CN107872311A - A kind of power transmission and distribution Internet of Things wireless communications method - Google Patents

A kind of power transmission and distribution Internet of Things wireless communications method Download PDF

Info

Publication number
CN107872311A
CN107872311A CN201810020249.7A CN201810020249A CN107872311A CN 107872311 A CN107872311 A CN 107872311A CN 201810020249 A CN201810020249 A CN 201810020249A CN 107872311 A CN107872311 A CN 107872311A
Authority
CN
China
Prior art keywords
power transmission
internet
things
communication
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810020249.7A
Other languages
Chinese (zh)
Inventor
罗步升
林志超
林杰欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Huizhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Huizhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority to CN201810020249.7A priority Critical patent/CN107872311A/en
Publication of CN107872311A publication Critical patent/CN107872311A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The present invention relates to Internet of Things and sensor application field, more particularly, to a kind of power transmission and distribution shaft tower inclination sensor.Including:Content of Communication is encrypted based on AES128, generates cipher-text message authentication code, then takes last four bytes as MIC message integrity codes, so as to reach the effect of double-encryption.Node and relaying both sides possess identical key, but key never participates in communication and exchanged, therefore can not be cracked by monitoring wireless electricity;Add the risk that MIC message integrity codes effectively can avoid attacker from distorting ciphertext and can not discover.Wireless security communication method used herein, there is provided a kind of safe communication mechanism, it is ensured that the secrecy and security of communication data.

Description

A kind of power transmission and distribution Internet of Things wireless communications method
Technical field
The present invention relates to Internet of Things field, more particularly, to a kind of power transmission and distribution Internet of Things wireless communications method.
Background technology
Wireless security communication is critically important for internet of things equipment, because they are often deployed in important infrastructure In.Meanwhile node is physically distributed system, wireless channel is easy to be monitored by attacker, and these come more to safety belt More challenges.
Existing Internet of Things encryption technology, includes hardware chip encryption technology.Hardware chip encryption technology, mainly use and add Close chip, and all kinds of symmetric and unsymmetric algorithms are integrated with to inside, itself there is high safe class, it is ensured that deposit inside The key and information data of storage will not be by the illegal general designations for reading a kind of safety chip with distorting.It is wide in Embedded Industry application It is general.His predecessor is exactly the ESAM modules of the industries such as water power gas meter, dedicated for encrypted transmission and the key safety of track data Storage.The copyright protection application of another usage, i.e. Embedded Industry is developed out with lower bound time stamp.Prevent independent intellectual property right and Developmental achievement is illegally usurped.
Traditional logic encryption chip, the protective capacities of itself is very weak, and most decryption company can easily crack, Progressively it is eliminated.It the substitute is and be proved to the good smart card platform of security.In order to ensure intelligent card chip Gao An Full property is, it is necessary to which intelligent card chip has more than the EAL4+ of International Safety Certification committee chip, and otherwise security is also difficult to reach To requiring.
Using hardware chip encryption technology:Internet of Things is more to belong to consumer market more sensitive to cost, protection sense Know that equipment safety, protection key also have corresponding hardware solution safely, but under this competition situation, hardware plan is inevitable The cost burden of manufacturer can be increased, even result in and safety problem is have ignored because of cost.
The content of the invention
The present invention is to overcome at least one defect described in above-mentioned prior art, there is provided a kind of power transmission and distribution Internet of Things channel radio Letter method, in the relaying of Internet of Things and the communication process of node, AES128 is encrypted based on the key kept, generation is close Literary message authentication code, then last four bytes are taken as MIC message integrity codes, so as to reach the effect of double-encryption, meanwhile, it Belong to software cryptography, integrated cost is low.
In order to solve the above technical problems, the technical solution adopted by the present invention is:A kind of power transmission and distribution Internet of Things wireless security leads to Letter method, belong to the software encryption technique of lightweight, including:Relaying and node in described Internet of Things, which each preserve, to be based on The key of AES128 algorithms, the relaying and node in described Internet of Things can carry out AES128 when sending data to data Encryption, generate ciphertext.
Described ciphertext, last four bytes is taken as MIC message integrity codes, so as to reach the effect of double-encryption.
Relaying and node in described Internet of Things first can carry out MIC to last four bytes and disappear when receiving data Integrity verification is ceased, four bytes and four last bytes according to corresponding to calculating the data progress MIC algorithms received Compare, if identical, it is complete to represent message.
After described MIC message integrity verifications are carried out, the AES128 keys kept based on relaying and node come pair The data received are decrypted, and obtain the plaintext of correlation;Finally, according to the specific form of power transmission and distribution, to verify what is received Whether data are effective, effectively then carry out the processing of correlation, and failure then abandons.
Compared with prior art, beneficial effect is:Using the software encryption technique of lightweight, reach the secrecy of communication data Property and integrality, while maximumlly reduce cost.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the present invention.
Embodiment
Accompanying drawing being given for example only property explanation, it is impossible to be interpreted as the limitation to this patent;It is attached in order to more preferably illustrate the present embodiment Scheme some parts to have omission, zoom in or out, do not represent the size of actual product;To those skilled in the art, Some known features and its explanation may be omitted and will be understood by accompanying drawing.Being given for example only property of position relationship described in accompanying drawing Explanation, it is impossible to be interpreted as the limitation to this patent.
As shown in figure 1, a kind of power transmission and distribution Internet of Things Wireless security communication method, including relaying and node are sent in Internet of Things To the encryption of data during data, checking when also including receiving data to data, the encryption side combined using AES128 with MIC Formula, it ensure that the integrality and security of Internet of Things wireless security communication.
In the present embodiment, relaying and node each preserve the key based on AES128 algorithms, in described Internet of Things Relaying and node when sending data, AES128 encryptions can be carried out to data, generate ciphertext, then take last four bytes to make For MIC message integrity codes, so as to reach the effect of double-encryption.
Relaying and node in described Internet of Things first can carry out MIC to last four bytes and disappear when receiving data Integrity verification is ceased, four bytes and four last bytes according to corresponding to calculating the data progress MIC algorithms received Compare, if identical, it is complete to represent message.
After described MIC message integrity verifications are carried out, the AES128 keys kept based on relaying and node come pair The data received are decrypted, and obtain the plaintext of correlation.
Finally, according to the specific form of power transmission and distribution, to verify whether the data received are effective, correlation is effectively then carried out Processing, failure then abandon.
Obviously, the above embodiment of the present invention is only intended to clearly illustrate example of the present invention, and is not pair The restriction of embodiments of the present invention.For those of ordinary skill in the field, may be used also on the basis of the above description To make other changes in different forms.There is no necessity and possibility to exhaust all the enbodiments.It is all this All any modification, equivalent and improvement made within the spirit and principle of invention etc., should be included in the claims in the present invention Protection domain within.

Claims (3)

1. a kind of power transmission and distribution Internet of Things wireless communications method, it is characterised in that comprise the following steps:
Content of Communication is encrypted when sending data for S1, the relaying and node of Internet of Things, generates cipher-text message authentication code, Generate MIC message integrity codes;
S2, the relaying and node of Internet of Things are verified when receiving data to MIC message integrity codes;
S3, the data received are decrypted based on relaying and the key kept of node, obtain the plaintext of correlation;
S4, according to the specific form of power transmission and distribution, to verify whether the data received are effective, the processing of correlation is effectively then carried out, Failure then abandons.
2. a kind of power transmission and distribution Internet of Things wireless communications method according to claim 1, it is characterised in that Content of Communication passes through AES128 is encrypted.
3. a kind of power transmission and distribution Internet of Things wireless communications method according to claim 1, it is characterised in that described MIC disappears Breath full code is last four bytes of the ciphertext generated after AES128 is encrypted.
CN201810020249.7A 2018-01-09 2018-01-09 A kind of power transmission and distribution Internet of Things wireless communications method Pending CN107872311A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810020249.7A CN107872311A (en) 2018-01-09 2018-01-09 A kind of power transmission and distribution Internet of Things wireless communications method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810020249.7A CN107872311A (en) 2018-01-09 2018-01-09 A kind of power transmission and distribution Internet of Things wireless communications method

Publications (1)

Publication Number Publication Date
CN107872311A true CN107872311A (en) 2018-04-03

Family

ID=61756351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810020249.7A Pending CN107872311A (en) 2018-01-09 2018-01-09 A kind of power transmission and distribution Internet of Things wireless communications method

Country Status (1)

Country Link
CN (1) CN107872311A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109802948A (en) * 2018-12-27 2019-05-24 石更箭数据科技(上海)有限公司 Data processing equipment and transaction system
CN109802947A (en) * 2018-12-27 2019-05-24 石更箭数据科技(上海)有限公司 Data processing method, equipment and transaction system
CN112787807A (en) * 2020-12-31 2021-05-11 清华大学 Quantum communication method and communication network based on secure relay

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109802948A (en) * 2018-12-27 2019-05-24 石更箭数据科技(上海)有限公司 Data processing equipment and transaction system
CN109802947A (en) * 2018-12-27 2019-05-24 石更箭数据科技(上海)有限公司 Data processing method, equipment and transaction system
CN112787807A (en) * 2020-12-31 2021-05-11 清华大学 Quantum communication method and communication network based on secure relay
CN112787807B (en) * 2020-12-31 2022-03-18 清华大学 Quantum communication method and communication network based on secure relay

Similar Documents

Publication Publication Date Title
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
CN101340437B (en) Time source regulating method and system
CN103581173B (en) Safe data transmission method, system and device based on industrial Ethernet
US9497021B2 (en) Device for generating a message authentication code for authenticating a message
CN105229965B (en) Equipment identification system and equipment authenticating method
CN109417481A (en) Safety is improved by the temporary key of the virtual non-contact card of software in mobile phone
CN102065148A (en) Memory system access authorizing method based on communication network
JP6417036B2 (en) Entity authentication method and apparatus based on pre-shared key
CN106790064B (en) The method that both sides are communicated in credible root server-cloud computing server model
CN106712962A (en) Mobile RFID system bidirectional authentication method and system
CN100421372C (en) Method of safety transmitting key
CN108768930A (en) A kind of encrypted transmission method of data
CN106357400A (en) Method and system for establishing channel between TBOX terminal and TSP platform
CN106656510A (en) Encryption key acquisition method and system
CN106973056A (en) The safety chip and its encryption method of a kind of object-oriented
CN103684772B (en) Dynamic deficiency encryption system
JP2020530726A (en) NFC tag authentication to remote servers with applications that protect supply chain asset management
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN107872311A (en) A kind of power transmission and distribution Internet of Things wireless communications method
Chothia et al. An attack against message authentication in the ERTMS train to trackside communication protocols
Tung et al. Layers of security for active RFID tags
CN102684872B (en) Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption
CN102255727B (en) Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
Premarathne et al. Secure and reliable surveillance over cognitive radio sensor networks in smart grid
Xu et al. Improving the security of wireless communications on high-speed trains by efficient authentication in SCN-R

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180403