Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection communication method based on chaotic system, server and communication system

A chaotic system and communication method technology, applied in the field of communication, can solve the problems of user privacy security threats, low communication security, large storage space of communication parameters, etc., and achieve the effect of high key update efficiency and simple calculation

Active Publication Date: 2020-07-10
GUANGZHOU UNIVERSITY +1
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme stores two parameters, which are used for encryption and decryption and calculation of authentication codes respectively, and the parameters in the initialization phase are transmitted in plain text, which is easy to be obtained by attackers, resulting in leakage of user information, which will still pose a greater threat to user privacy and security. Therefore, this prior art solution has the problems of large storage space occupied by communication parameters and low communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection communication method based on chaotic system, server and communication system
  • Privacy protection communication method based on chaotic system, server and communication system
  • Privacy protection communication method based on chaotic system, server and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0123] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0124] see figure 1 A privacy protection communication method based on a chaotic system provided by the first embodiment of the present invention includes the following steps:

[0125] S101. Receive a communication request packet sent by the initiator device, and obtain an identifier of the initiator device from the communication request packet;

[0126] In the embodiment of the present invention, the initiator device ID belongs to communication parameters, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy protection communication method based on a chaotic system, a server and a communication system. The method comprises the following steps: receiving a communication request information packet sent by initiator equipment, searching corresponding chaotic system parameters and key values; verifying the verification code in the communication request information packet;after verification is passed, through the searched key value, decrypting the ciphertext in the communication request information packet; obtaining a recipient device identity, searching a chaotic system parameter and a key value corresponding to the receiver equipment; generating a chaotic system parameter and a key value for the session between the initiator device and the receiver device; calculating a first verification information packet and a second verification information packet, and sending the first verification packet to the initiator device to enable the initiator device and the receiver device to establish an encrypted session, and sending the second verification packet to the receiver device to enable the receiver device to send the communication establishment information packet to the initiator device. The method can save the storage space of the communication parameters and protect the privacy security of the user.

Description

technical field [0001] The invention belongs to the technical field of communication, and more specifically relates to a privacy protection communication method, server and communication system based on a chaotic system. Background technique [0002] IoT devices discover and use the resources and data provided by each other through communication. However, due to the limitations of device resources and other conditions, user data is mostly transmitted in clear text in unreliable channels, and attackers can easily intercept and tamper with user data. Causing user privacy information to be leaked and tampered with. To protect user privacy, an end-to-end encrypted transmission scheme can be used. [0003] The prior art proposes a communication protocol and an asynchronous key update scheme based on a chaotic system. Specifically, a Logistic map is used as the chaotic system, and its mapping formula is: x i+1 =μx i (1-x i ), where 1<μ≤4, 0<x i <1, i is a positive in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/32H04L29/06
CPCH04L9/001H04L9/3226H04L9/3297H04L63/0428H04L63/0876H04L63/083
Inventor 罗熙殷丽华李丹李超孙哲田志宏张伟哲张宾艾建文
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products