Method and system for enhancing MQTT protocol transmission security by using symmetric cryptographic technology

A protocol transmission, symmetric encryption technology, applied in transmission systems, digital transmission systems, key distribution, and can solve problems such as reduced security

Active Publication Date: 2021-11-09
中电信量子科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the technical solution of this patent application, data encryption mainly relies on channel encryption based on traditional public key certificates. As the frequency of use of data encryption passwords increases, the key is reused, and the security will also decrease with use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for enhancing MQTT protocol transmission security by using symmetric cryptographic technology
  • Method and system for enhancing MQTT protocol transmission security by using symmetric cryptographic technology
  • Method and system for enhancing MQTT protocol transmission security by using symmetric cryptographic technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Such as figure 1 and figure 2 As shown, this embodiment provides a method for using symmetric cryptography to enhance MQTT protocol transmission security, including data encryption and data decryption, and is applied in the MQTT protocol transmission system. The MQTT protocol transmission system includes a quantum random number generator, a quantum exchange Cipher machines, quantum key filling machines, quantum cryptography management service systems, IoT terminals, security chips, and IoT platforms. The security chip can be in the form of a SIM card or a USB flash drive, and is built-in or externally connected to an IoT terminal or a device module of an IoT terminal.

[0091] The Internet of Things terminal can be a publisher in the MQTT protocol, or a subscriber in the MQTT protocol. The IoT platform can be a broker in the MQTT protocol. During the process of IoT terminal accessing the IoT platform, the IoT platform needs to authenticate the IoT terminal. If the a...

Embodiment 2

[0148] This embodiment provides a method for using symmetric cryptography to enhance MQTT protocol transmission security, including data encryption and data decryption, and is applied to an Internet of Things terminal in an MQTT protocol transmission system. The structure of the MQTT protocol transmission system is the same as that of Embodiment 1.

[0149] The IoT terminal first uses the key in the quantum security chip to complete the platform login authentication to the IoT platform, obtains the login token, and then performs the following MQTT protocol transmission steps:

[0150] encrypt data;

[0151] IoT terminal to IoT platform (uplink): the quantum security chip obtains the filling of the quantum key provided by the quantum key filling machine;

[0152] After obtaining the login token, the Internet of Things terminal calls the key in the quantum security chip to complete the encryption of the reported message. SM4 can be used for encryption, and the encrypted informat...

Embodiment 3

[0165] This embodiment provides a method of using symmetric cryptography to enhance MQTT protocol transmission security, including data encryption and data decryption, and is applied to the Internet of Things platform of the MQTT protocol transmission system. The structure of the MQTT protocol transmission system is the same as that of Embodiment 1.

[0166] The IoT platform first completes the login authentication of the IoT terminal, and then performs the following MQTT protocol transmission steps:

[0167] encrypt data;

[0168] IoT platform to IoT terminal (downlink): The IoT platform applies for a key to the quantum password management service system according to the IoT terminal identification, and the quantum password management service system fills the information with the previous quantum security chip through the quantum exchange cipher machine, returns and The quantum security chip integrated in the quantum terminal has already filled the available key symmetric key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for enhancing MQTT protocol transmission security by using a symmetric cryptographic technology, and the method comprises the steps: carrying out the encryption and decryption of data: carrying out the encryption and decryption from an Internet of Things terminal to an Internet of Things platform, and carrying out the encryption and decryption from the Internet of Things platform to the Internet of Things terminal; in encryption and decryption, employing a quantum key filling machine for filling a symmetric key of a quantum security chip arranged in or outside the Internet of Things terminal and a key stored in a quantum exchange cipher machine, and enabling the quantum exchange cipher machine to record and store a corresponding relation between the filled quantum security chip and the key. The method has the advantages that the quantum key is used for protecting uplink and downlink information of the MQTT, and the problems that the key is reused in the transmission process of uplink and downlink information of the Internet of Things terminal, and the security is reduced along with use are solved by using a quantum security chip and a symmetric cryptographic technology.

Description

technical field [0001] The invention belongs to the field of security application products, in particular to a method for enhancing MQTT protocol transmission security using symmetric cryptography Background technique [0002] The MQTT (Message Queuing Telemetry Transport) protocol is a communication protocol based on the publish / subscribe model, which is built on the TCP / IP (Transmission Control Protocol / Internet Protocol) protocol superior. MQTT can provide real-time and reliable message services for connected terminals with less code and limited bandwidth. [0003] CN109525566A patent application discloses a LoRaWan data exchange method based on an enhanced MQTT message mechanism, which belongs to the technical field of the Internet of Things, establishes a LoRaWAN terminal and a LoRaWAN gateway at the perception layer, establishes a data core layer at the network layer, and establishes a data application at the application layer The management layer implements data int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/32
CPCH04L63/0435H04L63/0807H04L63/0876H04L63/126H04L67/12H04L9/0852H04L9/0869H04L9/3213H04L9/0877
Inventor 王丙磊胡缙王建礼
Owner 中电信量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products