Encryption method applied to MQTT-SN protocol

An encryption method and protocol technology, which is applied in the encryption field of the MQTT-SN protocol, can solve problems such as unguaranteed messages, invisible payloads, and unrealized authentication of publishers and subscribers, so as to improve security and protect privacy.

Inactive Publication Date: 2018-02-16
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Authentication problem: the authentication of the publisher and the subscriber has not been implemented, and the legitimacy of the information source cannot be safely guaranteed
[0009] (2) Data confidentiality problem: It cannot be guaranteed that the payload published by the publisher is invisible to the outside world
[0010] (3) Data integrity problem: there is no guarantee that the published message will not be modified by an unauthenticated, especially malicious node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method applied to MQTT-SN protocol
  • Encryption method applied to MQTT-SN protocol
  • Encryption method applied to MQTT-SN protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Hereinafter, the preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0046] The present invention uses "0X1E" as the new message type, which means that the published payload data is encrypted using the CP-ABE algorithm, and the overall process is as follows figure 1 As shown, it specifically includes four stages: initialization, encryption, release, and decryption.

[0047] 1. Initialization phase:

[0048] Before the publish / subscribe client can communicate normally, it needs to be initialized first, that is, the publish / subscribe client completes registration with the proxy server and establishes a connection with the proxy server. The registration process is as figure 2 Shown.

[0049] Step 1-1: The publish / subscribe client sends a registration request to the proxy server, that is, provides identity authentication information. The format of the identity authentication information submitted by the publis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption method applied to a MQTT-SN protocol, and relates to the field of communication. The method employs a harsh algorithm and ciphertext-policy attribute-based encryption method, so that a publishing terminal, an agent server and one or a plurality of subscription terminals can complete encrypted communication. The method herein includes the following steps: an agent server verifying the identity of a publishing/subscription terminal, performing registration of the publishing/subscription terminal, and generating a system common parameter; the publishing terminal encrypting a plaintext load by using the ciphertext-policy attribute-based encryption method; the publishing terminal transmitting the encrypted load to the agent server, the agent server forwarding the encrypted load to one or a plurality of subscription terminals; and the subscription terminal applying for a secrete key from the agent server, decrypting the encrypted load, obtaining a plaintext. According to the invention, the method can implement identity verification of a MQTT-SN protocol publishing/subscription terminal, data integrity verification, and data confidentiality protection, and better addresses the safety issues faced by the MQTT-SN protocol in terminals of wireless sensor network applications.

Description

Technical field [0001] The invention belongs to the communication field, and specifically relates to an encryption method suitable for the MQTT-SN protocol. Background technique [0002] The MQTT-SN (Message Queuing Telemetry Transport for Sensor Networks) protocol is a lightweight proxy-based publish / subscribe messaging protocol designed by IBM for wireless sensor networks. Its design purpose is mainly to provide an open, streamlined, lightweight and easy-to-implement communication method for a large number of wireless sensor networks with limited computing power and working in low-bandwidth, unreliable networks. It has the obvious characteristics of being suitable for wireless sensor networks, such as low protocol consumption, light weight, and low power consumption, and has been widely used in environments with limited computing and storage resources such as wireless sensors. [0003] The MQTT-SN protocol data encryption process involves three types of entities: publishing end,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/10H04W84/18H04L29/06H04W12/03H04W12/106
CPCH04L69/26H04W12/02H04W12/06H04W12/10H04W84/18
Inventor 王浩李勇王平马展吴亚洲
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products