Attribute-based verifiable outsourcing and revocable Internet of Things security communication method

A technology of attribute support and secure communication, applied to secure communication devices and key distribution, can solve the problems of high security authorization overhead, fast consumption of IoT resources, and inability to verify node identities, so as to reduce the cost of key distribution and storage, The effect of reducing computational overhead

Inactive Publication Date: 2020-05-08
THE 22ND RES INST OF CHINA ELECTRONICS TECH GROUP CORP
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

IoT applications urgently need a communication mode that supports one-to-many, thereby reducing the huge overhead of encrypting data bands for each user. Traditional encryption mechanisms based on public key infrastructure can protect data confidentiality, but there are several major flaws : First, the cost of security authorization for a single node of the Internet of Things is relatively large, and security certificates need to be generated one by one, otherwise the identity of the node cannot be verified; second, the computing power of the nodes of the Internet of Things is limited, and the use of public key encryption requires large-scale calculations, which will cause the Internet of Things Node computing load is too large, resulting in excessive consumption of IoT resources
The third is that the node deployment in the Internet of Things system has a time-space correlation, which cannot avoid being physically copied and stolen. The existing mechanism is difficult to eliminate the secure communication after the node is destroyed.
[0003] In summary, the problems existing in the existing technology are: the traditional public key encryption method is not suitable for large-scale Internet of Things device encryption, and the basic ABE encryption and decryption has high computational complexity, and it is difficult to dynamically revoke user permissions, which makes it difficult to adapt IoT environment
[0004] Difficulty in solving the above technical problems: Internet of Things applications urgently need a communication mode that supports one-to-many to solve the difficulty of large-scale secure communication, and need to solve the problem of insufficient computing power of IoT devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based verifiable outsourcing and revocable Internet of Things security communication method
  • Attribute-based verifiable outsourcing and revocable Internet of Things security communication method
  • Attribute-based verifiable outsourcing and revocable Internet of Things security communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] Aiming at the problems existing in the prior art, the present invention provides an attribute-based Internet of Things security communication method that supports verifiable outsourcing and revocation. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] like figure 1 As shown, the attribute-based Internet of Things security communication method that supports verifiable outsourcing and revocation provided by the embodiment of the present invention includes the following steps:

[0031] S101: System initialization, generating public parameters and master keys; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of attribute encryption, and discloses an attribute-based verifiable outsourcing and revocable Internet of Things security communication method. The methodcomprises the following steps: a system is initialized; an authorization center allocates an attribute set to a data user and generates a key required by decryption for the data user; an Internet ofThings node symmetrically encrypts the data; the Internet of Things node encrypts the symmetric key by using attribute-based encryption; the data user sends a data access request to the Internet of Things platform and decrypts the data; and the Internet of Things platform cancels a specific user in the system. The method has the advantages of low equipment calculation overhead, verifiable outsourcing calculation, resistance to collusion attacks of malicious auxiliary nodes, support of dynamic permission management of the system and the like, and can be used for solving the problems of batch access control, huge number of keys, limited equipment resources and the like in the application of the Internet of Things. The lightweight security communication method is realized, and a revocable function of the key is realized.

Description

technical field [0001] The invention belongs to the technical field of attribute encryption, and in particular relates to an attribute-based secure communication method for the Internet of Things that supports verifiable outsourcing and revocation. Background technique [0002] Currently, the closest existing technology: the Internet of Things (IoT) has set off one of the largest technological waves in recent decades. An estimated 50 billion devices will be interconnected by 2020, forming a network that potentially covers everything around us. The Internet of Things will affect billions of people across industrial, commercial, medical, automotive and other applications. The Internet of Things is developing so fast that a large number of data objects will be generated, however, since IoT devices need to send sensitive data to the cloud, security measures must be considered to control access to the data, and it is also necessary to ensure the confidentiality of the data durin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/08G16Y30/10
CPCH04L9/0819H04L9/0825H04L9/0869H04L67/12
Inventor 张涛宋雄飞沈玉龙秦睿阳祝幸辉何英杰杨书华
Owner THE 22ND RES INST OF CHINA ELECTRONICS TECH GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products