Supercharge Your Innovation With Domain-Expert AI Agents!

MQTT protocol security communication method based on secret sharing algorithm

A secret sharing and protocol security technology, applied in the field of computer security, can solve problems such as low efficiency, unsuitable information security transmission, and heavy computing load, so as to improve authentication efficiency, improve communication efficiency, and reduce complexity and load.

Active Publication Date: 2022-05-13
上海蓝长自动化科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve these problems, the current MQTT data transmission process can use the encrypted TLS protocol to protect the communication channel between the client and the agent. There are several problems in this method: (1) cannot provide access login control, such as for the agent and the agent Medium and fine-grained topic security access control; (2) TLS has a large computational load, resulting in low efficiency, and is not suitable for secure information transmission in a large number of devices such as one-to-many scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MQTT protocol security communication method based on secret sharing algorithm
  • MQTT protocol security communication method based on secret sharing algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0040] A one-to-many secure communication method for MQTT protocol based on a secret sharing algorithm, comprising the following steps:

[0041] Step 1: A third-party certification authority (CA) generates certificates for users, devices, agents, and subjects.

[0042] Step 1-1: Enter the ID number X of the user, device and agent to generate R X =r X G, where r X ∈R[1,n-1], G is the generator. CA pick r CA ∈R[1,n-1], generate R CA =r CA G, the final calculation output Cert X =R X +R CA .

[0043] Enter the topic ID number Topic t , CA calculates Cert t (l) =r t (1) ·G+r CA (1) ·G=R t (l) +R CA (1) , where Cert t (l) certificate for the l-th subject, r t (1) ∈R[1,n-1], r CA (1) ∈R[1,n-1]. Next, the CA calculates the private key d of the l-th subject t (l) =w t (l) +r t (l) ·H(Cert t (l) ||Topic t ), where w ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an MQTT protocol secure communication method based on a secret sharing algorithm, and aims at a scene that a user and multiple devices in an MQTT protocol communicate through the same theme in the MQTT, a threshold encryption algorithm based on secret sharing is utilized to complete one-to-many group authentication, so that the devices are accessed securely, and the security of the MQTT protocol is improved. And finally, the sent message is encrypted to realize secure communication between the user and the equipment. According to the method, firstly, a user and an agent are subjected to one-to-one authentication, then group authentication of multiple devices and the agent is completed through secret sharing, the user, the multiple devices and a common theme which pass authentication are bound to establish a secure channel, and finally key negotiation is performed among the user, the devices and the theme to complete encryption of sent information. And thus, secure communication of the MQTT protocol is completed. The method provided by the invention can be applied to a one-to-many secure communication scene in the MQTT protocol.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an MQTT protocol security communication method based on a secret sharing algorithm. Background technique [0002] Among the many IoT communication protocols, the MQTT (Message Queuing Telemetry Transport) protocol is the most popular. It was designed to provide a lightweight and easy-to-use communication protocol for IoT, so the protocol itself has only a few security mechanisms explicitly specified, and it lacks basic security-related features such as access control, mutual authentication, and control message security. In order to solve these problems, the current MQTT data transmission process can use the encrypted TLS protocol to protect the communication channel between the client and the agent. This method has several problems: (1) It cannot provide access login control, such as for agents and agents Medium and fine-grained topic security access control; (2) TLS's...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/32H04L9/30H04L9/08
CPCH04L63/0442H04L63/0823H04L9/085H04L9/0838H04L9/3263H04L9/30Y02D30/70
Inventor 李庆铁熊迎军李靖任守纲李延斌顾兴健邵天岳
Owner 上海蓝长自动化科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More