Security hybrid encryption method based on narrowband Internet of Things

A narrowband Internet of Things and hybrid encryption technology, applied in the field of secure hybrid encryption based on the narrowband Internet of Things, can solve the problems that the initial source is vulnerable to manual exposure, increase costs, and consume huge amounts of money, optimize manual key perfusion, and reduce authentication time. , the effect of reducing computational consumption

Active Publication Date: 2020-08-14
SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) The method for the receiving parties to confirm each other’s identity: the traditional method is that both parties issue digital certificates separately by a reliable organization. This method is applicable if it is applied in a small-scale Internet of Things, but if it is applied in NB-IoT, it will cost a lot, usually The number of NB-IoT terminals is tens of thousands or millions. If you ask a reliable organization to issue digital certificates to them one by one, it will not only take a lot of time and effort but also increase a lot of costs, and digital certificates are often used in the communication process. Asymmetric communication will consume a lot of chip computing power and power consumption
[0006] 2) The danger of artificial key infusion: Many NB-IoT security chips require manual key infusion in the first step of initialization. transfer
But the danger of this method is the direct exposure of the initial key. Even if the algorithm uses the initial key, the hash algorithm or several other mathematical algorithms will be operated to reorganize the initial key. However, due to the initial The source is extremely vulnerable to the risk of artificial exposure, even if the hash algorithm is an irreversible algorithm, it will not bring any increase in security, and the security algorithm is not based on avoiding algorithm exposure to ensure its security, but Safety is guaranteed based on mathematical incomprehension, so if artificial perfusion is used, it will increase a lot of risks at the source for the entire safety mechanism
[0007] 3) Facing the challenge of side-channel attacks: In the information transmission of NB-IoT, the transmission of short messages and the same state information is often used, and the most common energy analysis attack in side-channel attacks is that a large number of collection terminals are sending The energy consumption information of the same plaintext and the same key is used, and then statistical analysis is performed. This attack method is quite dangerous for the information transmission of NB-IoT
If this scheme is applied to NB-IoT, it is very easy to face the energy analysis attack of side channel attack, and if the key transfer uses ECC (asymmetric encryption algorithm) every time, it will still bring time and calculation energy consumption, and if it is applied The application of NB-IoT will face the issue of digital certificate issuance for a large number of devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security hybrid encryption method based on narrowband Internet of Things
  • Security hybrid encryption method based on narrowband Internet of Things
  • Security hybrid encryption method based on narrowband Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Below in conjunction with specific embodiment, further illustrate the present invention. It should be understood that these examples are only for illustrating the present invention and do not limit the scope of the present invention. In addition, it should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.

[0040] Such as figure 1 As shown, it is a safe hybrid encryption method based on narrowband Internet of Things according to an embodiment of the present invention, which adopts lightweight identity authentication and a dynamic symmetric encryption and decryption algorithm based on a salt variable parameter algorithm, including the following steps:

[0041] Step S1: Perform light-weight identity authentication on each terminal and server. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security hybrid encryption method based on narrowband Internet of Things, which comprises the following steps of carrying out lightweight identity authentication on each terminal and a server, and realizing the identity authentication of the terminal and the transmission of an initial key and an initial IV vector by using unidirectional asymmetric encryption in the lightweight identity authentication, and after the identity authentication of the terminal succeeds, performing encryption communication between the terminal and the server by adopting a dynamic symmetric encryption and decryption algorithm, so that the symmetric encryption and decryption algorithm uses different symmetric keys and different structural parameters in each time of encryption communicationof each terminal. Lightweight identity recognition is adopted; on the basis of ensuring the security, the authentication time and the calculation consumption are greatly reduced, a dynamic symmetric encryption and decryption algorithm is adopted, a symmetric key and a set of structural parameters are ensured to be set at a time, the structural parameters of the algorithm are changed in a nonlinearmode under the condition that the large structure is not changed, and the capacity of the algorithm for resisting side channel attacks such as energy analysis is improved.

Description

technical field [0001] The invention relates to the technical field of information security in the narrowband Internet of Things, in particular to a secure hybrid encryption method based on the narrowband Internet of Things. Background technique [0002] The characteristics of Narrow Band Internet of Things (NB-IoT) can be divided into four categories. The first category is wide coverage: NB-IoT only consumes about 180kHz of bandwidth, and NB-IoT is comparable to existing Some networks have a gain of about 20dB, which is equivalent to a 100-fold increase in coverage; the second category is strong connection capability: one sector can support 100,000 connections; the third category is low power consumption: generally requires NB-IoT terminal modules can stand by for more than 10 years; the fourth category is low cost: lower costs can be achieved after industrial production. Due to the above advantages of NB-IoT, it is more suitable for remote meter reading, asset tracking, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L9/14H04L29/08
CPCH04L9/0643H04L9/0866H04L9/0869H04L9/0891H04L9/14H04L63/045H04L63/0876H04L67/12
Inventor 田宇涵王浩文王勇桂云松谢建国刘韡烨孙平山
Owner SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products