Unlock instant, AI-driven research and patent intelligence for your innovation.

Group key generation method in IOT (Internet of Things), and communication node

A technology of communication nodes and group keys, applied in the field of Internet of Things security, can solve the performance consumption of the network side, the group key cannot be updated in time and ensure forward and backward security, and is not suitable for dynamically variable Internet of Things devices, etc. problem, to achieve the effect of preventing illegal acquisition and defending group keys

Active Publication Date: 2017-06-23
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the multimedia broadcast multicast service: 1) The server on the network side updates the group key within a specific period of time. During this specific time, when a group member leaves or a new group member joins, the group key cannot be updated in time and the forward and backward security; 2) The generation and update of the group key are initiated by the server on the network side and calculate the new group key, and each key update causes additional performance consumption on the network side
[0007] Therefore, the existing technical solutions are not suitable for a group of dynamically variable IoT devices to complete efficient and secure group key generation and update after authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group key generation method in IOT (Internet of Things), and communication node
  • Group key generation method in IOT (Internet of Things), and communication node
  • Group key generation method in IOT (Internet of Things), and communication node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] Such as figure 1 As shown, this embodiment provides a method for generating a group key under the Internet of Things, and the method includes:

[0103] Step S110: the network side server generates first reference information;

[0104] Step S120: receiving the second key information generated by the group proxy node based on the second reference information;

[0105] Step S130: Obtain the second reference information based on the second key information;

[0106] Step S140: Obtain a group key based on the first reference information and the second reference information.

[0107] The method described in this embodiment may be a method for generating a group key applied to a server on the network side. In step S110, the network server will randomly generate a piece of reference information, which is named first reference information in this embodiment.

[0108] In this embodiment, the first reference information may be a random number generated by the network side serve...

Embodiment 2

[0122] As shown in 2, this embodiment provides a group key generation method under the key Internet of Things, the method includes:

[0123] Step S210: the group proxy node generates second reference information;

[0124] Step S220: generating second key information based on the second reference information;

[0125] Step S230: sending the second key information to the network side server;

[0126] Step S240: Generate third key information based on the second reference information; wherein, the third key information is used by the group members to obtain the second reference information;

[0127] Step S250: receiving the first key information generated by the network side server based on the first reference information;

[0128] Step S260: Send the first key information and the third key information to group members; wherein, the first key information is used for the group members to obtain the first reference information; the third key The information is used by the group ...

Embodiment 3

[0159] Such as image 3 As shown, this embodiment provides a group key generation method under the key Internet of Things, the method comprising:

[0160] Step S310: receiving the first key information generated by the network side server forwarded by the group proxy node based on the first reference information;

[0161] Step S320: Obtain the first reference information based on the first key information;

[0162] Step S330: receiving third key information generated by the group of proxy nodes based on the second reference information;

[0163] Step S340: Obtain the second reference information based on the third key information;

[0164] Step S350: Generate a group key based on the first reference information and the second reference information.

[0165] The method described in this embodiment can be applied to group members, and the group members can interact with the network side server through the group proxy node.

[0166] In this embodiment, the first key informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a group key generation method in the IOT (Internet of Things), and a communication node. The method comprises the steps: enabling a network side server to generate first reference information; receiving second key information generated by a group agent node based on second reference information; obtaining the second reference information based on the second key information; and obtaining a group key based on the first reference information and the second reference information.

Description

technical field [0001] The invention relates to the security technology of the Internet of Things, in particular to a group key generation method and a communication node under the Internet of Things. Background technique [0002] In the group certification scheme discussed by the Internet Engineering Task Force Core (IETF Core, The Internet Engineering TaskForce Core) group and the 3rd Generation Partnership Project (3GPP, 3rd Generation Partnership Project) MTCe Release 13, several IoT devices ( A1, A2,...,An) form a group, each device is a group member of the group, and each group member (A2, A3,...,An) supports private protocol communication, group member A1 as a group Proxy node, A1 first conducts intra-group authentication with each group member and calculates the intra-group session key. Then, A1 represents each member in the group to conduct out-of-group authentication with the network side server. After the network side server authenticates the group proxy node A1 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0833H04L63/065
Inventor 程紫尧齐旻鹏
Owner CHINA MOBILE COMM GRP CO LTD