CN111541668A - 一种基于区块链的能源物联网信息安全传输与存储方法 - Google Patents
一种基于区块链的能源物联网信息安全传输与存储方法 Download PDFInfo
- Publication number
- CN111541668A CN111541668A CN202010301195.9A CN202010301195A CN111541668A CN 111541668 A CN111541668 A CN 111541668A CN 202010301195 A CN202010301195 A CN 202010301195A CN 111541668 A CN111541668 A CN 111541668A
- Authority
- CN
- China
- Prior art keywords
- internet
- node
- things
- block chain
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010301195.9A CN111541668A (zh) | 2020-04-16 | 2020-04-16 | 一种基于区块链的能源物联网信息安全传输与存储方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010301195.9A CN111541668A (zh) | 2020-04-16 | 2020-04-16 | 一种基于区块链的能源物联网信息安全传输与存储方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111541668A true CN111541668A (zh) | 2020-08-14 |
Family
ID=71979952
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010301195.9A Pending CN111541668A (zh) | 2020-04-16 | 2020-04-16 | 一种基于区块链的能源物联网信息安全传输与存储方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111541668A (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039986A (zh) * | 2020-08-28 | 2020-12-04 | 刘凤 | 一种实现企业各部门之间的信息交互系统及方法 |
CN113079215A (zh) * | 2021-04-08 | 2021-07-06 | 华北电力大学(保定) | 一种基于区块链的配电物联网无线安全接入方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109728898A (zh) * | 2019-03-08 | 2019-05-07 | 湖南师范大学 | 基于区块链技术的物联网终端安全通信方法 |
CN110691088A (zh) * | 2019-09-29 | 2020-01-14 | 广东电网有限责任公司 | 一种基于区块链的物联网设备认证方法 |
-
2020
- 2020-04-16 CN CN202010301195.9A patent/CN111541668A/zh active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109728898A (zh) * | 2019-03-08 | 2019-05-07 | 湖南师范大学 | 基于区块链技术的物联网终端安全通信方法 |
CN110691088A (zh) * | 2019-09-29 | 2020-01-14 | 广东电网有限责任公司 | 一种基于区块链的物联网设备认证方法 |
Non-Patent Citations (1)
Title |
---|
赵艳杰: "基于区块链的物联网信息安全传输与存储研究", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039986A (zh) * | 2020-08-28 | 2020-12-04 | 刘凤 | 一种实现企业各部门之间的信息交互系统及方法 |
CN113079215A (zh) * | 2021-04-08 | 2021-07-06 | 华北电力大学(保定) | 一种基于区块链的配电物联网无线安全接入方法 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111639361B (zh) | 一种区块链密钥管理方法、多人共同签名方法及电子装置 | |
Shen et al. | Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things | |
Miao et al. | Secure multi-server-aided data deduplication in cloud computing | |
Banerjee et al. | Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT | |
CN101981890B (zh) | 安全工作组管理和通信的系统和方法 | |
CN111372243A (zh) | 基于雾联盟链的安全分布式聚合与访问系统及方法 | |
Lin et al. | A new strong-password authentication scheme using one-way hash functions | |
Liu et al. | Bua: A blockchain-based unlinkable authentication in vanets | |
Zhang et al. | Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT | |
CN108667616A (zh) | 基于标识的跨云安全认证系统和方法 | |
Xi et al. | ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV | |
CN113572765B (zh) | 一种面向资源受限终端的轻量级身份认证密钥协商方法 | |
CN111817850B (zh) | 一种基于工业物联网的匿名群组认证方法 | |
CN113873508A (zh) | 基于用户双公私钥的边缘计算双向认证方法及系统 | |
CN110737915A (zh) | 基于联盟链和隐式证书的抗量子计算匿名身份识别方法及系统 | |
CN111541668A (zh) | 一种基于区块链的能源物联网信息安全传输与存储方法 | |
Shen et al. | A secure and practical RFID ownership transfer protocol based on Chebyshev polynomials | |
Jin et al. | Heterogeneous online/offline signcryption for secure communication in Internet of Things | |
CN116599659B (zh) | 无证书身份认证与密钥协商方法以及系统 | |
Zhang et al. | Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment (s) | |
CN114826651B (zh) | 一种面向低轨卫星网络的轻量无证书认证方法 | |
CN114584975B (zh) | 一种基于sdn的抗量子卫星网络接入认证方法 | |
CN110740034A (zh) | 基于联盟链的qkd网络认证密钥生成方法及系统 | |
Huang et al. | A blockchain based fast authentication framework for iot networks with trusted hardware | |
CN102624748B (zh) | 一种对等网络的访问控制方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Hou Rui Inventor after: Yuan Meng Inventor after: Zhao Yunhao Inventor after: Hu Yang Inventor after: Ren Guowen Inventor after: Li Jianbin Inventor after: Chang Liang Inventor after: Liu Jiayue Inventor after: Ren Yuqi Inventor after: Fang Suwan Inventor before: Hou Rui Inventor before: Yuan Meng Inventor before: Zhao Yunhao Inventor before: Hu Yang Inventor before: Ren Guowen Inventor before: Li Jianbin Inventor before: Chang Liang Inventor before: Liu Jiayue Inventor before: Ren Yuqi Inventor before: Fang Suwan |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200814 |