Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data security storage system and method suitable for resource-constrained network node

A technology for data security storage and network nodes, applied in the field of data security storage systems, can solve problems such as lack of effective security solutions and difficult implementation of traditional technologies, and achieve the effects of less memory, less network resources, and low computing power

Active Publication Date: 2019-04-26
绍兴心越科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For IoT / sensing network nodes with extremely limited resources, the traditional technologies mentioned above are difficult to implement due to limitations in cost, power consumption, computing power, etc.
At present, there is no effective security scheme for sensitive data storage of IoT / wireless sensor network nodes with limited resources (computing, memory, power consumption, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security storage system and method suitable for resource-constrained network node
  • Data security storage system and method suitable for resource-constrained network node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] This embodiment discloses a data security storage method applicable to resource-constrained Internet of Things / wireless sensor network nodes, which is mainly realized by two subsystems, one is the self-generation subsystem of the data key locked by the device and the key decryption function (For simplicity, hereinafter referred to as "self-generated subsystem"), the other is the sensitive data encryption and decryption subsystem. The specific implementation of the method for safe data storage will be described below in conjunction with the operating processes of these two subsystems.

[0026] The function of the "self-generation subsystem" is to read the identification information of the node device, and generate the sensitive data encryption and decryption key locked to the specific node device and the key decryption function to protect the key required for secure storage of data. Since the keys and decryption functions generated by this subsystem have high requirement...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data security storage method suitable for a resource-constrained network node. Namely, a device identification list is established when a node device is started for the first time, and identification information of the node device is acquired; a device key of the node is generated according to the identification information of the device, and the device key is mixed andhidden in a code to generate a decryption function contained in the device key, wherein the decryption function contained in the device key is stored in the node device; meanwhile, a data key of the node is generated, and the data key is encrypted through the identification information of the node device and the generated device key, wherein the encrypted data key and the identification list are stored in the node device; the stored identification list and encrypted data key are read, and the decryption function contained in the device key is called to decrypt the encrypted data key; and sensitive data is encrypted (decrypted) by using the decrypted data key and an encryption (decryption) algorithm. Few resources are required; the sensitive data is high in storage security; and white box attack can be resisted.

Description

technical field [0001] The invention relates to the field of network information processing security, in particular to a data security storage system and method suitable for resource-limited network nodes. Background technique [0002] In recent years, the rapid development of the Internet of Things has attracted widespread attention from all walks of life, and will completely change our lives in the near future. Low-cost, low-power and low-speed wireless sensor networks are an important part and key enabler of the Internet of Things, which can well solve the two key issues that hinder large-scale deployment of the Internet of Things, cost and energy consumption. Thousands of intelligent sensing or control nodes are connected to each other through a wireless sensor network to transmit sensing / monitoring information or control instructions. Massive wireless sensor network nodes often have low cost and low power consumption requirements, and computing and memory resources are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04L9/08H04L29/06H04W12/03H04W12/041
CPCH04L9/0866H04L63/0435H04W12/02H04W12/04H04L2209/16
Inventor 余挺娄大富王志鹏
Owner 绍兴心越科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More