Unlock instant, AI-driven research and patent intelligence for your innovation.

Mesh network encryption scheme based on non-public encryption algorithm

An encryption algorithm and encryption scheme technology, applied in security devices, electrical components, transmission systems, etc., can solve problems such as poor confidentiality of key data

Pending Publication Date: 2019-09-20
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +2
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, AES (Advanced Encryption Standard) is essentially a symmetric block cipher system, which belongs to the public encryption algorithm, so the confidentiality effect on key data is still relatively poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mesh network encryption scheme based on non-public encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0016] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0017] The non-public encryption algorithm is introduced into the mesh two-layer encryption to further protect the core application data. Since the non-public encryption algorithm is not disclosed, it usually only exists in the chip in the form of IP, so the confidentiality effect is better than that of the AES algorithm.

[0018] In order to ensure the versatility and coverage of the Mesh network, the encryption and decry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mesh network encryption scheme based on a non-public encryption algorithm. Data are encrypted and decrypted by using a network secret key and an application secret key two-stage secret key, the network secret key encrypts and decrypts the data on a network layer by using an AES algorithm, and the application secret key encrypts and decrypts the data on an upper transmission layer by using two encryption and decryption algorithms, namely the AES algorithm and a non-public encryption algorithm. According to the mesh network encryption scheme based on the non-public encryption algorithm, in order to ensure the universality and the coverage range of the mesh network, the encryption and decryption of the network secret key of the network layer keep the traditional mode unchanged, and the AES-needs to be supported by the application secret key of the upper transmission layer; the two encryption and decryption algorithms, namely the CCM algorithm and the non-public encryption algorithm, are used for further protecting the core application data by introducing the non-public encryption algorithm into the two-layer encryption of the mesh, and as the non-public encryption algorithm is not public, the non-public encryption algorithm generally exists in a chip in an IP form, the confidentiality effect is better than that of an AES algorithm.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a mesh network encryption scheme based on a non-public encryption algorithm. Background technique [0002] Mesh is a many-to-many networking method based on BLE, and it is a flooding network for data transmission through BLE broadcast. Standard BLE uses data encryption during communication, and its encryption is performed on link layer data after the connection is established. Since mesh transmits data based on BLE broadcast, mesh cannot use the original encryption method of BLE. [0003] Mesh has its own set of encryption and decryption mechanisms. Mesh uses two levels of keys to encrypt and decrypt data, namely the network key (NetKey) and the application key (AppKey). The network key is encrypted and decrypted on the network layer. The same mesh network uses the same network key. Each node (Node) in the network has the right to process the data packets of the network l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04L29/06H04W12/03
CPCH04W12/009H04L63/045H04W12/03
Inventor 张宁唐晓柯金鑫冯文楠冯曦杨季陈永利
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY