CN108173641B - Zigbee safety communication method based on RSA - Google Patents

Zigbee safety communication method based on RSA Download PDF

Info

Publication number
CN108173641B
CN108173641B CN201810141822.XA CN201810141822A CN108173641B CN 108173641 B CN108173641 B CN 108173641B CN 201810141822 A CN201810141822 A CN 201810141822A CN 108173641 B CN108173641 B CN 108173641B
Authority
CN
China
Prior art keywords
certificate
rsa
zigbee
private key
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810141822.XA
Other languages
Chinese (zh)
Other versions
CN108173641A (en
Inventor
陈锋
黄愉芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou University
Original Assignee
Fuzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou University filed Critical Fuzhou University
Priority to CN201810141822.XA priority Critical patent/CN108173641B/en
Publication of CN108173641A publication Critical patent/CN108173641A/en
Application granted granted Critical
Publication of CN108173641B publication Critical patent/CN108173641B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a Zigbee safety communication method based on RSA, which utilizes an RSA algorithm to encrypt Zigbee communication keys, realizes that the communication keys between each terminal of Zigbee and a coordinator are different, and realizes the safety communication between each terminal and the coordinator through AES 128. And each terminal performs identity authentication on the coordinator through the public key issued by the coordinator to determine the validity of the coordinator. The communication keys of each terminal and the coordinator are in a safe encryption state, and other nodes cannot be easily captured and cracked. The communication keys between each terminal and the coordinator are different from each other. The invention loads the RSA asymmetric encryption method into the Zigbee equipment, effectively improves the reliability and the safety of wireless transmission by encrypting the transmission key, and more effectively solves the problem of Zigbee memory overflow possibly caused by overlong messages.

Description

Zigbee safety communication method based on RSA
Technical Field
The invention relates to the technical field of communication, in particular to a Zigbee safety communication method based on RSA.
Background
The Zigbee based on the IEEE 802.15.4 wireless technology is a low-cost, low-power consumption and short-distance two-way communication network technology, and can be applied to numerous wireless communication occasions. With the increase of Zigbee-based application instances, the security of information transmission thereof is also beginning to be concerned. Although the ZStack protocol stack used by Zigbee has its own encryption and decryption algorithm based on AES128, it is a symmetric encryption technology, and its confidentiality is inferior to that of asymmetric encryption technology. Since the entire network shares a key, once the key is compromised, the network is insecure.
The RSA algorithm is an example of asymmetric encryption technology, and the most significant feature is that the required keys are a pair, one for encryption and one for decryption, and the encryption key is different from the decryption key. The RSA algorithm is highly secure but also highly complex. Therefore, the RSA algorithm is not suitable for embedded terminals and other terminals with weak computing power.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a Zigbee safety communication method based on RSA.
The technical scheme adopted by the invention is as follows:
a Zigbee secure communication method based on RSA, the Zigbee network includes trust center, central node and terminal node, the trust center provides certificate and public and private key to each central node, the central node is used to broadcast the public key to the terminal node and use the private key to encrypt the certificate, each terminal node verifies the legitimacy of the central node based on the public key; the Zigbee safety communication method comprises the following steps:
s1, the central node requests the certificate and the public and private keys from the trust center;
s2, the trust center returns the certificate and the public and private keys to the central node;
s3, the central node acquires and verifies the certificate, and when the certificate is successfully authenticated, the central node broadcasts the public key to all the terminal nodes;
s4, each terminal node applies for network access to the central node, the central node encrypts the certificate by using the private key and sends the certificate encrypted by the private key to the terminal node;
s5, the terminal node decrypts the encrypted certificate of the private key and verifies the validity of the decrypted certificate; when the decrypted certificate is verified to be legal, an AES password is randomly generated;
s6, the terminal node randomly generates two large prime numbers by using the function of the OSAL layer of Zigbee, and generates the public and private keys of RSA according to the two large prime numbers;
s7, the terminal node encrypts the AES password by using the public key generated by the RSA asymmetric cryptographic technique;
s8, the terminal node transmits the AES password and RSA private key encrypted by RSA to the central node;
and S9, after the central node decrypts and authenticates the AES password encrypted by the RSA private key and passes the decryption authentication, the central node and the corresponding terminal node perform subsequent communication by using the AES password encrypted by the RSA private key.
Further, the specific steps of step S6 are as follows:
s6-1, generating two random numbers by using a random number generation function osal _ rand of an osal layer in a Zstack protocol stack;
s6-2, judging whether the two random numbers are all prime numbers, if so, generating two prime numbers p and q, and executing the step S6-3; otherwise, executing step S6-1;
s6-3, directly multiplying prime numbers p and q to obtain a public key n, i.e. n ═ p × (q), under the condition of ensuring that p and q are not equal;
s6-4, according to Euler' S function, the integer number which is not more than n and is prime to n is (p-1) × (q-1), and (p-1) × (q-1) is defined as fai _ n;
s6-5, randomly generating an integer e which is prime to fai _ n and not more than fai _ n according to fai _ n, and taking e as another public key;
s6-6, generating a private key d by the formula d × e ═ 1(mod fai _ n) based on fai _ n and e;
s6-7, destroying p and q, and using (n, e) as a public key and d as a private key.
Further, the two random numbers generated in step S6-1 not only satisfy the requirement that the random numbers are not too small to be cracked, but also satisfy the requirement that the Zigbee memory is not too large to overflow.
Further, the specific steps of encrypting the AES cipher in step S7 are as follows:
s7-1, the AES cipher as Zigbee transmission key is converted into digital according to the appointed mode to form digital plaintext group;
s7-2, the digital plaintext group is encrypted one-to-one, and the encryption formula is as follows: c is me(mod n), where c is ciphertext and m is plaintext.
Further, in step S9, according to the formula m ═ cd(mod n) decrypts the ciphertext of the AES cipher to recover the original message.
Further, the central node is a coordinator.
Further, the terminal nodes include common terminals and routers.
Furthermore, the central node is provided with the following modules:
the certificate and public and private key receiving module: a public key and a certificate for receiving trust center broadcast;
a central certificate verification module: the certificate verification device is used for verifying the certificate sent by the trust center;
the public key distribution module: for broadcasting the public key to the end node;
a certificate encryption module: for encrypting the certificate with the private key;
RSA private key receiving module: receiving a private key sent by a terminal node;
AES key decryption module after RSA encryption: calling a corresponding private key from an RSA private key receiving module, and decrypting the AES private key by using the private key;
the terminal node is provided with the following modules:
a public key receiving module: public key and certificate for receiving central node broadcast;
a terminal certificate verification module: the certificate verification system is used for verifying the certificate sent by the central node;
an AES password generation module: the method is used for randomly generating an AES password after the decrypted certificate is verified to be legal;
RSA public and private key generation module: generating a header file of a public key and a header file of a private key and a corresponding c file in an application layer by utilizing an RSA principle and a function contained in a Zstack protocol stack;
RSA encryption AES key module: the AES key is encrypted using a public key generated by the RSA technique.
By adopting the technical scheme, the Zigbee communication key is encrypted by utilizing the RSA algorithm, the communication keys between each terminal of the Zigbee and the coordinator are different, and the safe communication between each terminal and the coordinator is realized through the AES 128. And each terminal performs identity authentication on the coordinator through the public key issued by the coordinator to determine the validity of the coordinator. The communication keys of each terminal and the coordinator are in a safe encryption state, and other nodes cannot be easily captured and cracked. The communication keys between each terminal and the coordinator are different from each other. The invention loads the RSA asymmetric encryption method into the Zigbee equipment, effectively improves the reliability and the safety of wireless transmission by encrypting the transmission key, and more effectively solves the problem of Zigbee memory overflow possibly caused by overlong messages. The method can be widely applied to Zigbee transmission equipment needing high confidentiality, enhances the reliability and safety of Zigbee transmission, and prevents transmission messages from being cracked randomly.
Drawings
The invention is described in further detail below with reference to the accompanying drawings and the detailed description;
fig. 1 is a schematic diagram of a Zigbee network according to a Zigbee security communication method based on RSA of the present invention;
fig. 2 is a schematic flowchart of a Zigbee secure communication method based on RSA according to the present invention;
fig. 3 is a schematic structural diagram of a center node and a terminal node of a RSA-based Zigbee secure communication method according to the present invention.
Detailed Description
As shown in one of fig. 1 to 3, the present invention discloses a Zigbee secure communication method based on RSA, as shown in fig. 1, a Zigbee network includes a trust center, a center node, and terminal nodes, the trust center provides a certificate and a public and private key to each center node, the center node is configured to broadcast the public key to the terminal nodes and encrypt the certificate using the private key, and each terminal node verifies the validity of the center node based on the public key; as shown in fig. 2, the Zigbee secure communication method includes the following steps:
s1, the central node requests the certificate and the public and private keys from the trust center;
s2, the trust center returns the certificate and the public and private keys to the central node;
s3, the central node acquires and verifies the certificate, and when the certificate is successfully authenticated, the central node broadcasts the public key to all the terminal nodes;
s4, each terminal node applies for network access to the central node, the central node encrypts the certificate by using the private key and sends the certificate encrypted by the private key to the terminal node;
s5, the terminal node decrypts the encrypted certificate of the private key and verifies the validity of the decrypted certificate; when the decrypted certificate is verified to be legal, an AES password is randomly generated;
s6, the terminal node randomly generates two large prime numbers by using the function of the OSAL layer of Zigbee, and generates the public and private keys of RSA according to the two large prime numbers;
s7, the terminal node encrypts the AES password by using the public key generated by the RSA asymmetric cryptographic technique;
s8, the terminal node transmits the AES password and RSA private key encrypted by RSA to the central node;
and S9, after the central node decrypts and authenticates the AES password encrypted by the RSA private key and passes the decryption authentication, the central node and the corresponding terminal node perform subsequent communication by using the AES password encrypted by the RSA private key.
Further, the specific steps of step S6 are as follows:
s6-1, generating two random numbers by using a random number generation function osal _ rand of an osal layer in a Zstack protocol stack;
s6-2, judging whether the two random numbers are all prime numbers, if so, generating two prime numbers p and q, and executing the step S6-3; otherwise, executing step S6-1;
s6-3, directly multiplying prime numbers p and q to obtain a public key n, i.e. n ═ p × (q), under the condition of ensuring that p and q are not equal;
s6-4, according to Euler' S function, the integer number which is not more than n and is prime to n is (p-1) × (q-1), and (p-1) × (q-1) is defined as fai _ n;
s6-5, randomly generating an integer e which is prime to fai _ n and not more than fai _ n according to fai _ n, and taking e as another public key;
s6-6, generating a private key d by the formula d × e ═ 1(mod fai _ n) based on fai _ n and e;
s6-7, destroying p and q, and using (n, e) as a public key and d as a private key.
Further, the two random numbers generated in step S6-1 not only satisfy the requirement that the random numbers are not too small to be cracked, but also satisfy the requirement that the Zigbee memory is not too large to overflow.
Further, the specific steps of encrypting the AES cipher in step S7 are as follows:
s7-1, the AES cipher as Zigbee transmission key is converted into digital according to the appointed mode to form digital plaintext group;
s7-2, the digital plaintext group is encrypted one-to-one, and the encryption formula is as follows: c is me(mod n), where c is ciphertext and m is plaintext.
Further, step (ii)In step S9, according to the formula m ═ cd(mod n) decrypts the ciphertext of the AES cipher to recover the original message.
Further, the central node is a coordinator.
Further, the terminal nodes include common terminals and routers.
Further, as shown in fig. 3, the following modules are provided on the central node:
the certificate and public and private key receiving module: a public key and a certificate for receiving trust center broadcast;
a central certificate verification module: the certificate verification device is used for verifying the certificate sent by the trust center;
the public key distribution module: for broadcasting the public key to the end node;
a certificate encryption module: for encrypting the certificate with the private key;
RSA private key receiving module: receiving a private key sent by a terminal node;
AES key decryption module after RSA encryption: calling a corresponding private key from an RSA private key receiving module, and decrypting the AES private key by using the private key;
the terminal node is provided with the following modules:
a public key receiving module: public key and certificate for receiving central node broadcast;
a terminal certificate verification module: the certificate verification system is used for verifying the certificate sent by the central node;
an AES password generation module: the method is used for randomly generating an AES password after the decrypted certificate is verified to be legal;
RSA public and private key generation module: generating a header file of a public key and a header file of a private key and a corresponding c file in an application layer by utilizing an RSA principle and a function contained in a Zstack protocol stack;
RSA encryption AES key module: the AES key is encrypted using a public key generated by the RSA technique.
By adopting the technical scheme, the Zigbee communication key is encrypted by utilizing the RSA algorithm, the communication keys between each terminal of the Zigbee and the coordinator are different, and the safe communication between each terminal and the coordinator is realized through the AES 128. And each terminal performs identity authentication on the coordinator through the public key issued by the coordinator to determine the validity of the coordinator. The communication keys of each terminal and the coordinator are in a safe encryption state, and other nodes cannot be easily captured and cracked. The communication keys between each terminal and the coordinator are different from each other. The invention loads the RSA asymmetric encryption method into the Zigbee equipment, effectively improves the reliability and the safety of wireless transmission by encrypting the transmission key, and more effectively solves the problem of Zigbee memory overflow possibly caused by overlong messages. The method can be widely applied to Zigbee transmission equipment needing high confidentiality, enhances the reliability and safety of Zigbee transmission, and prevents transmission messages from being cracked randomly.

Claims (7)

1. A Zigbee secure communication method based on RSA, the Zigbee network includes trust center, central node and terminal node, the trust center provides certificate and public and private key to each central node, the central node is used to broadcast the public key to the terminal node and use the private key to encrypt the certificate, each terminal node verifies the legitimacy of the central node based on the public key; the method is characterized in that: the Zigbee safety communication method comprises the following steps:
s1, the central node requests the certificate and the public and private keys from the trust center;
s2, the trust center returns the certificate and the public and private keys to the central node;
s3, the central node acquires and verifies the certificate, and when the certificate is successfully authenticated, the central node broadcasts the public key to all the terminal nodes;
s4, each terminal node applies for network access to the central node, the central node encrypts the certificate by using the private key and sends the certificate encrypted by the private key to the terminal node;
s5, the terminal node decrypts the encrypted certificate of the private key and verifies the validity of the decrypted certificate; when the decrypted certificate is verified to be legal, an AES password is randomly generated;
s6, the terminal node randomly generates two large prime numbers by using the function of the OSAL layer of Zigbee, and generates the public and private keys of RSA according to the two large prime numbers;
s7, the terminal node encrypts the AES password by using the public key generated by the RSA asymmetric cryptographic technique;
s8, the terminal node transmits the AES password and RSA private key encrypted by RSA to the central node;
and S9, after the central node decrypts and authenticates the AES password encrypted by the RSA private key and passes the decryption authentication, the central node and the corresponding terminal node perform subsequent communication by utilizing the AES password.
2. The RSA-based Zigbee secure communication method according to claim 1, characterized in that: the specific steps of step S6 are as follows:
s6-1, generating two random numbers by using a random number generation function osal _ rand of an osal layer in a Zstack protocol stack;
s6-2, judging whether the two random numbers are all prime numbers, if so, generating two prime numbers p and q, and executing the step S6-3; otherwise, executing step S6-1;
s6-3, under the condition that two prime numbers p and q are ensured to be unequal, directly multiplying the prime numbers p and q to obtain a public key n, namely n ═ p × q; s6-4, according to Euler' S function, the integer number which is not more than n and is prime to n is (p-1) × (q-1), and (p-1) × (q-1) is defined as fai _ n;
s6-5, randomly generating an integer e which is prime to fai _ n and not more than fai _ n according to fai _ n, and taking e as another public key;
s6-6, generating a private key d by the formula d × e ═ 1(mod fai _ n) based on fai _ n and e;
s6-7, destroying p and q, and using (n, e) as a public key and d as a private key.
3. A RSA-based Zigbee secure communication method according to claim 2, characterized in that: the specific steps of encrypting the AES cipher in step S7 are as follows:
s7-1, the AES cipher as Zigbee transmission key is converted into digital according to the appointed mode to form digital plaintext group;
s7-2, the digital plaintext group is encrypted one-to-one, and the encryption formula is as follows: c is me(modn), where c is ciphertext and m is plaintext.
4. A RSA-based Zigbee secure communication method according to claim 3, characterized in that: in step S9, according to the formula m ═ cd(modn) decrypts the cipher text of the AES cipher, and reverts to the original message.
5. The RSA-based Zigbee secure communication method according to claim 1, characterized in that: the central node is a coordinator.
6. The RSA-based Zigbee secure communication method according to claim 1, characterized in that: the terminal nodes comprise common terminals and routers.
7. The RSA-based Zigbee secure communication method according to claim 1, characterized in that: the central node is provided with the following modules:
the certificate and public and private key receiving module: a public key and a certificate for receiving trust center broadcast;
a central certificate verification module: the certificate verification device is used for verifying the certificate sent by the trust center;
the public key distribution module: for broadcasting the public key to the end node;
a certificate encryption module: for encrypting the certificate with the private key;
RSA private key receiving module: receiving a private key sent by a terminal node;
AES key decryption module after RSA encryption: calling a corresponding private key from an RSA private key receiving module, and decrypting the AES private key by using the private key;
the terminal node is provided with the following modules:
a public key receiving module: public key and certificate for receiving central node broadcast;
a terminal certificate verification module: the certificate verification system is used for verifying the certificate sent by the central node;
an AES password generation module: the method is used for randomly generating an AES password after the decrypted certificate is verified to be legal;
RSA public and private key generation module: generating a header file of a public key and a header file of a private key and a corresponding c file in an application layer by utilizing an RSA principle and a function contained in a Zstack protocol stack;
RSA encryption AES key module: the AES key is encrypted using a public key generated by the RSA technique.
CN201810141822.XA 2018-02-11 2018-02-11 Zigbee safety communication method based on RSA Active CN108173641B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810141822.XA CN108173641B (en) 2018-02-11 2018-02-11 Zigbee safety communication method based on RSA

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810141822.XA CN108173641B (en) 2018-02-11 2018-02-11 Zigbee safety communication method based on RSA

Publications (2)

Publication Number Publication Date
CN108173641A CN108173641A (en) 2018-06-15
CN108173641B true CN108173641B (en) 2021-12-21

Family

ID=62514172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810141822.XA Active CN108173641B (en) 2018-02-11 2018-02-11 Zigbee safety communication method based on RSA

Country Status (1)

Country Link
CN (1) CN108173641B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462480B (en) * 2018-11-08 2021-06-11 南京控维通信科技有限公司 Satellite communication system encryption method based on RSA and AES
CN111756699B (en) * 2020-05-28 2022-05-06 苏州浪潮智能科技有限公司 LLDP protocol optimization method and system based on asymmetric encryption

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222772B (en) * 2008-01-23 2010-06-09 西安西电捷通无线网络通信有限公司 Wireless multi-hop network authentication access method based on ID
US9553726B2 (en) * 2008-04-14 2017-01-24 Koninklijke Philips N.V. Method for distributed identification of a station in a network
US20110291803A1 (en) * 2010-05-27 2011-12-01 Zeljko Bajic Rfid security and mobility architecture
CN102355356A (en) * 2011-10-13 2012-02-15 国电南京自动化股份有限公司 Asymmetric encryption method suitable for ZIGBEE wireless meter reading
US9818315B2 (en) * 2013-06-04 2017-11-14 At&T Intellectual Property I, L.P. Secure multi-party device pairing using sensor data
CN103607710A (en) * 2013-12-02 2014-02-26 北京东方泰华投资有限公司 Quick connection method and device for wireless devices and intelligent terminal
CN103763699B (en) * 2014-01-22 2017-02-01 北京工业大学 wireless sensor network key management mechanism with intrusion detection function
CN104270751B (en) * 2014-04-19 2017-12-08 湘潭大学 Safety guarantee agreement based on received signal strength in wireless sensor network
CN104333860A (en) * 2014-10-31 2015-02-04 成都卫士通信息产业股份有限公司 ZigBee security network with public key cryptography system NTRU (number theory research unit)
CN106612505A (en) * 2015-10-23 2017-05-03 国网智能电网研究院 Wireless sensor safety communication and anti-leakage positioning method based on region division
CN105744522B (en) * 2016-04-29 2018-10-23 东北大学 A kind of WMN anonymous access authentication systems and method based on proxy ring signature

Also Published As

Publication number Publication date
CN108173641A (en) 2018-06-15

Similar Documents

Publication Publication Date Title
EP3529965A1 (en) System and method for configuring a wireless device for wireless network access
CN101442522B (en) Identification authentication method for communication entity based on combined public key
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
JP2012019511A (en) System and method of safety transaction between wireless communication apparatus and server
CN104754581A (en) Public key password system based LTE wireless network security certification system
CN110087240B (en) Wireless network security data transmission method and system based on WPA2-PSK mode
CN107682152B (en) Group key negotiation method based on symmetric cipher
CN103532713A (en) Sensor authentication and sharing key generating method, sensor authentication and sharing key generating system and sensor
CN101286849A (en) Authentication system and method of a third party based on engagement arithmetic
CN102523093A (en) Encapsulation method and encapsulation system for certificate-based key with label
CN114765534B (en) Private key distribution system and method based on national secret identification cryptographic algorithm
US20200351100A1 (en) Cryptographic method for verifying data
CN114826656A (en) Trusted data link transmission method and system
CN105577365A (en) Key consultation method and device for user' access to WLAN
CN111817850B (en) Anonymous group authentication method based on industrial Internet of things
CN114650173A (en) Encryption communication method and system
CN105099699A (en) Safe and high-efficiency communication method based on equipment of Internet of things and system
CN1472914A (en) High performance and quick public pin encryption
CN109218251B (en) Anti-replay authentication method and system
CN108173641B (en) Zigbee safety communication method based on RSA
CN111314065A (en) Data encryption transmission method, server and system based on virtual private network
CN117278330B (en) Lightweight networking and secure communication method for electric power Internet of things equipment network
CN104753682A (en) Generating system and method of session keys
CN114826659A (en) Encryption communication method and system
CN108199851B (en) Data secure transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant