Lightweight Internet of Things security key negotiation method based on edge computing

A security key and edge computing technology, which is applied in the field of Internet security, can solve the problems of unrealized decentralization, low security, and vulnerability to attacks, so as to reduce device storage and computing resources, reduce delays, and alleviate huge burdens Effect

Active Publication Date: 2020-12-11
JIANGSU ELECTRIC POWER CO +2
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when the number of nodes is large and there are many node authentication requests, the burden on the cloud platform is still large, and effective decentralization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight Internet of Things security key negotiation method based on edge computing
  • Lightweight Internet of Things security key negotiation method based on edge computing
  • Lightweight Internet of Things security key negotiation method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The application will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, but not to limit the protection scope of the present application.

[0046] Such as figure 1 As shown, the edge gateway-based cloud-edge-end collaborative authentication key agreement mechanism mainly includes three parts, namely, the IoT device end, the edge gateway, and the cloud center. In this architecture, the edge gateway acts as a bridge in the IoT network. By designing the edge gateway, devices can be better managed, and the tasks of identity authentication and key negotiation in the cloud are delegated to the edge gateway, which will greatly alleviate information congestion, service congestion under high concurrency, and delay problems. In the entire architecture, the edge gateway is directly connected downwards to each IoT device, and will perform identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A lightweight Internet of Things security key negotiation method based on edge computing comprises the following steps that 1, a cloud server performs bidirectional authentication on an edge gateway and authorizes the edge gateway, and the edge gateway obtains an authentication key negotiation permission for terminal equipment; 2, the edge gateway is responsible for security authentication and management of the Internet of Things equipment in the edge gateway local area network; 3, the terminal equipment and the edge gateway carry out bidirectional authentication and key negotiation, constructa secure channel to carry out encryption protection on subsequent transmission data, and transmit the subsequent transmission data to the edge gateway in a unified manner; 4, the edge gateway carriesout preliminary processing on the data transmitted by the terminal equipment; and 5, in the subsequent process, the cloud server and the edge gateway server transmit and process the equipment data together. According to the invention, lightweight and secure Internet of Things authentication key negotiation is realized, and the Internet of Things network data transmission security is ensured.

Description

technical field [0001] The invention belongs to the technical field of Internet security, and more specifically relates to a lightweight Internet of Things security key negotiation method based on edge computing. Background technique [0002] With the rapid development of information technology, Internet of Things (IoT-Internet of Things) technology has been integrated into all aspects of life. The intelligent network of people, things and things formed by the Internet of Things has greatly promoted the development of intelligence in various fields. But at the same time, the access of a large number of devices and the exchange of a large amount of information also bring new security challenges. Due to the huge number of devices and limited device resources in the Internet of Things environment, traditional security protocols are too complex and the resource overhead of computing, storage, and communication is too large to meet the needs. Moreover, the current cloud-centric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L63/0869H04L63/06H04L67/12H04L63/123H04L9/0838
Inventor 陈冰冰刘强周俊夏伟栋邹明翰邵苏杰辛辰许洪华李易王徐延吴冠儒沙莉张庆航
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products