Dynamic encryption method for Internet of Things device based on login serial number

An Internet of Things device and dynamic encryption technology, applied in the field of Internet of Things and data security, can solve the problems of low computing power, high processor computing speed and storage resource requirements, increasing the risk of key cracking, etc. The effect of low demand for and computing power, increasing the difficulty of cracking, and increasing the cost of cracking

Active Publication Date: 2019-02-19
TAIHUA WISDOM IND GRP CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Due to limited equipment resources, it is difficult to apply complex algorithms
[0005] In traditional Internet communication, secure transport layer protocols such as SSL / TLS are usually used to implement data encryption to ensure data security, but secure transport layer protocols such as SSL / TLS often rely on asymmetric encryption algorithms such as RSA, which affects the computing speed of the processor. and high storage resource requirements
Due to its low cost and low power consumption, IoT devices usually use embedded microcontrollers with relatively low computing power and relatively tight storage resources as the main control chip, which makes it difficult to implement complex asymmetric encryption algorithms.
Therefore, it is difficult to directly apply the secure transmission protocols in the traditional Internet to IoT devices.
[0006] 2. The symmetric encryption method based on the static key has relatively low security
This method uses a symmetric encryption algorithm with less resource consumption and does not require dynamic key negotiation, which is convenient for application in embedded microcontrollers. However, the same static key is always used, and long-term use will increase the risk of the key being cracked. Effective defense against replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic encryption method for Internet of Things device based on login serial number
  • Dynamic encryption method for Internet of Things device based on login serial number
  • Dynamic encryption method for Internet of Things device based on login serial number

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0059] see figure 1 Shown is a specific embodiment of the method for dynamically encrypting Internet of Things devices based on the login serial number described in this application, and the method includes:

[0060] Step 101, the IoT device generates a first dynamic key:

[0061] The IoT device performs a one-way hash operation on the static key K and the login serial number L of the IoT device. The one-way hash operation includes the MD5 one-way hash algorithm and the SHA one-way hash algorithm to obtain the first Dynamic HMAC key HK, the one-way hash algorithm is not limited to MD5 one-way hash algorithm and SHA one-way hash algorithm, and can also include other one-way hash algorithms;

[0062] Utilize the dynamic HMAC key as the key of the HMAC algorithm to perform the HMAC operation on the static key K and the login serial number L of the IoT device, and use the operation result as the first dynamic encryption key EK;

[0063] The first dynamic key includes: the first ...

Embodiment 2

[0084] The present application provides another embodiment of a method for dynamically encrypting an IoT device based on a login serial number, and the method includes:

[0085] Step 201, the IoT device generates a first dynamic key:

[0086] The Internet of Things device performs a one-way hash operation on the static key K and the login sequence number L of the Internet of Things device. The one-way hash operation includes the MD5 one-way hash algorithm and the SHA one-way hash algorithm to obtain the first dynamic HMAC key HK, the one-way hash algorithm is not limited to MD5 one-way hash algorithm and SHA one-way hash algorithm, and can also include other one-way hash algorithms;

[0087] Utilize the dynamic HMAC key as the key of the HMAC algorithm to perform the HMAC operation on the static key K and the login serial number L of the IoT device, and use the operation result as the first dynamic encryption key EK;

[0088] The first dynamic key includes: the first dynamic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a dynamic encryption method for an Internet of Things device based on a login serial number. The method includes steps: the Internet of Things device generates a first dynamic secret key; the Internet of Things device encrypts a login message by employing the generated first dynamic secret key and obtains an encrypted login message; the Internet of Things device transmitsthe encrypted login message to an Internet of Things platform; the Internet of Things platform receives and verifies the encrypted login message, and generates a login reply message after verification; the Internet of Things platform transmits the login reply message to the Internet of Things device; the Internet of Things device receives and verifies the login reply message; and bidirectional identity authentication of the Internet of Things device and the Internet of Things platform is successful, and the Internet of Things platform and the Internet of Things device mutually transmit ordinary data messages. According to the method, the pseudo-random dynamic secret key is generated through a static secret key and the login serial number of the Internet of Things device, and the securityof communication between the Internet of Things device and the Internet of Things platform is improved.

Description

technical field [0001] The present invention relates to the technical field of Internet of Things and data security, and more specifically, relates to a dynamic encryption method of an Internet of Things device based on a login serial number. Background technique [0002] The Internet of Things is a highly integrated and comprehensive application of the new generation of information technology, which is of great significance to the new round of industrial transformation and the green, intelligent and sustainable development of the economy and society. Because of its huge growth potential, it has become the strategic commanding heights of today's economic development and technological innovation, and has become the forerunner for various countries to build new social models and reshape the country's long-term competitiveness. At present, with the rapid development of the Internet of Things technology, the ecological circle is becoming more and more perfect, the application fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0861H04L9/0866H04L9/3239H04L63/08H04L63/0807H04L63/0869
Inventor 郝敬全孙文健王淑平马述杰
Owner TAIHUA WISDOM IND GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products