CN112311793A - Internet of things communication method - Google Patents

Internet of things communication method Download PDF

Info

Publication number
CN112311793A
CN112311793A CN202011185633.6A CN202011185633A CN112311793A CN 112311793 A CN112311793 A CN 112311793A CN 202011185633 A CN202011185633 A CN 202011185633A CN 112311793 A CN112311793 A CN 112311793A
Authority
CN
China
Prior art keywords
server
user
internet
things
communication method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011185633.6A
Other languages
Chinese (zh)
Inventor
赵兰普
金帆
岳鹏飞
张沛昌
王颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Academy Of Sciences Institute Of Applied Physics Co ltd
Henan Academy of Sciences
Original Assignee
Henan Academy Of Sciences Institute Of Applied Physics Co ltd
Henan Academy of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Academy Of Sciences Institute Of Applied Physics Co ltd, Henan Academy of Sciences filed Critical Henan Academy Of Sciences Institute Of Applied Physics Co ltd
Priority to CN202011185633.6A priority Critical patent/CN112311793A/en
Publication of CN112311793A publication Critical patent/CN112311793A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses a communication method of the Internet of things, which comprises the following steps: the user side sends a handshake instruction to the authentication authorization server; after the authentication authorization server receives the handshake instruction, judging whether the user is a registered user, and if so, returning to the address of the jump server; and after receiving the returned jump server address, the user side establishes communication connection with the service server according to the jump server address. Compared with the prior art, the embodiment of the invention provides an Internet of things communication method, a handshake instruction load balancing server is used for obtaining a service server address, the clustered deployment of an Internet of things server side is completed, a legal encryption key is obtained through a device registration instruction, the subsequent data communication is encrypted, the data safety is ensured, the instruction purpose can be known only by analyzing an Action in a service layer, and the Action support extension enables a protocol support to update and extend the networking service.

Description

Internet of things communication method
Technical Field
The invention relates to the technical field of communication, in particular to a novel protocol Internet of things communication method.
Background
For the application of the communication of the internet of things, a common server is connected with a plurality of user side equipment downwards, under the condition, the load imbalance of the server is easily caused, and meanwhile, the data security of the communication of the internet of things is very important.
Disclosure of Invention
The embodiment of the invention provides an Internet of things communication method, and aims to provide an Internet of things communication method which is safe and reliable in data and more balanced in server load.
In order to achieve the purpose, the technical scheme provided by the invention is as follows:
an Internet of things communication method comprises the following steps:
the user side sends a handshake instruction to the authentication authorization server to indicate the identity type of the user side;
after the authentication authorization server receives the handshake instruction, judging whether the user is a registered user, and if so, returning to the address of the jump server;
and after receiving the returned jump server address, the user side establishes communication connection with the service server according to the jump server address, wherein the jump server address is the address of the service server.
Wherein, in the step of judging whether the user is a registered user, if the user is a non-registered user,
returning a registration instruction to the user side;
and the user terminal performs registration according to the returned registration instruction to obtain communication authorization.
Wherein, the registration instruction in the step of returning the registration instruction to the user side comprises: whether to encrypt characters, protocol encryption type characters, and protocol encryption key characters.
Wherein, the handshake instruction that the user side sends to verifying the authorization server includes: and the Mac address, the version number and the protocol type number of the user side equipment.
When the user end does not perform any operation, the method further comprises the step of sending a ping instruction to the authentication authorization server at a set time to indicate that the user end is maintaining long connection with the service server.
The communication protocol formats among the user side, the authentication and authorization server and the service server all include: a byte identification bit, a byte sequence number bit, two bytes of data length bits and data bits.
Wherein the byte identification bits include identification request, response, error, encryption, compression information.
Compared with the prior art, the embodiment of the invention provides an Internet of things communication method, a handshake instruction load balancing server is used for obtaining a service server address, the clustered deployment of an Internet of things server side is completed, a legal encryption key is obtained through a device registration instruction, the subsequent data communication is encrypted, the data safety is ensured, the instruction purpose can be known only by analyzing an Action in a service layer, and the Action support extension enables a protocol support to update and extend the networking service.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a communication method of the internet of things according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a schematic diagram of a visual agricultural data platform system according to an embodiment of the present invention, where the communication method of the internet of things includes the following steps:
step S100, the user side sends a handshake instruction to the authentication and authorization server to indicate the identity type of the user side; the user terminal also refers to a user terminal device.
Step S200, after the authentication authorization server receives the handshake instruction, it is determined whether the user is a registered user
Step S300, if yes, returning to the address of the jump server; that is, in the communication method, a separate authentication and authorization server is provided to process requests of login, registration and the like of a user, so that the load of the server is balanced.
And step S400, after receiving the returned jump server address, the user side establishes communication connection with the service server according to the jump server address, wherein the jump server address is the address of the service server. That is, the user who has authorized the login is authenticated by the authentication and authorization server, and then jumps to the service server of the corresponding address according to the returned server address.
Wherein, in the step of judging whether the user is a registered user, if the user is a non-registered user, the following steps are executed,
step S500, returning a registration instruction to the user side; that is, according to the encrypted communication protocol format, the encrypted communication protocol format is returned to the user side, and the user side is prompted to register first so that login can be performed;
in step S600, the user terminal performs registration according to the returned registration instruction to obtain communication authorization. Namely, the registration process of the initial login is completed, and after the initial login is registered, encrypted communication can be carried out between the service server and the service server according to a new communication protocol of the internet of things.
Specifically, the step of returning the registration instruction to the user side includes: whether to encrypt characters, protocol encryption type characters, and protocol encryption key characters.
Wherein, the handshake instruction that the user side sends to verifying the authorization server includes: and the Mac address, the version number and the protocol type number of the user side equipment.
In another embodiment, the method further includes step S700 after the user end establishes a communication connection with the service server, and when the user end does not perform any operation, the method further includes the step of sending a ping to the authentication and authorization server at a set time to indicate that the user end is maintaining a long connection with the service server.
The communication protocol formats among the user side, the authentication and authorization server and the service server all include: a byte identification bit, a byte sequence number bit, two bytes of data length bits and data bits. Specifically, the protocol format is:
1 byte Flag +1 byte Sequence +2 bytes Length + N bytes Actionc Length + N bytes Actionc load Data + N bytes Data Length + N bytes Data load Data
1 byte identification bit, identifying request, response, error, encryption, compression, etc.;
1 byte sequence number for requesting response packet pairing;
2 bytes data length N, small end, indicating the length of the subsequent load data (not including the 4 bytes of the head), solving the problem of sticky packets
Protocol example: handshake instructions 0101080201010601010101
Wherein the byte identification bits include identification request, response, error, encryption, compression information.
Compared with the prior art, the embodiment of the invention provides an Internet of things communication method, a handshake instruction load balancing server is used for obtaining a service server address, the clustered deployment of an Internet of things server side is completed, a legal encryption key is obtained through a device registration instruction, the subsequent data communication is encrypted, the data safety is ensured, the instruction purpose can be known only by analyzing an Action in a service layer, and the Action support extension enables a protocol support to update and extend the networking service.
The above-mentioned embodiments are merely preferred examples of the present invention, and not intended to limit the present invention, and those skilled in the art can easily make various changes and modifications according to the main concept and spirit of the present invention, so that the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. An Internet of things communication method is characterized by comprising the following steps:
the user side sends a handshake instruction to the authentication authorization server to indicate the identity type of the user side;
after the authentication authorization server receives the handshake instruction, judging whether the user is a registered user, and if so, returning to the address of the jump server;
and after receiving the returned jump server address, the user side establishes communication connection with the service server according to the jump server address, wherein the jump server address is the address of the service server.
2. The communication method of internet of things of claim 1, wherein in the step of determining whether the user is a registered user, if the user is a non-registered user,
returning a registration instruction to the user side;
and the user terminal performs registration according to the returned registration instruction to obtain communication authorization.
3. The communication method of the internet of things according to claim 2, wherein the step of returning the registration instruction to the user terminal includes: whether to encrypt characters, protocol encryption type characters, and protocol encryption key characters.
4. The internet of things communication method of claim 1, wherein the handshake instruction sent by the user side to the authentication and authorization server comprises: and the Mac address, the version number and the protocol type number of the user side equipment.
5. The communication method of the internet of things as claimed in claim 1, further comprising the step of sending a ping to the authentication authorization server at a set time when the user terminal is not performing any operation, to indicate that the user terminal is maintaining a long connection with the service server.
6. The communication method of the internet of things according to claim 1, wherein the communication protocol formats between the user side, the authentication and authorization server and the service server each include: a byte identification bit, a byte sequence number bit, two bytes of data length bits and data bits.
7. The communication method of the internet of things as claimed in claim 6, wherein the byte identification bits comprise identification request, response, error, encryption, compression information.
CN202011185633.6A 2020-10-29 2020-10-29 Internet of things communication method Pending CN112311793A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011185633.6A CN112311793A (en) 2020-10-29 2020-10-29 Internet of things communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011185633.6A CN112311793A (en) 2020-10-29 2020-10-29 Internet of things communication method

Publications (1)

Publication Number Publication Date
CN112311793A true CN112311793A (en) 2021-02-02

Family

ID=74332266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011185633.6A Pending CN112311793A (en) 2020-10-29 2020-10-29 Internet of things communication method

Country Status (1)

Country Link
CN (1) CN112311793A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163072A (en) * 2007-08-10 2008-04-16 林明辉 Automatic selection optimized routing logon communication method of login server
CN101166094A (en) * 2007-08-10 2008-04-23 林明辉 A method for client to automatically log in the server via intelligent encryption mode
CN102882853A (en) * 2012-09-05 2013-01-16 孙银海 System and method for internet user authentication
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
WO2016116890A1 (en) * 2015-01-22 2016-07-28 Visa International Service Association Method and system for establishing a secure communication tunnel
CN110417886A (en) * 2019-07-29 2019-11-05 广州竞远安全技术股份有限公司 A kind of load-balancing method of integrated service, apparatus and system
CN111049901A (en) * 2019-12-11 2020-04-21 深圳市优必选科技股份有限公司 Load balancing method, load balancing system and registration server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163072A (en) * 2007-08-10 2008-04-16 林明辉 Automatic selection optimized routing logon communication method of login server
CN101166094A (en) * 2007-08-10 2008-04-23 林明辉 A method for client to automatically log in the server via intelligent encryption mode
CN102882853A (en) * 2012-09-05 2013-01-16 孙银海 System and method for internet user authentication
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
WO2016116890A1 (en) * 2015-01-22 2016-07-28 Visa International Service Association Method and system for establishing a secure communication tunnel
CN110417886A (en) * 2019-07-29 2019-11-05 广州竞远安全技术股份有限公司 A kind of load-balancing method of integrated service, apparatus and system
CN111049901A (en) * 2019-12-11 2020-04-21 深圳市优必选科技股份有限公司 Load balancing method, load balancing system and registration server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹旭: "应急通信网即时消息服务器的设计与实现", 《中国优秀硕士学位论文全文数据库》 *

Similar Documents

Publication Publication Date Title
CN111901355B (en) Authentication method and device
KR100645512B1 (en) Apparatus and method for authenticating user for network access in communication
CN109729523B (en) Terminal networking authentication method and device
AU2008213766B2 (en) Method and system for registering and verifying the identity of wireless networks and devices
KR20060056279A (en) Apparatus authentication system
CN111447195B (en) Web interface design method for preventing request message from being tampered, attacked and replayed
CN110535877A (en) Internet-of-things terminal identity identifying method and Verification System based on double authentication
CN112491829B (en) MEC platform identity authentication method and device based on 5G core network and blockchain
JP2010263310A (en) Wireless communication device, wireless communication monitoring system, wireless communication method, and program
CN112751851A (en) SSH login success behavior judgment method, device and storage medium
CN110213230B (en) network security verification method and device for distributed communication
CN104683296A (en) Safe authentication method and safe authentication system
US8051464B2 (en) Method for provisioning policy on user devices in wired and wireless networks
CN106454833A (en) Method and system for realizing wireless 802.1X authentication
CN112311793A (en) Internet of things communication method
CN116235467A (en) Correlation control method and correlation device
CN106535179B (en) WDS authentication method and system
CN110996295A (en) Internet of vehicles node identity verification method and identity block
CN113079506B (en) Network security authentication method, device and equipment
WO2011144129A2 (en) Machine-card interlocking method, user identity model card and terminal
CN112738751B (en) Wireless sensor access authentication method, device and system
CN110572352A (en) intelligent distribution network security access platform and implementation method thereof
CN115174645A (en) Automobile OTA (over the air) vehicle cloud interaction method and system
CN111163466B (en) Method for 5G user terminal to access block chain, user terminal equipment and medium
CN114157509A (en) Encryption method and device with SSL and IPsec based on cryptographic algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210202