, a bit string D transmitted by the network access node is received, a bit string E is obtained through the A and the D, and the trusted center node transmits the bit string E to the network access node through an E encryption network secret key. The Zigbee initial secret key distribution method is based on a covert channel, no node hardware equipment needs to be added, and the accuracy and safety are improved.

Description

technical field [0001] The invention relates to a key distribution method, in particular to a flexible, convenient and scalable initial key distribution method based on RSSI secret communication. Background technique [0002] With the rapid development of the Internet of Things, the wireless sensor network as the sensing layer of the Internet of Things has also attracted more and more attention from academia and industry. At present, the wireless sensor network has broad application prospects in the military field, environmental detection, intelligent medical care, intelligent home, industrial automation, etc., so its security issues cannot be ignored. A wireless sensor network is a multi-hop ad hoc network formed by a large number of resource-constrained wireless sensor nodes through wireless communication, and cooperates with each other to complete the data collection, transmission, and processing of the detected object. In order to ensure the privacy and integrity of net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04L29/06H04W84/18H04W12/041H04W12/0431
CPCH04L63/062H04W12/04H04W84/18
Inventor 李超郭云川万亚东张晓彤
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products