CN107872311A - A kind of power transmission and distribution Internet of Things wireless communications method - Google Patents
A kind of power transmission and distribution Internet of Things wireless communications method Download PDFInfo
- Publication number
- CN107872311A CN107872311A CN201810020249.7A CN201810020249A CN107872311A CN 107872311 A CN107872311 A CN 107872311A CN 201810020249 A CN201810020249 A CN 201810020249A CN 107872311 A CN107872311 A CN 107872311A
- Authority
- CN
- China
- Prior art keywords
- power transmission
- internet
- things
- communication
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Abstract
The present invention relates to Internet of Things and sensor application field, more particularly, to a kind of power transmission and distribution shaft tower inclination sensor.Including:Content of Communication is encrypted based on AES128, generates cipher-text message authentication code, then takes last four bytes as MIC message integrity codes, so as to reach the effect of double-encryption.Node and relaying both sides possess identical key, but key never participates in communication and exchanged, therefore can not be cracked by monitoring wireless electricity;Add the risk that MIC message integrity codes effectively can avoid attacker from distorting ciphertext and can not discover.Wireless security communication method used herein, there is provided a kind of safe communication mechanism, it is ensured that the secrecy and security of communication data.
Description
Technical field
The present invention relates to Internet of Things field, more particularly, to a kind of power transmission and distribution Internet of Things wireless communications method.
Background technology
Wireless security communication is critically important for internet of things equipment, because they are often deployed in important infrastructure
In.Meanwhile node is physically distributed system, wireless channel is easy to be monitored by attacker, and these come more to safety belt
More challenges.
Existing Internet of Things encryption technology, includes hardware chip encryption technology.Hardware chip encryption technology, mainly use and add
Close chip, and all kinds of symmetric and unsymmetric algorithms are integrated with to inside, itself there is high safe class, it is ensured that deposit inside
The key and information data of storage will not be by the illegal general designations for reading a kind of safety chip with distorting.It is wide in Embedded Industry application
It is general.His predecessor is exactly the ESAM modules of the industries such as water power gas meter, dedicated for encrypted transmission and the key safety of track data
Storage.The copyright protection application of another usage, i.e. Embedded Industry is developed out with lower bound time stamp.Prevent independent intellectual property right and
Developmental achievement is illegally usurped.
Traditional logic encryption chip, the protective capacities of itself is very weak, and most decryption company can easily crack,
Progressively it is eliminated.It the substitute is and be proved to the good smart card platform of security.In order to ensure intelligent card chip Gao An
Full property is, it is necessary to which intelligent card chip has more than the EAL4+ of International Safety Certification committee chip, and otherwise security is also difficult to reach
To requiring.
Using hardware chip encryption technology:Internet of Things is more to belong to consumer market more sensitive to cost, protection sense
Know that equipment safety, protection key also have corresponding hardware solution safely, but under this competition situation, hardware plan is inevitable
The cost burden of manufacturer can be increased, even result in and safety problem is have ignored because of cost.
The content of the invention
The present invention is to overcome at least one defect described in above-mentioned prior art, there is provided a kind of power transmission and distribution Internet of Things channel radio
Letter method, in the relaying of Internet of Things and the communication process of node, AES128 is encrypted based on the key kept, generation is close
Literary message authentication code, then last four bytes are taken as MIC message integrity codes, so as to reach the effect of double-encryption, meanwhile, it
Belong to software cryptography, integrated cost is low.
In order to solve the above technical problems, the technical solution adopted by the present invention is:A kind of power transmission and distribution Internet of Things wireless security leads to
Letter method, belong to the software encryption technique of lightweight, including:Relaying and node in described Internet of Things, which each preserve, to be based on
The key of AES128 algorithms, the relaying and node in described Internet of Things can carry out AES128 when sending data to data
Encryption, generate ciphertext.
Described ciphertext, last four bytes is taken as MIC message integrity codes, so as to reach the effect of double-encryption.
Relaying and node in described Internet of Things first can carry out MIC to last four bytes and disappear when receiving data
Integrity verification is ceased, four bytes and four last bytes according to corresponding to calculating the data progress MIC algorithms received
Compare, if identical, it is complete to represent message.
After described MIC message integrity verifications are carried out, the AES128 keys kept based on relaying and node come pair
The data received are decrypted, and obtain the plaintext of correlation;Finally, according to the specific form of power transmission and distribution, to verify what is received
Whether data are effective, effectively then carry out the processing of correlation, and failure then abandons.
Compared with prior art, beneficial effect is:Using the software encryption technique of lightweight, reach the secrecy of communication data
Property and integrality, while maximumlly reduce cost.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the present invention.
Embodiment
Accompanying drawing being given for example only property explanation, it is impossible to be interpreted as the limitation to this patent;It is attached in order to more preferably illustrate the present embodiment
Scheme some parts to have omission, zoom in or out, do not represent the size of actual product;To those skilled in the art,
Some known features and its explanation may be omitted and will be understood by accompanying drawing.Being given for example only property of position relationship described in accompanying drawing
Explanation, it is impossible to be interpreted as the limitation to this patent.
As shown in figure 1, a kind of power transmission and distribution Internet of Things Wireless security communication method, including relaying and node are sent in Internet of Things
To the encryption of data during data, checking when also including receiving data to data, the encryption side combined using AES128 with MIC
Formula, it ensure that the integrality and security of Internet of Things wireless security communication.
In the present embodiment, relaying and node each preserve the key based on AES128 algorithms, in described Internet of Things
Relaying and node when sending data, AES128 encryptions can be carried out to data, generate ciphertext, then take last four bytes to make
For MIC message integrity codes, so as to reach the effect of double-encryption.
Relaying and node in described Internet of Things first can carry out MIC to last four bytes and disappear when receiving data
Integrity verification is ceased, four bytes and four last bytes according to corresponding to calculating the data progress MIC algorithms received
Compare, if identical, it is complete to represent message.
After described MIC message integrity verifications are carried out, the AES128 keys kept based on relaying and node come pair
The data received are decrypted, and obtain the plaintext of correlation.
Finally, according to the specific form of power transmission and distribution, to verify whether the data received are effective, correlation is effectively then carried out
Processing, failure then abandon.
Obviously, the above embodiment of the present invention is only intended to clearly illustrate example of the present invention, and is not pair
The restriction of embodiments of the present invention.For those of ordinary skill in the field, may be used also on the basis of the above description
To make other changes in different forms.There is no necessity and possibility to exhaust all the enbodiments.It is all this
All any modification, equivalent and improvement made within the spirit and principle of invention etc., should be included in the claims in the present invention
Protection domain within.
Claims (3)
1. a kind of power transmission and distribution Internet of Things wireless communications method, it is characterised in that comprise the following steps:
Content of Communication is encrypted when sending data for S1, the relaying and node of Internet of Things, generates cipher-text message authentication code,
Generate MIC message integrity codes;
S2, the relaying and node of Internet of Things are verified when receiving data to MIC message integrity codes;
S3, the data received are decrypted based on relaying and the key kept of node, obtain the plaintext of correlation;
S4, according to the specific form of power transmission and distribution, to verify whether the data received are effective, the processing of correlation is effectively then carried out,
Failure then abandons.
2. a kind of power transmission and distribution Internet of Things wireless communications method according to claim 1, it is characterised in that Content of Communication passes through
AES128 is encrypted.
3. a kind of power transmission and distribution Internet of Things wireless communications method according to claim 1, it is characterised in that described MIC disappears
Breath full code is last four bytes of the ciphertext generated after AES128 is encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810020249.7A CN107872311A (en) | 2018-01-09 | 2018-01-09 | A kind of power transmission and distribution Internet of Things wireless communications method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810020249.7A CN107872311A (en) | 2018-01-09 | 2018-01-09 | A kind of power transmission and distribution Internet of Things wireless communications method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107872311A true CN107872311A (en) | 2018-04-03 |
Family
ID=61756351
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810020249.7A Pending CN107872311A (en) | 2018-01-09 | 2018-01-09 | A kind of power transmission and distribution Internet of Things wireless communications method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107872311A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109802948A (en) * | 2018-12-27 | 2019-05-24 | 石更箭数据科技(上海)有限公司 | Data processing equipment and transaction system |
CN109802947A (en) * | 2018-12-27 | 2019-05-24 | 石更箭数据科技(上海)有限公司 | Data processing method, equipment and transaction system |
CN112787807A (en) * | 2020-12-31 | 2021-05-11 | 清华大学 | Quantum communication method and communication network based on secure relay |
-
2018
- 2018-01-09 CN CN201810020249.7A patent/CN107872311A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109802948A (en) * | 2018-12-27 | 2019-05-24 | 石更箭数据科技(上海)有限公司 | Data processing equipment and transaction system |
CN109802947A (en) * | 2018-12-27 | 2019-05-24 | 石更箭数据科技(上海)有限公司 | Data processing method, equipment and transaction system |
CN112787807A (en) * | 2020-12-31 | 2021-05-11 | 清华大学 | Quantum communication method and communication network based on secure relay |
CN112787807B (en) * | 2020-12-31 | 2022-03-18 | 清华大学 | Quantum communication method and communication network based on secure relay |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101917270B (en) | Weak authentication and key agreement method based on symmetrical password | |
CN101340437B (en) | Time source regulating method and system | |
CN103581173B (en) | Safe data transmission method, system and device based on industrial Ethernet | |
US9497021B2 (en) | Device for generating a message authentication code for authenticating a message | |
CN105229965B (en) | Equipment identification system and equipment authenticating method | |
CN109417481A (en) | Safety is improved by the temporary key of the virtual non-contact card of software in mobile phone | |
CN102065148A (en) | Memory system access authorizing method based on communication network | |
JP6417036B2 (en) | Entity authentication method and apparatus based on pre-shared key | |
CN106790064B (en) | The method that both sides are communicated in credible root server-cloud computing server model | |
CN106712962A (en) | Mobile RFID system bidirectional authentication method and system | |
CN100421372C (en) | Method of safety transmitting key | |
CN108768930A (en) | A kind of encrypted transmission method of data | |
CN106357400A (en) | Method and system for establishing channel between TBOX terminal and TSP platform | |
CN106656510A (en) | Encryption key acquisition method and system | |
CN106973056A (en) | The safety chip and its encryption method of a kind of object-oriented | |
CN103684772B (en) | Dynamic deficiency encryption system | |
JP2020530726A (en) | NFC tag authentication to remote servers with applications that protect supply chain asset management | |
CN109474419A (en) | A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system | |
CN107872311A (en) | A kind of power transmission and distribution Internet of Things wireless communications method | |
Chothia et al. | An attack against message authentication in the ERTMS train to trackside communication protocols | |
Tung et al. | Layers of security for active RFID tags | |
CN102684872B (en) | Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption | |
CN102255727B (en) | Improved anti-attacking intelligent card authentication method based on user defined algorithm environment | |
Premarathne et al. | Secure and reliable surveillance over cognitive radio sensor networks in smart grid | |
Xu et al. | Improving the security of wireless communications on high-speed trains by efficient authentication in SCN-R |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180403 |