CN106411916A - Internet of things security group communication method - Google Patents
Internet of things security group communication method Download PDFInfo
- Publication number
- CN106411916A CN106411916A CN201610921875.4A CN201610921875A CN106411916A CN 106411916 A CN106411916 A CN 106411916A CN 201610921875 A CN201610921875 A CN 201610921875A CN 106411916 A CN106411916 A CN 106411916A
- Authority
- CN
- China
- Prior art keywords
- group
- key
- internet
- things
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Abstract
The invention relates to the field of internet of things, and particularly relates to an internet of things security group communication method comprising the steps that group key agreement of an internet of things security group is performed based on a Hash function and a key tree so that each member of the internet of things security group is enabled to acquire the respectively shared group key; a verification key is arranged in each member so as to be convenient for verification before communication; and communication is performed between all the members in the internet of things security group based on the shared group key and the group key is managed. Agreement communication of the group key can be realized and rapid and efficient updating of the group key can also be guaranteed, and the verification key is adopted so that the flexibility and the security of internet of things security group communication can be enhanced.
Description
Technical field
The present invention relates to Internet of Things field, more particularly, to a kind of Internet of Things Secure Group Communication method.
Background technology
Internet of Things is the important component part of generation information technology, as the term suggests, Internet of Things is exactly that " it is mutual that thing thing is connected
Networking ", this has two-layer to look like:First, it is so internet that the core of Internet of Things is appointed with basis, is the extension on Internet basic
Network with extension;Second, its user side extends and extend between any object and object, enters row information and exchanges and logical
Letter, therefore, the definition of Internet of Things is:By information such as RF identification, infrared inductor, global positioning system, laser scanners
Sensing equipment, by the agreement of agreement, is connected any object with internet, enters row information and exchanges and communicate, to realize to thing
The Weigh sensor of body, positioning, a kind of network of tracking, monitoring and management.
Constantly popularize with application with research in every field for the Internet of Things, the Secure Group Communication of Internet of Things is increasingly becoming
One important study hotspot, the network of an Internet of Things interconnects, and information sharing, network node are generally spread in each position
Put, these nodes from forming net, by information while collecting, while transmit, side is merged, and provides the service of " taking what one needs ", due to together
Meshed network in one region is likely to carry out group communication (multicast), but these packet communications are requirement safe practices props up
Support is used as organizing communication support, from existing correlation technique, the most of group key management frame adopting of current Secure Group Communication
Frame, expense is relatively large, flexibility ratio shortcoming, cannot the effective internal malicious node of prevention group destruction.
Content of the invention
It is an object of the invention to proposing a kind of Internet of Things Secure Group Communication method, it is possible to increase Internet of Things Secure Group Communication
Flexibility and security.
For reaching this purpose, the present invention employs the following technical solutions:
A kind of Internet of Things Secure Group Communication method, including:
Carry out the negotiation of the group key of Internet of Things secure group based on hash function and key tree, make described Internet of Things secure group
In each group member obtain each share group key;
Authentication secret is set in each group member, in order to the checking before communicating;
Communicated and managed based on described shared group key between each group member in described Internet of Things secure group
Described group key.
Wherein, the negotiation of the described group key carrying out Internet of Things secure group based on hash function and key tree, makes described thing
The step that each group member in networking secure group obtains the group key each shared includes:
Held consultation based on key tree mechanism between each group member in described Internet of Things secure group, obtain shared group close
Key;
Calculated according to hash function for each group member and obtain and store log2(n) individual group key.
Wherein, communicated based on described shared group key between each group member in described Internet of Things secure group
Step includes:
By communication information after broadcast is encrypted through described shared key in group for the described group member;
After other group members in group receive described communication information, solved by shared key by this other group member
Close, obtain the information in described communication information.
Wherein, the step managing described group key between each group member in described Internet of Things secure group includes:
Carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, by described abnormal section
Point puts into blacklist, and updates described key tree.
Wherein, carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, will be described different
Chang Jiedian puts into blacklist, and updates the step of described key tree and include:
Set up a group header as the coordinator of key management in each group;
The ballot of the neighbor node to this group membership is periodically sent from each group member to described group of header;
Judge whether described neighbor node has abnormal behaviour;
If so, then described this neighbor node having abnormal behaviour is added blacklist, and transfer to described group of header record
The abnormal behaviour of this group membership;
Restart a wheel group key management by described group of header to operate, but the described node having abnormal behaviour is excluded
Outside.
Wherein, judge whether described neighbor node has the step of abnormal behaviour to include:
One abnormality degree is all set to all group nodes by described group of header;
Voted to described group of header from each node, when the abnormality degree of certain node is more than given threshold, then judge this
Node is the node having abnormal behaviour.
Wherein, the step managing described group key between each group member in described Internet of Things secure group also includes:
Add to come in or the node that leaves for any, carry out hash function computing, update from described node to described close
All intermediate key on the path of the root of key tree, generate new key.
Beneficial effects of the present invention are:A kind of Internet of Things Secure Group Communication method, including:Based on hash function and key tree
Carry out the negotiation of the group key of Internet of Things secure group, make each group member in described Internet of Things secure group obtain the group each shared
Key;Authentication secret is set in each group member, in order to the checking before communicating;Each group in described Internet of Things secure group
Communicated based on described shared group key between member and managed described group key, the present invention had both been enabled the negotiation of group key
Communication, can guarantee that the renewal realizing group key rapidly and efficiently again, and adopts authentication secret, improve Internet of Things Secure Group Communication
Flexibility and security.
Brief description
Fig. 1 is a kind of Internet of Things Secure Group Communication method flow diagram that the specific embodiment of the invention provides.
Specific embodiment
Further illustrate technical scheme with reference to Fig. 1 and by specific embodiment.
Fig. 1 is a kind of Internet of Things Secure Group Communication method flow diagram that the specific embodiment of the invention provides.
A kind of Internet of Things Secure Group Communication method, including:
Carry out the negotiation of the group key of Internet of Things secure group based on hash function and key tree, make described Internet of Things secure group
In each group member obtain each share group key;
Authentication secret is set in each group member, in order to the checking before communicating;
Communicated and managed based on described shared group key between each group member in described Internet of Things secure group
Described group key.
In the present embodiment, both enable the negotiation communication of group key, can guarantee that group key of realizing rapidly and efficiently again
Update, and adopt authentication secret, improve flexibility and the security of Internet of Things Secure Group Communication.
In the present embodiment, the negotiation of the described group key carrying out Internet of Things secure group based on hash function and key tree,
The step that each group member in described Internet of Things secure group obtains the group key each shared is made to include:
Held consultation based on key tree mechanism between each group member in described Internet of Things secure group, obtain shared group close
Key;
Calculated according to hash function for each group member and obtain and store log2(n) individual group key.
In the present embodiment, entered based on described shared group key between each group member in described Internet of Things secure group
The step of row communication includes:
By communication information after broadcast is encrypted through described shared key in group for the described group member;
After other group members in group receive described communication information, solved by shared key by this other group member
Close, obtain the information in described communication information.
In the present embodiment, manage the step bag of described group key between each group member in described Internet of Things secure group
Include:
Carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, by described abnormal section
Point puts into blacklist, and updates described key tree.
In the present embodiment, carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected,
Described abnormal nodes are put into blacklist, and updates the step of described key tree and include:
Set up a group header as the coordinator of key management in each group;
The ballot of the neighbor node to this group membership is periodically sent from each group member to described group of header;
Judge whether described neighbor node has abnormal behaviour;
If so, then described this neighbor node having abnormal behaviour is added blacklist, and transfer to described group of header record
The abnormal behaviour of this group membership;
Restart a wheel group key management by described group of header to operate, but the described node having abnormal behaviour is excluded
Outside.
In the present embodiment, judge whether described neighbor node has the step of abnormal behaviour to include:
One abnormality degree is all set to all group nodes by described group of header;
Voted to described group of header from each node, when the abnormality degree of certain node is more than given threshold, then judge this
Node is the node having abnormal behaviour.
In the present embodiment, the step managing described group key between each group member in described Internet of Things secure group is also
Including:
Add to come in or the node that leaves for any, carry out hash function computing, update from described node to described close
All intermediate key on the path of the root of key tree, generate new key.
The foregoing is only the specific embodiment of the present invention, these descriptions are intended merely to explain the principle of the present invention, and
Limiting the scope of the invention can not be construed to by any way.Based on explanation herein, those skilled in the art is not
Need to pay other specific implementation methods that performing creative labour can associate the present invention, these modes fall within the present invention
Protection domain within.
Claims (7)
1. a kind of Internet of Things Secure Group Communication method is it is characterised in that include:
Carry out the negotiation of the group key of Internet of Things secure group based on hash function and key tree, make in described Internet of Things secure group
Each group member obtains the group key each shared;
Authentication secret is set in each group member, in order to the checking before communicating;
Communicated based on described shared group key and managed described between each group member in described Internet of Things secure group
Group key.
2. a kind of Internet of Things Secure Group Communication method according to claim 1 it is characterised in that described based on hash function
Carry out the negotiation of the group key of Internet of Things secure group with key tree, so that each group member in described Internet of Things secure group is obtained each
The step of shared group key includes:
Held consultation based on key tree mechanism between each group member in described Internet of Things secure group, obtain shared group key;
Calculated according to hash function for each group member and obtain and store log2(n) individual group key.
3. a kind of Internet of Things Secure Group Communication method according to claim 1 is it is characterised in that in described Internet of Things safety
Included based on the step that described shared group key is communicated between each group member in group:
By communication information after broadcast is encrypted through described shared key in group for the described group member;
After other group members in group receive described communication information, it is decrypted by shared key by this other group member, obtains
Take the information in described communication information.
4. a kind of Internet of Things Secure Group Communication method according to claim 1 is it is characterised in that in described Internet of Things safety
The step managing described group key between each group member in group includes:
Carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, described abnormal nodes are put
Enter blacklist, and update described key tree.
5. a kind of Internet of Things Secure Group Communication method according to claim 4 is it is characterised in that in described Internet of Things safety
Carry out detection of anomaly node in group;When abnormal nodes is detected, described abnormal nodes are put into blacklist, and update described close
The step of key tree includes:
Set up a group header as the coordinator of key management in each group;
The ballot of the neighbor node to this group membership is periodically sent from each group member to described group of header;
Judge whether described neighbor node has abnormal behaviour;
If so, then described this neighbor node having abnormal behaviour is added blacklist, and transfer to described group of header minute book group
The abnormal behaviour of member;
Restart a wheel group key management by described group of header to operate, but the described node having abnormal behaviour is excluded
Outward.
6. a kind of Internet of Things Secure Group Communication method according to claim 5 is it is characterised in that judge described neighbor node
The step whether having abnormal behaviour includes:
One abnormality degree is all set to all group nodes by described group of header;
Voted to described group of header from each node, when the abnormality degree of certain node is more than given threshold, then judge this node
For there being the node of abnormal behaviour.
7. a kind of Internet of Things Secure Group Communication method according to claim 1 is it is characterised in that in described Internet of Things safety
The step managing described group key between each group member in group also includes:
For any node adding to come in or leaving, carry out hash function computing, update from described node to described key tree
The path of root on all intermediate key, generate new key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610921875.4A CN106411916A (en) | 2016-10-21 | 2016-10-21 | Internet of things security group communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610921875.4A CN106411916A (en) | 2016-10-21 | 2016-10-21 | Internet of things security group communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106411916A true CN106411916A (en) | 2017-02-15 |
Family
ID=58013453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610921875.4A Withdrawn CN106411916A (en) | 2016-10-21 | 2016-10-21 | Internet of things security group communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106411916A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108259185A (en) * | 2018-01-26 | 2018-07-06 | 湖北工业大学 | A kind of group key agreement system and method for group communication moderate resistance leakage |
CN108337219A (en) * | 2017-11-27 | 2018-07-27 | 中国电子科技集团公司电子科学研究院 | A kind of method and storage medium of Internet of Things anti-intrusion |
CN109413095A (en) * | 2018-11-29 | 2019-03-01 | 新华三大数据技术有限公司 | The method and device of defensive attack |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101119364A (en) * | 2007-09-13 | 2008-02-06 | 上海大学 | Authenticating Ad Hoc group cipher key negotiation protocol |
WO2008095431A1 (en) * | 2007-02-01 | 2008-08-14 | Huawei Technologies Co., Ltd. | Node, distributing system and method of group key control message |
CN101256615A (en) * | 2007-02-27 | 2008-09-03 | 中国科学院研究生院 | Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree |
CN103023653A (en) * | 2012-12-07 | 2013-04-03 | 哈尔滨工业大学深圳研究生院 | Low-power-consumption communication method and device for safety group of internet of things |
-
2016
- 2016-10-21 CN CN201610921875.4A patent/CN106411916A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008095431A1 (en) * | 2007-02-01 | 2008-08-14 | Huawei Technologies Co., Ltd. | Node, distributing system and method of group key control message |
CN101256615A (en) * | 2007-02-27 | 2008-09-03 | 中国科学院研究生院 | Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree |
CN101119364A (en) * | 2007-09-13 | 2008-02-06 | 上海大学 | Authenticating Ad Hoc group cipher key negotiation protocol |
CN103023653A (en) * | 2012-12-07 | 2013-04-03 | 哈尔滨工业大学深圳研究生院 | Low-power-consumption communication method and device for safety group of internet of things |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108337219A (en) * | 2017-11-27 | 2018-07-27 | 中国电子科技集团公司电子科学研究院 | A kind of method and storage medium of Internet of Things anti-intrusion |
CN108337219B (en) * | 2017-11-27 | 2021-12-28 | 中国电子科技集团公司电子科学研究院 | Method for preventing Internet of things from being invaded and storage medium |
CN108259185A (en) * | 2018-01-26 | 2018-07-06 | 湖北工业大学 | A kind of group key agreement system and method for group communication moderate resistance leakage |
CN108259185B (en) * | 2018-01-26 | 2021-06-15 | 湖北工业大学 | Anti-leakage group key negotiation system and method in group communication |
CN109413095A (en) * | 2018-11-29 | 2019-03-01 | 新华三大数据技术有限公司 | The method and device of defensive attack |
CN109413095B (en) * | 2018-11-29 | 2021-11-12 | 新华三大数据技术有限公司 | Method and device for defending attack |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Haque et al. | Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends | |
Conti et al. | Internet of Things security and forensics: Challenges and opportunities | |
Ijaz et al. | Smart cities: A survey on security concerns | |
Kumar et al. | NB-IoT security: A survey | |
Lata et al. | Secure and reliable wsn for internet of things: Challenges and enabling technologies | |
Zhang et al. | Preserving privacy against external and internal threats in WSN data aggregation | |
Chen et al. | A survey on security issues of M2M communications in cyber-physical systems | |
Bagga et al. | Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions | |
Liyakat | Machine learning approach using artificial neural networks to detect malicious nodes in IoT networks | |
Jabraeil Jamali et al. | IoT security | |
CN106411916A (en) | Internet of things security group communication method | |
CN104768149A (en) | Data privacy protection and completeness verification method based on Top-k inquiry in WSN | |
Chakraborty et al. | FC-SEEDA: Fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things | |
Weng et al. | A lightweight anonymous authentication and secure communication scheme for fog computing services | |
Rudra | Impact of Blockchain for internet of Things Security | |
Badar et al. | Secure authentication protocol for home area network in smart grid-based smart cities | |
Yoon et al. | A signature-based data security technique for energy-efficient data aggregation in wireless sensor networks | |
Ramalingam et al. | Fork-Hook encryption policy based secured Data Centric Routing Gateway for proactive trust ware data transmission in WBSN | |
Peng et al. | Security technology analysis of IoT | |
Liu et al. | A new Sybil attack detection for wireless body sensor network | |
Dai et al. | Privacy-preserving MAX/MIN query processing for WSN-as-a-service | |
Prathapchandran et al. | Trust Based Security Mechanisms for Resource-Constrained Internet of Things-A Review | |
Nanda et al. | Secure and efficient key management scheme for wireless sensor networks | |
Alrubaiei et al. | Internet of Things in Cyber Security Scope | |
Rull Aixa | Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170215 |
|
WW01 | Invention patent application withdrawn after publication |