Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Security Method for Coap Protocol in Multicast

A protocol and security technology, applied in the network field, can solve the problem of confidential transmission of difficult information to the multicast group server, and achieve the effect of improving security

Active Publication Date: 2020-07-03
CHONGQING UNIV OF POSTS & TELECOMM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the case of CoAP protocol multicast, it is difficult to complete the confidential transmission of information to the multicast group server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Security Method for Coap Protocol in Multicast
  • A Security Method for Coap Protocol in Multicast
  • A Security Method for Coap Protocol in Multicast

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0041] Such as Figure 1-Figure 3 As shown, a multicast authentication method based on authentication encryption algorithm and Boolean array, when implementing CoAP networking through unicast, the operation is more complicated, and it is only applicable when the number of receiving servers is small. If the number of receiving ends in the system is large , it is prone to the problem that the server receives too much information at an interval, or the message is leaked. Using this method can ensure the security of the CoAP protocol network in the case of multicasting. It is also applicable to the proxy server mechanism of the CoAP protocol itself. The process includes the following Several steps:

[0042] S1 system initialization

[0043] According to the proxy cache mechanism of the CoAP protocol itself, the authentication and key manageme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety method for a CoAP protocol under a multicast situation, and belongs to the technical field of the network. On the basis of the CoAP protocol designed by orienting a resource-limited an IP network, the invention proposes a safety method for a CoAP protocol multicast mechanism. The safety method comprises a multicast authenticiaton encryption algorithm and a Booleanarray detection mechanism to guarantee the end-to-end security, and the safety method is suitable for the own agent mechanism of the CoAP protocol. The safety method has the advantages as follows: finishing the secrecy transmission to a server node in a multicast group from the information while the broadcast authentication is realized, thereby enabling the server to extract the encryption information from an authenticated agent server, wherein other servers cannot receive the encryption information. By adopting the GDOI algorithm and a symmetric key mechanism in a sensor network, the Booleanarray mechanism is added in the agent server, and the security of the data communication is improved under the situation of guaranteeing the information transmission.

Description

technical field [0001] The invention belongs to the field of network technology, and relates to a security method for the CoAP (Constrained Application Protocol) protocol in the case of multicasting. Background technique [0002] Since many devices in the Internet of Things are resource-constrained, that is, only a small amount of memory space and limited computing power, the application of the traditional HTTP protocol on the Internet of Things is too large and inapplicable. The CoRE working group of the IETF proposed a CoAP protocol based on the REST architecture. CoAP is an application layer protocol in the 6LowPAN protocol stack. Based on the content, characteristics and interaction model of the CoAP protocol, this paper uses the Contiki embedded operating system on the uIPv6STARTKIT wireless network development kit to implement the CoAP protocol on the browser side and realizes CoAP with the client program written by myself. protocol, so that not only real-time data c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L9/0869H04L63/0884
Inventor 王浩马展王平李勇吴亚洲
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products