Pseudo random permutation based data encryption method in OPC UA edge computation

A technology of edge computing and encryption method, applied in digital transmission systems, secure communication devices, secure communication through chaotic signals, etc. It can solve problems such as small memory capacity, slow CPU speed, and limited power.

Inactive Publication Date: 2019-04-05
CHONGQING UNIV OF POSTS & TELECOMM
View PDF12 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, mobile devices have limited resources, such as limited power, slow CPU speed, small memory capacity, etc.,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo random permutation based data encryption method in OPC UA edge computation
  • Pseudo random permutation based data encryption method in OPC UA edge computation
  • Pseudo random permutation based data encryption method in OPC UA edge computation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0024] The technical scheme that the present invention solves the problems of the technologies described above is:

[0025] The present invention proposes a chaotic system-based pseudo-random permutation (PRPM) to realize lightweight encryption of data in edge computing of OPC UA, and mobile users need an encryption method to protect their data privacy. One of the encryption methods that can be considered a security method is the Advanced Encryption Standard (AES). However, mobile devices have limited resources, such as limited power, slow CPU speed, small memory capacity, etc., and it is impossible to use the AES encryption method for each file when each file needs to be uninstalled / downloaded. (Traditi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a pseudo random permutation (PRPM) based lightweight data encryption method in OPC UA edge computation, and belongs to the field of industrial data security. Lightweight dataencryption is realized in OPC UA edge computation based on PRPM in a chaotic system. A file is converted into a binary format, the file in the binary format is divided into segmented files, each segmented file includes multiple block files, blocks in each segmented file is scrambled by pseudo random arrangement, and all segmented block files are recombined to complete file encryption.

Description

technical field [0001] The invention belongs to the field of industrial data security, and in particular relates to a pseudo-random permutation (PRPM) based on a chaotic system to realize lightweight encryption of data in edge computing of OPC UA. Background technique [0002] With the rapid development of the Internet of Things technology, new service models and businesses such as the Industrial Internet continue to emerge. The number of sensor devices will show an explosive growth trend, followed by "massive" data generated by IoT terminals. According to the 2016 Cisco Cloud Index (GCI) forecast, by 2020, global data center traffic will reach 15.3ZB. At the same time, the number of IoT device connections has also shown a linear growth trend in recent years. According to the forecast of the Internet Business Solutions Group (IBSG), the number of IoT devices will reach 50 billion in 2020. Subsequently, the concept of "information perception" began to be gradually extended ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
CPCH04L9/001H04L2209/805
Inventor 罗志勇邓庆煌马国喜赵杰郑焕平韩冷蔡婷杨美美
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products