Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Access encryption verification method and device based on wi-sun network and electronic equipment

A wi-sun and verification method technology, applied in safety devices, electrical components, wireless communication, etc., can solve problems such as insufficient safety, and achieve the effect of improving safety and reducing safety risks

Pending Publication Date: 2022-04-22
FENGHUO COMM SCI & TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In wi-sun's edge network, under the condition of using a key-based security mechanism, a unified common key is usually used for the entire edge network, and the security is relatively insufficient; in the wi-sun's edge network, how to ensure that each Newly added nodes have reliable security in access authentication and interactive communication, and need to be designed in combination with the characteristics of the wi-sun network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access encryption verification method and device based on wi-sun network and electronic equipment
  • Access encryption verification method and device based on wi-sun network and electronic equipment
  • Access encryption verification method and device based on wi-sun network and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] In order to solve the problems existing in the existing technology, such as image 3 As shown, the present invention provides a kind of access encryption verification method based on wi-sun network, comprising:

[0043] Nodes in the entire edge network store a unified common key, which does not change.

[0044] The newly joined node and the root node of the edge network store an initialization independent key indexed by the MAC of the newly joined node, which is generated by the installer and injected into the newly joined node and the root node.

[0045] When a newly joined node joins the edge network, it uses a unified common key to encrypt the DIS message and decrypt the DIO message to determine the parent node of the newly joined node;

[0046] The root node sends the pre-stored initialization independent key with the MAC index of the newly added node to each node on the downlink path, including the parent node of the newly added node and the nodes on the uplink pa...

Embodiment 2

[0051] In the embodiment of the present invention, the new node access process is described in detail, including:

[0052] (1) It is necessary to store a unified general key and a special initialization independent key in the newly added node, and at the same time, enter the initialization independent key into the root node of the edge network, with the MAC value as the index.

[0053] Specifically, the nodes in the entire edge network store a unified common key, which does not change; the newly joined node and the root node of the edge network store an initial independent key indexed by the MAC of the newly joined node, and this key The key is generated by the installer and injected into the newly added node and the root node;

[0054] (2) When a newly joined node joins the edge network, it first encrypts the DIS message with the unified common key and sends it to its adjacent neighbor nodes; after the neighbor nodes receive the message, they use the same common key of the ed...

Embodiment 3

[0062] In the embodiment of the present invention, the process of node sending and receiving data is described in detail:

[0063] (1) When a node sends a message, it encrypts the application layer of the message with its own running independent key, and forwards it to the root node by the uplink route.

[0064] (2) After receiving the message, the root node finds the stored running independent key of the sender node according to the source IP of the message, and decrypts the application layer of the message.

[0065] (3) The root node analyzes the destination IP of the message. If it is in the edge network, it uses the corresponding destination IP as an index to find the running independent key of the receiving node, encrypts the application layer of the message, and then according to the downlink route It is sent to the destination node. After the destination node receives it, it finds that the destination IP is itself, and then uses the running independent key stored by its...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access encryption verification method based on a wi-sun network. The method comprises the following steps: nodes in a whole edge network have a unified universal key, and the key does not change; a unified universal key and a special initialized independent key are stored in the newly-added node, the initialized independent key is input into a root node of the edge network, and an MAC value is used as an index; and when the newly-added node is added into the edge network, encrypting the DIS message and decrypting the DIO message by adopting the unified universal key so as to determine a father node of the newly-added node. According to the invention, based on the message encryption mode of the unified key, the initialization of the independent key and the operation of the independent key, the security of the wi-sun network access is improved, and the possible security risk caused by the leakage of the unified key is reduced; in the two processes of access authentication, encryption authentication in different modes is adopted, and communication is carried out by adopting an independent key capable of periodically changing after access, so that the security of wi-sun network communication is improved. The invention further provides an access encryption verification device based on the wi-sun network and the electronic equipment.

Description

technical field [0001] The invention belongs to the technical field of power distribution data collection, and more specifically relates to a wi-sun network-based access encryption verification method, device and electronic equipment. Background technique [0002] Wi-sun Chinese translation is intelligent wireless network, which is a collective name for a series of standard wireless communication networks based on IEEE 802.15.4 as the underlying protocol. This standard mainly includes wi-sun FAN (Wireless Utility Field Area Network, wireless public terminal area network) And wi-sun HAN (Wireless Home Area Network, wireless home end area network), in which wi-sun HAN is mainly used in home application scenarios, using the central node and various devices in the home for one-to-one or one-to-many communication, wi-sun FAN is mainly used in outdoor scenes, and is mostly used in dense urban networks such as smart meters and smart street lights that require multi-hop transmission...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/08
CPCH04W12/03H04W12/08
Inventor 田路肖杰夏洪升骆立伟
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products