CN106411916A - Internet of things security group communication method - Google Patents

Internet of things security group communication method Download PDF

Info

Publication number
CN106411916A
CN106411916A CN201610921875.4A CN201610921875A CN106411916A CN 106411916 A CN106411916 A CN 106411916A CN 201610921875 A CN201610921875 A CN 201610921875A CN 106411916 A CN106411916 A CN 106411916A
Authority
CN
China
Prior art keywords
group
key
internet
things
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610921875.4A
Other languages
Chinese (zh)
Inventor
过冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610921875.4A priority Critical patent/CN106411916A/en
Publication of CN106411916A publication Critical patent/CN106411916A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Abstract

The invention relates to the field of internet of things, and particularly relates to an internet of things security group communication method comprising the steps that group key agreement of an internet of things security group is performed based on a Hash function and a key tree so that each member of the internet of things security group is enabled to acquire the respectively shared group key; a verification key is arranged in each member so as to be convenient for verification before communication; and communication is performed between all the members in the internet of things security group based on the shared group key and the group key is managed. Agreement communication of the group key can be realized and rapid and efficient updating of the group key can also be guaranteed, and the verification key is adopted so that the flexibility and the security of internet of things security group communication can be enhanced.

Description

A kind of Internet of Things Secure Group Communication method
Technical field
The present invention relates to Internet of Things field, more particularly, to a kind of Internet of Things Secure Group Communication method.
Background technology
Internet of Things is the important component part of generation information technology, as the term suggests, Internet of Things is exactly that " it is mutual that thing thing is connected Networking ", this has two-layer to look like:First, it is so internet that the core of Internet of Things is appointed with basis, is the extension on Internet basic Network with extension;Second, its user side extends and extend between any object and object, enters row information and exchanges and logical Letter, therefore, the definition of Internet of Things is:By information such as RF identification, infrared inductor, global positioning system, laser scanners Sensing equipment, by the agreement of agreement, is connected any object with internet, enters row information and exchanges and communicate, to realize to thing The Weigh sensor of body, positioning, a kind of network of tracking, monitoring and management.
Constantly popularize with application with research in every field for the Internet of Things, the Secure Group Communication of Internet of Things is increasingly becoming One important study hotspot, the network of an Internet of Things interconnects, and information sharing, network node are generally spread in each position Put, these nodes from forming net, by information while collecting, while transmit, side is merged, and provides the service of " taking what one needs ", due to together Meshed network in one region is likely to carry out group communication (multicast), but these packet communications are requirement safe practices props up Support is used as organizing communication support, from existing correlation technique, the most of group key management frame adopting of current Secure Group Communication Frame, expense is relatively large, flexibility ratio shortcoming, cannot the effective internal malicious node of prevention group destruction.
Content of the invention
It is an object of the invention to proposing a kind of Internet of Things Secure Group Communication method, it is possible to increase Internet of Things Secure Group Communication Flexibility and security.
For reaching this purpose, the present invention employs the following technical solutions:
A kind of Internet of Things Secure Group Communication method, including:
Carry out the negotiation of the group key of Internet of Things secure group based on hash function and key tree, make described Internet of Things secure group In each group member obtain each share group key;
Authentication secret is set in each group member, in order to the checking before communicating;
Communicated and managed based on described shared group key between each group member in described Internet of Things secure group Described group key.
Wherein, the negotiation of the described group key carrying out Internet of Things secure group based on hash function and key tree, makes described thing The step that each group member in networking secure group obtains the group key each shared includes:
Held consultation based on key tree mechanism between each group member in described Internet of Things secure group, obtain shared group close Key;
Calculated according to hash function for each group member and obtain and store log2(n) individual group key.
Wherein, communicated based on described shared group key between each group member in described Internet of Things secure group Step includes:
By communication information after broadcast is encrypted through described shared key in group for the described group member;
After other group members in group receive described communication information, solved by shared key by this other group member Close, obtain the information in described communication information.
Wherein, the step managing described group key between each group member in described Internet of Things secure group includes:
Carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, by described abnormal section Point puts into blacklist, and updates described key tree.
Wherein, carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, will be described different Chang Jiedian puts into blacklist, and updates the step of described key tree and include:
Set up a group header as the coordinator of key management in each group;
The ballot of the neighbor node to this group membership is periodically sent from each group member to described group of header;
Judge whether described neighbor node has abnormal behaviour;
If so, then described this neighbor node having abnormal behaviour is added blacklist, and transfer to described group of header record The abnormal behaviour of this group membership;
Restart a wheel group key management by described group of header to operate, but the described node having abnormal behaviour is excluded Outside.
Wherein, judge whether described neighbor node has the step of abnormal behaviour to include:
One abnormality degree is all set to all group nodes by described group of header;
Voted to described group of header from each node, when the abnormality degree of certain node is more than given threshold, then judge this Node is the node having abnormal behaviour.
Wherein, the step managing described group key between each group member in described Internet of Things secure group also includes:
Add to come in or the node that leaves for any, carry out hash function computing, update from described node to described close All intermediate key on the path of the root of key tree, generate new key.
Beneficial effects of the present invention are:A kind of Internet of Things Secure Group Communication method, including:Based on hash function and key tree Carry out the negotiation of the group key of Internet of Things secure group, make each group member in described Internet of Things secure group obtain the group each shared Key;Authentication secret is set in each group member, in order to the checking before communicating;Each group in described Internet of Things secure group Communicated based on described shared group key between member and managed described group key, the present invention had both been enabled the negotiation of group key Communication, can guarantee that the renewal realizing group key rapidly and efficiently again, and adopts authentication secret, improve Internet of Things Secure Group Communication Flexibility and security.
Brief description
Fig. 1 is a kind of Internet of Things Secure Group Communication method flow diagram that the specific embodiment of the invention provides.
Specific embodiment
Further illustrate technical scheme with reference to Fig. 1 and by specific embodiment.
Fig. 1 is a kind of Internet of Things Secure Group Communication method flow diagram that the specific embodiment of the invention provides.
A kind of Internet of Things Secure Group Communication method, including:
Carry out the negotiation of the group key of Internet of Things secure group based on hash function and key tree, make described Internet of Things secure group In each group member obtain each share group key;
Authentication secret is set in each group member, in order to the checking before communicating;
Communicated and managed based on described shared group key between each group member in described Internet of Things secure group Described group key.
In the present embodiment, both enable the negotiation communication of group key, can guarantee that group key of realizing rapidly and efficiently again Update, and adopt authentication secret, improve flexibility and the security of Internet of Things Secure Group Communication.
In the present embodiment, the negotiation of the described group key carrying out Internet of Things secure group based on hash function and key tree, The step that each group member in described Internet of Things secure group obtains the group key each shared is made to include:
Held consultation based on key tree mechanism between each group member in described Internet of Things secure group, obtain shared group close Key;
Calculated according to hash function for each group member and obtain and store log2(n) individual group key.
In the present embodiment, entered based on described shared group key between each group member in described Internet of Things secure group The step of row communication includes:
By communication information after broadcast is encrypted through described shared key in group for the described group member;
After other group members in group receive described communication information, solved by shared key by this other group member Close, obtain the information in described communication information.
In the present embodiment, manage the step bag of described group key between each group member in described Internet of Things secure group Include:
Carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, by described abnormal section Point puts into blacklist, and updates described key tree.
In the present embodiment, carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, Described abnormal nodes are put into blacklist, and updates the step of described key tree and include:
Set up a group header as the coordinator of key management in each group;
The ballot of the neighbor node to this group membership is periodically sent from each group member to described group of header;
Judge whether described neighbor node has abnormal behaviour;
If so, then described this neighbor node having abnormal behaviour is added blacklist, and transfer to described group of header record The abnormal behaviour of this group membership;
Restart a wheel group key management by described group of header to operate, but the described node having abnormal behaviour is excluded Outside.
In the present embodiment, judge whether described neighbor node has the step of abnormal behaviour to include:
One abnormality degree is all set to all group nodes by described group of header;
Voted to described group of header from each node, when the abnormality degree of certain node is more than given threshold, then judge this Node is the node having abnormal behaviour.
In the present embodiment, the step managing described group key between each group member in described Internet of Things secure group is also Including:
Add to come in or the node that leaves for any, carry out hash function computing, update from described node to described close All intermediate key on the path of the root of key tree, generate new key.
The foregoing is only the specific embodiment of the present invention, these descriptions are intended merely to explain the principle of the present invention, and Limiting the scope of the invention can not be construed to by any way.Based on explanation herein, those skilled in the art is not Need to pay other specific implementation methods that performing creative labour can associate the present invention, these modes fall within the present invention Protection domain within.

Claims (7)

1. a kind of Internet of Things Secure Group Communication method is it is characterised in that include:
Carry out the negotiation of the group key of Internet of Things secure group based on hash function and key tree, make in described Internet of Things secure group Each group member obtains the group key each shared;
Authentication secret is set in each group member, in order to the checking before communicating;
Communicated based on described shared group key and managed described between each group member in described Internet of Things secure group Group key.
2. a kind of Internet of Things Secure Group Communication method according to claim 1 it is characterised in that described based on hash function Carry out the negotiation of the group key of Internet of Things secure group with key tree, so that each group member in described Internet of Things secure group is obtained each The step of shared group key includes:
Held consultation based on key tree mechanism between each group member in described Internet of Things secure group, obtain shared group key;
Calculated according to hash function for each group member and obtain and store log2(n) individual group key.
3. a kind of Internet of Things Secure Group Communication method according to claim 1 is it is characterised in that in described Internet of Things safety Included based on the step that described shared group key is communicated between each group member in group:
By communication information after broadcast is encrypted through described shared key in group for the described group member;
After other group members in group receive described communication information, it is decrypted by shared key by this other group member, obtains Take the information in described communication information.
4. a kind of Internet of Things Secure Group Communication method according to claim 1 is it is characterised in that in described Internet of Things safety The step managing described group key between each group member in group includes:
Carry out detection of anomaly node in described Internet of Things secure group;When abnormal nodes is detected, described abnormal nodes are put Enter blacklist, and update described key tree.
5. a kind of Internet of Things Secure Group Communication method according to claim 4 is it is characterised in that in described Internet of Things safety Carry out detection of anomaly node in group;When abnormal nodes is detected, described abnormal nodes are put into blacklist, and update described close The step of key tree includes:
Set up a group header as the coordinator of key management in each group;
The ballot of the neighbor node to this group membership is periodically sent from each group member to described group of header;
Judge whether described neighbor node has abnormal behaviour;
If so, then described this neighbor node having abnormal behaviour is added blacklist, and transfer to described group of header minute book group The abnormal behaviour of member;
Restart a wheel group key management by described group of header to operate, but the described node having abnormal behaviour is excluded Outward.
6. a kind of Internet of Things Secure Group Communication method according to claim 5 is it is characterised in that judge described neighbor node The step whether having abnormal behaviour includes:
One abnormality degree is all set to all group nodes by described group of header;
Voted to described group of header from each node, when the abnormality degree of certain node is more than given threshold, then judge this node For there being the node of abnormal behaviour.
7. a kind of Internet of Things Secure Group Communication method according to claim 1 is it is characterised in that in described Internet of Things safety The step managing described group key between each group member in group also includes:
For any node adding to come in or leaving, carry out hash function computing, update from described node to described key tree The path of root on all intermediate key, generate new key.
CN201610921875.4A 2016-10-21 2016-10-21 Internet of things security group communication method Withdrawn CN106411916A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610921875.4A CN106411916A (en) 2016-10-21 2016-10-21 Internet of things security group communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610921875.4A CN106411916A (en) 2016-10-21 2016-10-21 Internet of things security group communication method

Publications (1)

Publication Number Publication Date
CN106411916A true CN106411916A (en) 2017-02-15

Family

ID=58013453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610921875.4A Withdrawn CN106411916A (en) 2016-10-21 2016-10-21 Internet of things security group communication method

Country Status (1)

Country Link
CN (1) CN106411916A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259185A (en) * 2018-01-26 2018-07-06 湖北工业大学 A kind of group key agreement system and method for group communication moderate resistance leakage
CN108337219A (en) * 2017-11-27 2018-07-27 中国电子科技集团公司电子科学研究院 A kind of method and storage medium of Internet of Things anti-intrusion
CN109413095A (en) * 2018-11-29 2019-03-01 新华三大数据技术有限公司 The method and device of defensive attack

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119364A (en) * 2007-09-13 2008-02-06 上海大学 Authenticating Ad Hoc group cipher key negotiation protocol
WO2008095431A1 (en) * 2007-02-01 2008-08-14 Huawei Technologies Co., Ltd. Node, distributing system and method of group key control message
CN101256615A (en) * 2007-02-27 2008-09-03 中国科学院研究生院 Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree
CN103023653A (en) * 2012-12-07 2013-04-03 哈尔滨工业大学深圳研究生院 Low-power-consumption communication method and device for safety group of internet of things

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008095431A1 (en) * 2007-02-01 2008-08-14 Huawei Technologies Co., Ltd. Node, distributing system and method of group key control message
CN101256615A (en) * 2007-02-27 2008-09-03 中国科学院研究生院 Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree
CN101119364A (en) * 2007-09-13 2008-02-06 上海大学 Authenticating Ad Hoc group cipher key negotiation protocol
CN103023653A (en) * 2012-12-07 2013-04-03 哈尔滨工业大学深圳研究生院 Low-power-consumption communication method and device for safety group of internet of things

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108337219A (en) * 2017-11-27 2018-07-27 中国电子科技集团公司电子科学研究院 A kind of method and storage medium of Internet of Things anti-intrusion
CN108337219B (en) * 2017-11-27 2021-12-28 中国电子科技集团公司电子科学研究院 Method for preventing Internet of things from being invaded and storage medium
CN108259185A (en) * 2018-01-26 2018-07-06 湖北工业大学 A kind of group key agreement system and method for group communication moderate resistance leakage
CN108259185B (en) * 2018-01-26 2021-06-15 湖北工业大学 Anti-leakage group key negotiation system and method in group communication
CN109413095A (en) * 2018-11-29 2019-03-01 新华三大数据技术有限公司 The method and device of defensive attack
CN109413095B (en) * 2018-11-29 2021-11-12 新华三大数据技术有限公司 Method and device for defending attack

Similar Documents

Publication Publication Date Title
Haque et al. Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends
Conti et al. Internet of Things security and forensics: Challenges and opportunities
Ijaz et al. Smart cities: A survey on security concerns
Kumar et al. NB-IoT security: A survey
Lata et al. Secure and reliable wsn for internet of things: Challenges and enabling technologies
Zhang et al. Preserving privacy against external and internal threats in WSN data aggregation
Chen et al. A survey on security issues of M2M communications in cyber-physical systems
Bagga et al. Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
Liyakat Machine learning approach using artificial neural networks to detect malicious nodes in IoT networks
Jabraeil Jamali et al. IoT security
CN106411916A (en) Internet of things security group communication method
CN104768149A (en) Data privacy protection and completeness verification method based on Top-k inquiry in WSN
Chakraborty et al. FC-SEEDA: Fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things
Weng et al. A lightweight anonymous authentication and secure communication scheme for fog computing services
Rudra Impact of Blockchain for internet of Things Security
Badar et al. Secure authentication protocol for home area network in smart grid-based smart cities
Yoon et al. A signature-based data security technique for energy-efficient data aggregation in wireless sensor networks
Ramalingam et al. Fork-Hook encryption policy based secured Data Centric Routing Gateway for proactive trust ware data transmission in WBSN
Peng et al. Security technology analysis of IoT
Liu et al. A new Sybil attack detection for wireless body sensor network
Dai et al. Privacy-preserving MAX/MIN query processing for WSN-as-a-service
Prathapchandran et al. Trust Based Security Mechanisms for Resource-Constrained Internet of Things-A Review
Nanda et al. Secure and efficient key management scheme for wireless sensor networks
Alrubaiei et al. Internet of Things in Cyber Security Scope
Rull Aixa Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170215

WW01 Invention patent application withdrawn after publication