CN108259174A - The update method of safety door unblocking key based on narrowband Internet of Things - Google Patents
The update method of safety door unblocking key based on narrowband Internet of Things Download PDFInfo
- Publication number
- CN108259174A CN108259174A CN201810368835.0A CN201810368835A CN108259174A CN 108259174 A CN108259174 A CN 108259174A CN 201810368835 A CN201810368835 A CN 201810368835A CN 108259174 A CN108259174 A CN 108259174A
- Authority
- CN
- China
- Prior art keywords
- key
- lock
- message
- smart lock
- updating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention relates to field of information security technology, more particularly to a kind of update method of the safety door unblocking key based on narrowband Internet of Things, this method is sequentially completed the smart lock key updating based on narrowband Internet of Things by intelligent lock system, the user key based on Transmission Control Protocol in 3G/4G networks updates, smart lock updates key and user and updates the effective unlocking instruction of cipher key match realization.Wherein based on the smart lock key updating of narrowband Internet of Things by cipher key delivery interaction mechanism, door latch device is allowed to pass through udp protocol and obtain key realize.This method is implemented to pertain only to administrator and smart lock and the interaction of user in entire key updating process, the participation of third-party server is not needed to, and by theory analysis and prototype experiment the result shows that, the program can obtain smaller communication and computing cost in reliably more new key simultaneously.
Description
Technical field
The present invention relates to field of information security technology, and in particular to a kind of safety door unblocking key based on narrowband Internet of Things
Update method.
Background technology
It is quick universal with mobile Internet, internet+deep development, people are increasingly dependent on intelligentized product
Service, intelligent door lock is one of typical case therein.Intelligent door lock on ordinary meaning includes card lock, Fingerprint Lock, coded lock,
Voiceprint lock, recognition of face lock etc..The use of these door locks or it is expensive, energy consumption is big, installation and deployment are inconvenient, as Fingerprint Lock,
Voiceprint lock and recognition of face lock, need mains-supplied;Management means is low, such as card lock and coded lock, without long-range
Management interface, O&M are costly.Tradesman is forced to design the novel intelligent door that can solve the problems, such as above-mentioned two aspect simultaneously
Lock.
The appearance of narrowband Internet of Things (Narrow Band Internet of Things, NB-IoT), to solve intelligent door
The these two aspects problem in lock field brings possibility.Based on cellular narrowband Internet of Things (Narrow Band Internet of
Things, NB-IoT) it is implemented on cellular network basis, required bandwidth is about 180KHz, can be deployed in original 2G, 3G, 4G
On network base station, lower deployment cost is low.NB-IoT focuses on low-power consumption and extensively covers (LPWA) Internet of Things (IOT) market, because of NB-
The IoT communication technologys have the advantages such as low-power consumption, wide covering, low cost, large capacity so that it can be widely used in a variety of vertical rows
Industry, such as logistic track, intelligent road-lamp, intelligent water, electricity, gas meter, intelligent garbage bin, the various fields of wisdom agricultural.These equipment
Mostly it is extensive and applying under unattended environment in large area, completes respective function simultaneously, has for a long time
With lock management person's communication function, so as in low installation, dispose, under operation cost, the efficient management function of equipment is completed.
Then, different from smart machine in general sense, intelligent door lock is the last line of defense of safe household how
Provide easily door lock service of goods simultaneously, ensure the high security of door lock, be intelligent door lock design must take into consideration it is primary
Problem.In general, having the intelligent door lock of remote management capability, such as has the door lock of GPRS, WiFi communication interface, whether user has
There is the permission of opening door lock equipment, be all that administrator distributes key to determine by remote online.Smart lock system as shown in Figure 1
Mainly there is three classes entity in system, respectively user, smart lock, administrator (is usually performed by the server of administrator's O&M
Role function).Key manager and key demander can be divided into according to function, user and smart lock are key demanders,
Key manager is lock management person.For security consideration, the unlocking instruction that user is sent to smart lock is needed using specific close
Key is encrypted, and only in cipher key match, smart lock could obtain effective unlocking instruction, unlock.And certain specific
Under occasion, if government's public affairs are rented a house and personal rental housing, building management side or the owner need control door lock key permission namely
Management and control is carried out to associated user's unlocking authority, this just needs to be updated user's unblocking key.
Using GPRS or the intelligent door lock of WiFi communication mode, although user's unblocking key can reliably be updated,
They need larger communication overhead, it is difficult to long-play.And the intelligent door lock of NB-IoT communication modes is used, although greatly
Communication overhead is reduced, substantially prolongs the intelligent door lock working time, but low due to being used in the design of the NB-IoT communication technologys
Power consumption operation mode so that it employs insecure UDP communication protocols to transmit data, and meeting maximum probability faces door lock key more
The problem of new failure, and door lock key once updates failure, may result in user can not unlock.Researcher also proposed thus
The methods of UDT, AUDP of RBUDP, GUI et al., improves the unstability in UDP transmission, but these methods needs are set manually
Transmission rate is put, seems less suitable under key updating this application background, and if the transfer rate of setting is higher than
Network status at that time, it may occur that it is a large amount of to retransmit, easily cause the wasting of resources and congestion.
Therefore, it develops one kind to be suitable under the insecure UDP message transmission modes of existing NB-IoT, with as small as possible
It calculates and communication overhead, the reliable update method for completing user's unblocking key has great meaning.
Invention content
For the technical problems in the prior art, the purpose of the present invention is to provide a kind of based on narrowband Internet of Things
The update method of safety door unblocking key, this method energy is at a high speed, expense is few and steadily updates lock management person and smart lock hardware
The key updating of equipment, it is final to realize the update of safety door unblocking key.
To achieve the above object, the present invention provides a kind of update sides of the safety door unblocking key based on narrowband Internet of Things
Method, this method are sequentially completed the smart lock key updating based on narrowband Internet of Things, based in 3G/4G networks by intelligent lock system
The user key update of Transmission Control Protocol, smart lock update key and user update cipher key match realize effective unlocking instruction, wherein base
Include the following steps in the smart lock key updating of narrowband Internet of Things:
(1) new key that generation user unlocks;
(2) for smart lock to lock management person's upload information, lock management person sends initial key update message to smart lock, and waits
Confirmation message to be passed back;
(3) smart lock receive initial key update message after to lock management person send confirmation message;
(4) if lock management person receives the confirmation message that the smart lock returns, lock management person sends true to smart lock
Recognize key updating message;
If lock management person does not receive the confirmation message that the smart lock returns, lock management person retransmits initial to smart lock
Key updating message if lock management person does not receive confirmation message after Nmax times retransmits, judges that this key updating is lost
It loses, lock management person terminates to retransmit and to receiving confirmation message corresponding equipment hair if receiving confirmation message within retransmit Nmax time
It send and confirms key updating message, the Nmax updates message maximum retransmission for initial key;
(5) smart lock sends information using current key to lock management person, if administrator, which receives, confirms key more
The then smart lock key updating success of new message if lock management person receives sends information with old key, informs that lock management person updates
Failure, both sides are continuing with old key and carry out the key updating negotiation of a new round.
Further, as long as smart lock has received initial key update message and confirms any in key updating message
Key updating message will stop renewal process.
Further, the initial key update message maximum retransmission Nmax is preset fixed for intelligent lock system
Value.
Further, the initial key update message maximum retransmission Nmax is dynamically changed according to Network status.
Further, initial key update message includes new key and close for more new stage that identifies current key
Key more new logo, temporal information are identified containing key updating.
Further, it is described to confirm that key updating message includes the key updating mark for more new stage that identifies current key
Knowledge and temporal information, not comprising new key.
Further, the user key update carries out after smart lock key updating success, so as to ensure to use
The consistency of family mobile phone key and smart lock key.
Compared with prior art, the beneficial effects of the present invention are:
(1) update method of the safety door unblocking key provided by the invention based on narrowband Internet of Things passes through NB-IoT networks
The resource-constrained UDP transmission services provided, realize close between alap expense completion lock management person and smart lock
Key updates and keeps cipher consistency;
(2) update method of the safety door unblocking key based on narrowband Internet of Things that the present invention can provide substantially reduces key
Average delay is updated, improves and is updated to power, so as to fulfill best energy consumption and safe and reliable sexual balance;
(3) method of the invention pertains only to administrator and smart lock and the friendship of user in entire key updating process is implemented
Mutually, the participation of third-party server is not needed to.
Description of the drawings
Fig. 1 is intelligent lock system Organization Chart;
Fig. 2 is the smart lock key updating flow chart of the present invention;
Fig. 3 is P in embodiment 3lWhen=0.6, three kinds of scheme key updating success rate result schematic diagrams;
Fig. 4 is P in embodiment 3lWhen=0.4, three kinds of scheme key updating success rate result schematic diagrams;
Fig. 5 is P in embodiment 3lWhen=0.2, three kinds of scheme key updating success rate result schematic diagrams;
Fig. 6 is average cipher code renewal time comparative result schematic diagram in embodiment 3;
Fig. 7 is the performance comparison result schematic diagram under heterogeneous networks situation and maximum retransmission in embodiment 3.
Specific embodiment
It shows that example illustrates certain embodiments of the present invention, and should not be construed as the model of the limitation present invention
It encloses.Present disclosure can be improved from material, method and reaction condition simultaneously, all these improvement should all
It falls within the spirit and scope of the present invention.
Fig. 1 is intelligent lock system Organization Chart, as shown in Figure 1, mainly there is three classes entity in intelligent lock system, is respectively used
Family, smart lock, lock management person (usually by the server executive role function of administrator's O&M).In system, lock management person
Believable, he ensures that the key for being sent to user and lock is correct, and will not get around system administration mechanism, with user or
The sealed scheme of person sends the key that should not be obtained by user or lock, will not give Key Exposure to unrelated third party.User is half
Honest, i.e., user can abide by system key update scheme, but he can give information using existing system as much as possible, without close
In the case of key or key expiration, unlock.Lock is safely controllable, will not be kidnapped by the external world.Malice is not considered herein
The active attack behavior of user, such as user's violence unlocks or malice implements dos attack, it is all newer to system key to attack
It hits and is only set in the communication process to key updating and data transmission, including eavesdropping, man-in-the-middle attack etc..
Based on intelligent lock system shown in FIG. 1, the update method of safety door unblocking key of the invention, which is sequentially completed, to be based on
The smart lock key updating of narrowband Internet of Things, the user key based on Transmission Control Protocol in 3G/4G networks update, smart lock more Xinmi City
Key updates cipher key match with user and realizes effective three steps of unlocking instruction, wherein the smart lock key based on narrowband Internet of Things is more
New method includes following 5 steps, as shown in Figure 2:
1st, the generation phase for the new key that user unlocks
This stage must assure that the randomness of new key, can not be obtained by attacker, by generating one in this programme
Random number R andom and timestamp respectively using hash function operation, generate two 64bit cryptographic Hash, form a 128bit
Key.
2nd, lock management person sends the initial key update message stage
For smart lock to lock management person's upload information, lock management person sends initial key update message to smart lock, and waits for
Pass confirmation message back, the initial key update message include new key and for more new stage that identifies current key key more
New logo, temporal information are identified containing key updating.
3rd, initial key update message confirmation stage
Smart lock receives and sends confirmation message to lock management person after initial key update message, and lock management person will receive
Confirmation message is compared with the initial key update message most started, and specific method is believed for the update that smart lock receives first
Breath one Boolean set of composition, judges each element in set, if element value is equal to 1, corresponding smart lock will
Confirmation message is sent to lock management person, the confirmation message received can be formed a new Boolean set by lock management person, close with sending
The set of key update number is compared, and lock management person sends to smart lock if two values are equal confirms key updating message, if
Two unequal then lock management persons of value will retransmit initial key update message to smart lock.It is described true in order to save communication overhead
Recognize key updating message and include the key updating mark for more new stage that identifies current key, temporal information mark containing key updating
Know, and not comprising new key.
4th, retransmission phase
The confirmation message received is compared lock management person with the initial key update message most started, if sent
Initial key update message, which does not receive confirmation message, can then repeat the operation of second step, so as to which lock management person will be to smart lock
Retransmit initial key update message.But if without a kind of security mechanism ensure retransmit be more than certain restrictions after can interrupt this behaviour
Make, system will be absorbed in Infinite Cyclic re-transmission when network condition extremely deteriorates, and cause system crash, and design is a kind of thus
Mechanism, we set maximum retransmission Nmax to limit number of retransmissions.If lock management person does not receive after Nmax times retransmits
To confirmation message, then judge that this key updating fails, lock management person terminates if receiving confirmation message within retransmit Nmax times
It retransmits and confirms key updating message to receiving the corresponding equipment of confirmation message and sending.In the present invention, initial key update message
Maximum retransmission Nmax can be the preset definite value of intelligent lock system;For network signal it is excessively poor when, initially
Key updating message maximum retransmission Nmax can also be according to Network status dynamic change, so as to ensure key updating success.
5th, confirm key updating message confirmation stage
Smart lock sends information using current key to lock management person, if lock management person receives confirmation key updating
Message then smart lock key updating success if lock management person receives sends information with old key, is informed that lock management person updates and is lost
It loses, both sides are continuing with old key and carry out the key updating negotiation of a new round.
In the inventive solutions, as long as smart lock has received initial key update message and confirms key updating report
Any key updating message will stop renewal process in text.
For user key renewal process, since user mobile phone can reliably carry out key updating with lock management person, in order to
Ensure that user can normally unlock, the key of user is designed to sluggish update, also in order to ensureing user mobile phone key and intelligence
The consistency of key can be locked, mobile phone key has to after lock key updating success, can carry out.On the other hand, Yong Humi
The update type of message of key will lack as far as possible, and include key information as far as possible.User key update is using in 3G/4G networks
Transmission Control Protocol reliably updates completion, and specific method can be found in document:Comer D E.Internetworking with TCP/
IP. [M] People's Telecon Publishing Houses, 1998.
Embodiment 1:Smart lock key updating method
Table 1
This example demonstrates that the meaning representated by the middle symbol used is as shown in table 1.Since smart lock generally passes through dry electricity
Pond powers, and cannot use and calculate and the excessive key updating of communication overhead on the connectionless Message Services of UDP provided in NB-IoT
Scheme.And the first function of smart lock is that correct key user is allowed normally to unlock and can not unlock without correct key user.
Specifically, at a time t, lock management person LM have found user UiUnblocking key beforeChanged, needed
It is updated to current new keyIt is assumed that smart lock SLiIn order to which the communication overhead of more new key is between LM
CommLM→SLi, then the present embodiment is the Scheme of Key Update established on a kind of resource-constrained UDP transmission mechanismsMin(CommLM→SLi) so thatIn the network of NB-IoT, smart lock key updating method establishes following mechanism:
1st, the generation for the new key that user unlocks
It locks after passing its record information of unlocking, LM begins preparing for updating required new key Wherein i=n, to ensure the safety of key, keyGeneration is as follows:
Wherein Random () generates 8 decimals and Random () ∈ [0,1], t for a random functionnFor LM
The timestamp of time, h () are Hash hash function, and it is also current for Encryption Algorithm of new generation to take SHA3-64, SHA3 herein
The highest hash algorithm of security intensity, 64bit patterns will generate a 64bit cryptographic Hash, we by random value and
Timestamp carries out SHA3-64 operations respectively, and obtain two 64bit cryptographic Hash are assembled into the new key of 128bit.
2nd, lock management person sends initial key update message
After new key generation, it is assumed that LM needs to send newer key for i-th of smart lock SLiLM is to smart lock
SL passes the first secondary keyWherein i=n, it is initial key that key updating packet the inside, which identifies this,
Message is updated, and waits for the response of lock, initial key update message packet is denoted as Key_Pack#1, and composition is as follows:
Wherein, we have made some improvements udp protocol, increase a UID field in its stem, increase in its tail portion
One C field, specifically, UID fields are used to identify the unique ID of equipment for 2 bytes, to ensure that smart lock SL information is believed with LM
Consistency is ceased, C fields are check field, store 16 cyclic redundancy checks, tsTo send information time,Being i.e. will be newer new
Key, IDiFor the newer identification number of current key, E () is a symmetric cryptographic algorithm, such as AES, meanwhile, for each not
The key consulted when carrying out key updating with equipment, before useCome to new key in message and key updating identifier
Encryption.
3rd, initial key update message confirms
For all equipment for carrying out key updating, we define a boolean set BN to indicate whether to receive Key_
Pack#1.BN={ bn1,bn2,…,bni, wherein i=n, after user receives and is successfully updated key, to bni=1 corresponding sets
Preparation send confirmation message message, and LM is waited for send and confirms key updating message, and confirmation message is denoted as Ack, and composition is as follows:
Wherein M is confirmation message, comprising necessary equipment and key corresponding informance, for identifying some key sent out more
Whether new packet is received.
4th, lock management person, which sends, confirms key updating message
The situation of the confirmation message Ack of SL transmissions is received for LM, we define a boolean set BM={ bm1,
bm2,…,bmi, LM is to calculating F1={ k1∧bm1,k2∧bm2,…,ki∧bmi, forki∧bmi=1, hair
Second of update key packet is sent, it is to confirm key updating message that this is identified inside key packet, is denoted as Key_Pack#2, Key_
Pack#2 compositions are as follows:
5th, it retransmits
The situation of the confirmation message Ack of lock is not received for LM, LM is to calculating F1={ k1⊕bm1,k2⊕bm2,…,ki
⊕bmi, forki⊕bmi=1, LM do not receive the confirmation message Ack of lock, continue retransmission information Rem, Rem
Composition is as follows:
Key_Pack#2 is passed again after receiving the confirmation message Ack of lock.Increase RT fields in Rem for indicating number of retransmissions,
LM only can pass N in totalmaxSecondary initial key updates message, if RT>NmaxWhen, the still initial key update message of transmission, table
Bright both sides this time key updating failure, both sides are continuing with original cipher key.
SL certain interval of time sends status information with old key again, shows that key updating is failed, the two is opened again
Open key agreement.
6th, confirm that key updating message confirms
Under normal circumstances it cannot be guaranteed that Key_Pack#2 is centainly sent to, SLi is set thus and is used afterwards for a period of time currentlyInformation is sent to LM, the smart lock key updating success if LM is received and confirmed key updating message, if LM is received with old
Key sends information, then informs that LM updates do not complete, both sides are continuing with old key, to ensure cipher consistency, are carried out at the same time
The key updating of a new round is negotiated.
The pseudocode of the smart lock key updating method of the present embodiment is as follows:
In this method, no matter whether key is updated successfully, and LM is by being Ack that SLi is sent and reporting information and determine SLi
Which kind of key used;SLi decides whether to use by the way that whether LM sends Key_Pack#2This ensures that LM can ensure Ui
It usesIt is used with SLiAlways consistent, i.e., whenever authorized user can normally unlock.
By the above method, LM is sentLater, with regard to user can be made to unlock with smart lock using kt SLi, or otherwise
It can assert that SLi does not receive Key_Pack#1 because Ack is not received and start to retransmit or just because of information that SLi is sent later
It is middle to useAssert update failure.
Embodiment 2:Dynamic and intelligent locks key updating method
Power is updated in order to continue reduction communication overhead and raising, the present embodiment increases on the basis of embodiment 1
The function of number of retransmissions is dynamically changed according to Network status.
It is wanted during key updating there are efficiency of transmission, key updating success rate and three aspect of average renewal time
It asks, with AUDP (referring to document in efficiency of transmission:Liu Xizuo, Zhou Jing, big data packet transmittings of beam Deqing based on UDP
[J] telecom technologies, 2012,52 (01):96-100) as a comparison, with AES/ECBPKCS5 cipher modes generation key (referring to
Document:HUANG C W,YEN C L,CHIANG C H,et al.The five modes AES applications in
sounds and images[C]//proc of the 6th International Conference on Information
Assurance and Security.2010:28-31;Xia Chunlin, Zhou Deyun, the efficient side of realization of the CUDA of Kun .AES algorithms
Method [J] computer application is studied, 2013,30 (06):1907-1909), key data part is 16 bytes, is carried out by formula
AUDP efficiencies of transmission and the efficiency of transmission of algorithm is calculated, by changing TwWith the value of N carry out assay optimization key updating into
Power and average renewal time carry out dynamic and achieve the purpose that meet user demand.
Define algorithm evaluation function Eval:
Eval=(1-Ps)*Tavg (6)
T is found by algorithm evaluation function Eval valuesWWith the optimal solution of N.
LM first forCorresponding lock is sent to, interlocking receives the information composition BN that LM methods are come, forRegulation wherein 1 is represented and is received, and 0 representative does not receive, for Lock will give LM
Confirmation message is sent, the confirmation message received is formed BM by LM, forLM will be to corresponding
Lock be sent to second of key updating information, represent entire key updating process and complete, in this process entire renewal time
For:
Ttotali=TKey_Pack#1+Tprop+TAck+Tprop+TKey_Pack#2+Tprop (7)
It is bm to also have a dvielement during thisi∈BM∧bmi=0, for this dvielement, comparison k that LM can be one by onei
∈ K,And bmi∈ BM,ForThis represents key updating process
Middle generation packet loss, LM will retransmit lock first time key updating information, and maximum re-transmission number is no more than set-point Nmax,
It retransmits and spends time calculation formula as follows:
It is certain to that key updating information occurs in actual key renewal process or confirmation message is lost, the time is spent by retransmitting
It is incorporated to formula (7) and obtains complete cipher code renewal time calculation formula:
Wherein N≤Nmax, TtotaliThe total time spent by each key updating, the N=if key updating not successfully
Nmax, after having obtained each key updating and having taken time, we can be derived by key and be averaged renewal time:
Wherein | K | for element sum in set, set is established for the element that BM element values are 1Key updating success rate can be expressed as key updating and successfully count divided by key
Updating sum is:
Formula (10) and formula (11) are substituted into formula (6) and can obtain complete valuation functions expression formula:
This function gives the benefit that smart lock key updating method is brought in embodiment 1 and the cum rights of loss is quantitatively commented
Estimate result.Based on this function, it is proposed that the reliable update scheme of dynamic security door lock key, pseudocode represents as follows:
Wherein N is represented currently to be retransmitted for which time, NmaxMaximum retransmission is represented, when N is more than maximum retransmission,
NmaxIt is corresponding to increase a unit, on the contrary then one unit of reduction.By the parameter in Modification growth function, dynamically to determine key more
Re-transmission maximum times and waiting acknowledging time in new, reduce communication overhead and raising are updated to power, to reach this key more
The purpose that new departure optimizes.
Embodiment 3:Safety door latch key updating method Performance Evaluation
The present embodiment is used to test the key updating of the safety door latch key updating method of this present invention under various circumstances
Success rate and renewal time.
1st, test environment
LM is configured to Inter (R) Xeon (R) CPU E5-2682v4@2.50GHz processors, 2GB main memories,
The performance parameter of MSP430F5438A is 16 super low-power consumption microcontrollers, and 256KB flash memories, 16KBRAM uses narrowband network
Communication module is moves remote BC95, upstream rate 62.5kbps, downstream rate 24kbps.
2nd, performance evaluation
(1) influence of the Network status to scheme performance
The maximum retransmission Nmax and NB- that the key updating success rate of the key updating method of the present invention is mainly set
Network packet loss rate P in IoTlIt is related, smart lock is placed under varying environment, is carried out telecommunication with Ali cloud lock management person, is surveyed
2000 communication experiments are tried, and its average packet loss ratio PlAs herein with reference to index.By theory analysis, it is updated to power
It will increase with the reduction of packet loss.Choose Pl=0.2, Pl=0.4, Pl=0.6 in the environment of, respectively carry out RSKU,
AUDP is (referring to document:Liu Xizuo, Zhou Jing, big data packet transmitting [J] the telecom technologies of beam Deqing based on UDP, 2012,
52(01):96-100), the experiment of tri- kinds of scheme key updating success rates of DRSKU, experimental result is as shown in Fig. 3, Fig. 4 and Fig. 5.
Fig. 3,4,5 show RSKU, DRSKU and AUDP scheme of the present embodiment proposition in heterogeneous networks, key
The variation of power is updated to, compares and obtains:In setting NmaxWhen=2, RSKU and AUDP schemes for key in NB-IoT networks more
New success rate is close, and DRSKU can change according to network condition, dynamically set number of retransmissions, institute best to achieve the effect that
With DRSKU in three kinds of schemes success rate highest.
(2) propagation delay time and scheme evaluation
An important factor for cipher code renewal time is another influence scheme performance, the present embodiment is positioned at Hubei University's computer
Experimental center tests tri- kinds of schemes of RSKU, DRSKU and AUDP and is averaged cipher code renewal time, three kinds of schemes be averaged key updating when
Between test result it is as shown in Figure 6.
From Fig. 6 test results can be seen that carry out key updating when, RSKU than AUDP be averaged renewal time reduction 32%,
And DRSKU average renewal times compared with AUDP reduce 15%;Maximum retransmission Nmax, secret key be updated to power PsAnd network
Packet loss PlThe performance of this programme will all be had an impact.These parameters are adjusted respectively, and are passed through valuation functions Eval and carried out
The performance of scheme compares under different parameters.Fig. 7 has reflected part comparison result:
Fig. 7 results are shown as Network status deteriorates (packet loss PlIt is increasing), when the present embodiment performance is best
Maximum retransmission NmaxAlso it is increasing.This embodies dynamic and intelligent lock key updating method and can be adjusted according to the tendency of user
Maximum retransmission, with the usage experience for giving user best.From these results it can also be seen that, can using dynamic security door lock key
It to be got well using the performance of AUDP progress key updatings by the performance ratio of update scheme.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto,
Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (7)
1. a kind of update method of the safety door unblocking key based on narrowband Internet of Things, this method are complete successively by intelligent lock system
Into the smart lock key updating based on narrowband Internet of Things, based on the user key update of Transmission Control Protocol, smart lock in 3G/4G networks
It updates key and user update cipher key match and realizes effective unlocking instruction, which is characterized in that the smart lock based on narrowband Internet of Things
Key updating includes the following steps:
(1) new key that generation user unlocks;
(2) for smart lock to lock management person's upload information, lock management person sends initial key update message to smart lock, and waits to be passed
Return confirmation message;
(3) smart lock receive initial key update message after to lock management person send confirmation message;
(4) if lock management person receives the confirmation message that the smart lock returns, lock management person confirms close to smart lock transmission
Key updates message;
If lock management person does not receive the confirmation message that the smart lock returns, lock management person retransmits initial key to smart lock
Message is updated, if lock management person does not receive confirmation message after Nmax times retransmits, judges that this key updating fails, if
Lock management person receives confirmation message and then terminates to retransmit and be sent really to receiving the corresponding equipment of confirmation message within retransmitting Nmax times
Recognize key updating message, the Nmax updates message maximum retransmission for initial key;
(5) smart lock sends information using current key to lock management person, if administrator, which receives, confirms key updating report
Literary then smart lock key updating success if lock management person receives sends information with old key, informs that lock management person updates failure,
Both sides are continuing with old key and carry out the key updating negotiation of a new round.
2. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature
It is, as long as smart lock has received initial key update message and confirms any key updating message in key updating message
It will stop renewal process.
3. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature
It is, the initial key update message maximum retransmission Nmax is the preset definite value of intelligent lock system.
4. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature
It is, the initial key update message maximum retransmission Nmax is dynamically changed according to Network status.
5. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature
Be, initial key update message include new key and for more new stage that identifies current key key updating mark,
Temporal information is identified containing key updating.
6. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature
It is, it is described to confirm that key updating message is included for the identify current key key updating mark of more new stage and time letter
Breath, not comprising new key.
7. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature
Be, user key update carries out after smart lock key updating success, so as to ensure user mobile phone key and
The consistency of smart lock key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810368835.0A CN108259174A (en) | 2018-04-23 | 2018-04-23 | The update method of safety door unblocking key based on narrowband Internet of Things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810368835.0A CN108259174A (en) | 2018-04-23 | 2018-04-23 | The update method of safety door unblocking key based on narrowband Internet of Things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108259174A true CN108259174A (en) | 2018-07-06 |
Family
ID=62748289
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810368835.0A Pending CN108259174A (en) | 2018-04-23 | 2018-04-23 | The update method of safety door unblocking key based on narrowband Internet of Things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259174A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040114A (en) * | 2018-09-05 | 2018-12-18 | 唯得智慧(湖北)科技有限公司 | Safe and reliable image transfer method based on narrowband Internet of Things |
CN109544747A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | Encryption key update method, system and the computer storage medium of intelligent door lock |
CN109995527A (en) * | 2019-04-12 | 2019-07-09 | 上海巨微集成电路有限公司 | Code key exchange method, device, host computer, slave computer and storage medium |
CN110139273A (en) * | 2019-05-31 | 2019-08-16 | 无锡东源工业自动化有限公司 | A kind of safety encryption and system for Internet of Things wireless transmission |
CN113611020A (en) * | 2021-08-31 | 2021-11-05 | 龙芯中科(金华)技术有限公司 | Intelligent lock control method, device and equipment |
CN113936362A (en) * | 2021-10-14 | 2022-01-14 | 广东电网有限责任公司东莞供电局 | Transformer substation safety region prevention and control method and system based on Internet of things and face recognition |
CN114293846A (en) * | 2021-11-16 | 2022-04-08 | 武汉小安科技有限公司 | Unlocking control method and device for battery compartment lock, electronic equipment and storage medium |
CN114614985A (en) * | 2022-05-12 | 2022-06-10 | 施维智能计量系统服务(长沙)有限公司 | Communication key updating method, key server and readable storage medium |
CN115603901A (en) * | 2022-09-28 | 2023-01-13 | 杭州粒合信息科技有限公司(Cn) | Key updating method, device, acquisition terminal equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102677987A (en) * | 2012-05-17 | 2012-09-19 | 黎荣金 | Control device of intelligent electronic password lock, control method thereof and management system thereof |
CN104282058A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function |
CN106355772A (en) * | 2016-10-12 | 2017-01-25 | 杭州行我行网络有限公司 | Smart coded lock and system for bicycle and operation method thereof |
CN106652117A (en) * | 2016-10-14 | 2017-05-10 | 张智 | Method and system for enabling dynamic passwords to realize offline unlocking, mobile terminal and server |
CN106934886A (en) * | 2017-02-28 | 2017-07-07 | 南京东屋电气有限公司 | A kind of dynamic puzzle-lock OTC keys are set and update method |
US20170250806A1 (en) * | 2016-02-25 | 2017-08-31 | Arm Ip Limited | Methods and resources for generating secure communications |
CN107195061A (en) * | 2017-07-07 | 2017-09-22 | 东峡大通(北京)管理咨询有限公司 | The control method and system of a kind of intelligent bicycle lock, intelligent bicycle lock |
CN107244364A (en) * | 2017-07-06 | 2017-10-13 | 东峡大通(北京)管理咨询有限公司 | A kind of lock control device, control method, lock and lock control system |
CN107730676A (en) * | 2017-09-29 | 2018-02-23 | 东峡大通(北京)管理咨询有限公司 | Unlocking method, device and the storage medium of the vehicles |
-
2018
- 2018-04-23 CN CN201810368835.0A patent/CN108259174A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102677987A (en) * | 2012-05-17 | 2012-09-19 | 黎荣金 | Control device of intelligent electronic password lock, control method thereof and management system thereof |
CN104282058A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function |
US20170250806A1 (en) * | 2016-02-25 | 2017-08-31 | Arm Ip Limited | Methods and resources for generating secure communications |
CN106355772A (en) * | 2016-10-12 | 2017-01-25 | 杭州行我行网络有限公司 | Smart coded lock and system for bicycle and operation method thereof |
CN106652117A (en) * | 2016-10-14 | 2017-05-10 | 张智 | Method and system for enabling dynamic passwords to realize offline unlocking, mobile terminal and server |
CN106934886A (en) * | 2017-02-28 | 2017-07-07 | 南京东屋电气有限公司 | A kind of dynamic puzzle-lock OTC keys are set and update method |
CN107244364A (en) * | 2017-07-06 | 2017-10-13 | 东峡大通(北京)管理咨询有限公司 | A kind of lock control device, control method, lock and lock control system |
CN107195061A (en) * | 2017-07-07 | 2017-09-22 | 东峡大通(北京)管理咨询有限公司 | The control method and system of a kind of intelligent bicycle lock, intelligent bicycle lock |
CN107730676A (en) * | 2017-09-29 | 2018-02-23 | 东峡大通(北京)管理咨询有限公司 | Unlocking method, device and the storage medium of the vehicles |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040114A (en) * | 2018-09-05 | 2018-12-18 | 唯得智慧(湖北)科技有限公司 | Safe and reliable image transfer method based on narrowband Internet of Things |
CN109040114B (en) * | 2018-09-05 | 2021-02-26 | 唯得智慧(湖北)科技有限公司 | Safe and reliable image transmission method based on narrow-band Internet of things |
CN109544747A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | Encryption key update method, system and the computer storage medium of intelligent door lock |
CN109995527A (en) * | 2019-04-12 | 2019-07-09 | 上海巨微集成电路有限公司 | Code key exchange method, device, host computer, slave computer and storage medium |
CN110139273A (en) * | 2019-05-31 | 2019-08-16 | 无锡东源工业自动化有限公司 | A kind of safety encryption and system for Internet of Things wireless transmission |
CN113611020A (en) * | 2021-08-31 | 2021-11-05 | 龙芯中科(金华)技术有限公司 | Intelligent lock control method, device and equipment |
CN113936362A (en) * | 2021-10-14 | 2022-01-14 | 广东电网有限责任公司东莞供电局 | Transformer substation safety region prevention and control method and system based on Internet of things and face recognition |
CN114293846A (en) * | 2021-11-16 | 2022-04-08 | 武汉小安科技有限公司 | Unlocking control method and device for battery compartment lock, electronic equipment and storage medium |
CN114614985A (en) * | 2022-05-12 | 2022-06-10 | 施维智能计量系统服务(长沙)有限公司 | Communication key updating method, key server and readable storage medium |
CN115603901A (en) * | 2022-09-28 | 2023-01-13 | 杭州粒合信息科技有限公司(Cn) | Key updating method, device, acquisition terminal equipment and storage medium |
CN115603901B (en) * | 2022-09-28 | 2024-08-09 | 杭州粒合信息科技有限公司 | Key updating method and device, acquisition terminal equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108259174A (en) | The update method of safety door unblocking key based on narrowband Internet of Things | |
Zhao et al. | A novel mutual authentication scheme for Internet of Things | |
CN110234111A (en) | A kind of two-factor authentication key agreement protocol suitable for multiple gateway wireless sensor network | |
CN109728898A (en) | Internet-of-things terminal safety communicating method based on block chain technology | |
CN101317359A (en) | Method and device for generating local interface cryptographic key | |
CN109040114A (en) | Safe and reliable image transfer method based on narrowband Internet of Things | |
Kgwadi et al. | Securing RDS broadcast messages for smart grid applications | |
Park et al. | Symmetric key-based authentication and the session key agreement scheme in IoT environment | |
WO2023236551A1 (en) | Decentralized trusted access method for cellular base station | |
CN112770321A (en) | Internet of things equipment authentication and secure transmission method, computer equipment and storage medium | |
Li et al. | An anonymous authentication and key agreement protocol in smart living | |
CN112311553B (en) | Equipment authentication method based on challenge response | |
Maleh et al. | Towards an efficient datagram transport layer security for constrained applications in Internet of Things | |
Feng et al. | Formal security analysis and improvement based on LonTalk authentication protocol | |
Ma et al. | DScPA: A Dynamic Sub-cluster Privacy-preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT | |
Zou et al. | Information Security Transmission Technology in Internet of Things Control System. | |
Ahmed et al. | Optimizing V2G Dynamics: An AI-Enhanced Secure Protocol for Energy Management in Industrial Cyber-Physical Systems | |
Lucks et al. | Concrete security for entity recognition: The Jane Doe protocol | |
Ambarkar et al. | An efficient authentication technique to protect iot networks from impact of rpl attacks | |
Faye et al. | A user authentication-based probabilistic risk approach for Wireless Sensor Networks | |
CN110224827A (en) | A kind of edge gateway of internet of things of encryption | |
Pradeep et al. | Formal Verification of CHAP PPP authentication Protocol for Smart City/Safe City Applications. | |
Jamroga et al. | Scalable Verification of Social Explainable AI by Variable Abstraction. | |
Renjith et al. | An improved trust-based security framework for IoT Health Care Monitoring System | |
Ya-tao et al. | A novel authentication scheme based on trust-value updated model in adhoc network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180706 |
|
RJ01 | Rejection of invention patent application after publication |