CN112566114B - WLAN (Wireless local area network) mesh network secure communication method based on block chain - Google Patents

WLAN (Wireless local area network) mesh network secure communication method based on block chain Download PDF

Info

Publication number
CN112566114B
CN112566114B CN202011338318.2A CN202011338318A CN112566114B CN 112566114 B CN112566114 B CN 112566114B CN 202011338318 A CN202011338318 A CN 202011338318A CN 112566114 B CN112566114 B CN 112566114B
Authority
CN
China
Prior art keywords
information
message
sending
hash value
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011338318.2A
Other languages
Chinese (zh)
Other versions
CN112566114A (en
Inventor
张军
占梦来
胡航宇
李良
徐晓龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Wiscred Technology Co ltd
Original Assignee
Sichuan Wiscred Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Wiscred Technology Co ltd filed Critical Sichuan Wiscred Technology Co ltd
Priority to CN202011338318.2A priority Critical patent/CN112566114B/en
Publication of CN112566114A publication Critical patent/CN112566114A/en
Application granted granted Critical
Publication of CN112566114B publication Critical patent/CN112566114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a WLAN (wireless local area network) mesh network security communication method based on a block chain, which mainly solves the problems of security and integrity of information transmission in the existing mesh network. The method comprises the steps of encrypting the pre-sent information of the sending equipment, calculating the hash value of the pre-sent information, uploading the hash value to an appointed block chain network, sending the encrypted information sigma (Message) to any access point AP by the sending equipment according to an appointed protocol, decrypting the encrypted information by the target equipment by using a private key of the target equipment, requesting the block chain network to obtain the hash value of the pre-sent information according to the ID of the sending equipment, comparing the hash value with the locally calculated hash value of the Message, and judging whether the Message is tampered to respond to the Response. Therefore, the safety of information transmission is realized, the information is reliably transmitted in the environment of an unreliable wlan mesh network system, and the information interaction process is not tampered and the credibility of communication is ensured. Therefore, the method is suitable for popularization and application.

Description

WLAN (Wireless local area network) mesh network secure communication method based on block chain
Technical Field
The invention relates to the technical field of network security, in particular to a WLAN mesh network security communication method based on a block chain.
Background
Block chaining is a term of art in information technology. The blockchain is essentially a decentralized database. By using a consensus algorithm, a block is agreed between block link points. The blocks are connected in series by means of a cryptography tool to form a chain structure. The block chain technology is suitable for the fields of data integrity and evidence storage due to the characteristics of tamper resistance and traceability.
Conventional routes have limited coverage. In order to break through the limitation of traditional routing networking, more and more users choose to upgrade the original wireless routing to the mesh network. However, security and integrity are challenged in the process of transferring information. In order to solve the problems of integrity and authenticity of information transmission in the existing wlan mesh multi-hop network, a block chain technology is introduced to uplink information hash values, data tamper resistance is realized through hash value comparison, and the integrity and authenticity of the information transmission in the wlan mesh multi-hop network are ensured.
Disclosure of Invention
The invention aims to provide a block chain-based wlan mesh network secure communication method, which mainly solves the problems of security and integrity of information transmission in the existing mesh network.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a WLAN mesh network security communication method based on a block chain comprises the following steps:
step S01, initializing a system, generating respective public keys and private keys by all devices in a wlan mesh network, and distributing the respective public keys of the devices to all devices in the network;
step S02, a sending device of the communication system generates a sending Request, generates a Message of pre-sending information by combining network environment information, and encrypts the Message by using a public key of a target device to obtain encrypted information sigma (Message);
step S03, a sending device of the communication system calculates a hash value of the Message of the pre-sent information, uploads the hash value to an appointed block chain network, and waits for successful uplink transmission;
step S04, the sending equipment sends the encryption information sigma (Message) to any access point AP according to an agreed protocol, and the encryption information sigma (Message) is finally transmitted to the target equipment through the AP route;
step S05, the target object device receives the encrypted information sigma (Message), decrypts the encrypted information sigma (Message) by using a private key of the target object device to obtain the Message of the pre-sending information, obtains a hash value corresponding to the Message of the pre-sending information according to the ID of the sending device to request the blockchain network, and compares the hash value with the hash value of the Message of the locally calculated pre-sending information to judge whether the Message of the pre-sending information is tampered so as to respond to the Response.
Further, in step S01, a public key encryption algorithm is selected for the system initialization stage.
Further, in the step S03, the hash value is generated by using a cryptographic hash function.
Further, in the step S03, the blockchain network is a private chain, or a federation chain, or a public chain.
Further, in step S04, the AP is any wireless device participating in the communication network, and a multi-hop network is formed by the AP for information transmission.
Further, in the step S05, the target device may determine whether a response needs to be returned according to the request information of the sending device; if response is needed, the return mode is consistent with the sending flow.
Compared with the prior art, the invention has the following beneficial effects:
the method comprises the steps of encrypting the pre-sent information of the sending equipment, calculating the hash value of the pre-sent information, uploading the hash value to an appointed block chain network, sending the encrypted information sigma (Message) to any access point AP by the sending equipment according to an appointed protocol, decrypting the encrypted information by the target equipment by using a private key of the target equipment, requesting the block chain network to obtain the hash value of the pre-sent information according to the ID of the sending equipment, comparing the hash value with the locally calculated hash value of the Message, and judging whether the Message is tampered to respond to the Response. Therefore, the safety of information transmission is realized, the information is reliably transmitted in the environment of an unreliable wlan mesh network system, and the information interaction process is not tampered and the credibility of communication is ensured.
Drawings
Fig. 1 is a flow chart of a communication method of the present invention.
Fig. 2 is a block diagram of an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the following description and examples, which include but are not limited to the following examples.
Examples
As shown in fig. 1, the wlan mesh network secure communication method based on block chain disclosed in the present invention includes the following steps:
step S01, initializing a system, generating respective public keys and private keys by all devices in a wlan mesh network, and distributing the respective public keys of the devices to all devices in the network; all devices generate respective public and private keys by using a public key encryption algorithm, such as ECC256, and the public keys can use a PKI mechanism for identity authentication to ensure the reliability of identities.
Step S02, the sending equipment of the communication system generates a sending Request, generates a pre-sending information Message by combining the network environment information, and encrypts the pre-sending information Message by using the public key of the target equipment to obtain encrypted information sigma (Message). The Request may be instruction information or sensor data, and the network environment information includes a device ID, a receiving device ID, information generation time, certificate information of the sending device, information of a block chain, and the like.
Step S03, the sending equipment of the communication system calculates the hash value of the Message of the pre-sent information, uploads the hash value to the appointed block chain network and waits for successful uplink. Specifically, the hash value may be generated by a cryptographic hash function, such as SHA-256. The calculation formula is as follows:
Hash=H(M||ID||C||T…)
wherein, M represents a Request and represents the transmitted specific information; the ID represents a globally unique identification of the sending device; c represents certificate information; t represents a transmission time.
And step S04, the sending equipment sends the encryption information sigma (Message) to any access point AP according to an agreed protocol, and the encryption information sigma (Message) is finally transmitted to the target equipment through the AP route. Specifically, more than one route forwarding may be required in the information transmission process, and a TLS secure transmission protocol and the like may be used to ensure the security, privacy and the like of data;
step S05, the target object device receives the encrypted information sigma (Message), decrypts the encrypted information sigma (Message) by using a private key of the target object device to obtain the Message of the pre-sending information, obtains a hash value corresponding to the Message of the pre-sending information according to the ID of the sending device to request the blockchain network, and compares the hash value with the hash value of the Message of the locally calculated pre-sending information to judge whether the Message of the pre-sending information is tampered so as to respond to the Response. Specifically, the target device determines whether response information needs to be returned according to the request information, and if so, the return mode is consistent with the sending mode.
As shown in fig. 2, the framework diagram of an application example of the wlan mesh network security communication method of the present invention is used for transmitting gear status information, a gear sensor generates current gear information and links the information, the gear status information includes status information such as durability and rotation speed of a gear, and a transmitting device deployed on the gear transmits the status information to a processing center through the wlan mesh network. And forwarding the gear state information to the processing center through the AP route. The processing center calculates the hash value of the state information by using SHA-256, then obtains the information on the chain according to the ID of the gear sensor, compares whether the hash value of the information on the chain is equal to the hash value calculated locally or not, and completes the verification. And the processing center carries out the next step of indication according to the gear state information, and forwards the processing result and further gear operation information to the gear sensor in the same way to finish the operation.
Through the design, the secure communication method of the wlan mesh network disclosed by the invention solves the problem of information integrity under the environment of an unreliable wlan mesh network system, realizes reliable information transmission, and ensures that the information is not tampered and the credibility of communication in the information interaction process. Compared with the prior art, the invention has outstanding substantive characteristics and remarkable progress, and has wide market prospect in the field of wireless local area network access.
The above-mentioned embodiment is only one of the preferred embodiments of the present invention, and should not be used to limit the scope of the present invention, but all the insubstantial modifications or changes made within the spirit and scope of the main design of the present invention, which still solve the technical problems consistent with the present invention, should be included in the scope of the present invention.

Claims (6)

1. A WLAN mesh network security communication method based on a block chain is characterized by comprising the following steps:
step S01, initializing a system, generating respective public keys and private keys by all devices in a wlan mesh network, and distributing the respective public keys of the devices to all devices in the network;
step S02, a sending device of the communication system generates a sending Request, generates a pre-sending Message by combining network environment information, and encrypts the pre-sending Message by using a public key of a target device to obtain encrypted information sigma (Message); the network environment information comprises a device ID, a receiving device ID, information generation time, certificate information of a sending device and information of a block chain;
step S03, a sending device of the communication system calculates a hash value of the Message of the pre-sent information, uploads the hash value to an appointed block chain network, and waits for successful uplink;
step S04, the sending equipment sends the encryption information sigma (Message) to any access point AP according to an agreed protocol, and the encryption information sigma (Message) is finally transmitted to the target equipment through the AP route;
step S05, the target object device receives the encrypted information sigma (Message), decrypts the encrypted information sigma (Message) by using a private key of the target object device to obtain the Message of the pre-sending information, obtains a hash value corresponding to the Message of the pre-sending information according to the ID of the sending device to request the blockchain network, and compares the hash value with the hash value of the Message of the locally calculated pre-sending information to judge whether the Message of the pre-sending information is tampered so as to respond to the Response.
2. A block chain based wlan mesh network secure communication method as claimed in claim 1, wherein in step S01, a public key encryption algorithm is selected for system initialization.
3. A block chain based secure communication method for a wlan mesh network as claimed in claim 1, wherein in step S03, said hash value is generated by using a cryptographic hash function.
4. A method according to claim 1, wherein in said step S03, said blockchain network is a private chain, or a federation chain, or a public chain.
5. A method as claimed in claim 1, wherein in step S04, said AP is any wireless device joining the communication network, and a multi-hop network is formed by them for information transmission.
6. A block chain-based wlan mesh network secure communication method as claimed in claim 1, wherein in step S05, the target device can determine whether a response needs to be returned according to the request information of the sending device; if response is needed, the return mode is consistent with the sending flow.
CN202011338318.2A 2020-11-25 2020-11-25 WLAN (Wireless local area network) mesh network secure communication method based on block chain Active CN112566114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011338318.2A CN112566114B (en) 2020-11-25 2020-11-25 WLAN (Wireless local area network) mesh network secure communication method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011338318.2A CN112566114B (en) 2020-11-25 2020-11-25 WLAN (Wireless local area network) mesh network secure communication method based on block chain

Publications (2)

Publication Number Publication Date
CN112566114A CN112566114A (en) 2021-03-26
CN112566114B true CN112566114B (en) 2023-03-17

Family

ID=75043590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011338318.2A Active CN112566114B (en) 2020-11-25 2020-11-25 WLAN (Wireless local area network) mesh network secure communication method based on block chain

Country Status (1)

Country Link
CN (1) CN112566114B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116521303B (en) * 2023-07-04 2023-09-12 四川易诚智讯科技有限公司 Dynamic display method and system of emergency plan based on multi-source data fusion

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105071936A (en) * 2010-09-20 2015-11-18 安全第一公司 Systems and methods for secure data sharing
CN108737071A (en) * 2018-05-18 2018-11-02 成都理工大学 A kind of WLAN mesh safety access methods based on block chain
CN109413027A (en) * 2018-08-29 2019-03-01 上海麦士信息技术有限公司 One kind being based on bluetooth Mesh distributed block chain data grant encryption method
CN109728898A (en) * 2019-03-08 2019-05-07 湖南师范大学 Internet-of-things terminal safety communicating method based on block chain technology
WO2019211179A1 (en) * 2018-04-30 2019-11-07 Merck Patent Gmbh Composite security marking and methods and apparatuses for providing and reading same
US10600009B1 (en) * 2018-12-18 2020-03-24 Rokfin, Inc. Mint-and-burn blockchain-based feedback-communication protocol
CN210724835U (en) * 2019-12-04 2020-06-09 神华神东煤炭集团有限责任公司 Ultra-large mining height fully-mechanized coal mining face communication system based on wireless mesh network
CN111277978A (en) * 2020-01-21 2020-06-12 南京如般量子科技有限公司 Vehicle networking system and method based on secret sharing and alliance chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105071936A (en) * 2010-09-20 2015-11-18 安全第一公司 Systems and methods for secure data sharing
WO2019211179A1 (en) * 2018-04-30 2019-11-07 Merck Patent Gmbh Composite security marking and methods and apparatuses for providing and reading same
CN108737071A (en) * 2018-05-18 2018-11-02 成都理工大学 A kind of WLAN mesh safety access methods based on block chain
CN109413027A (en) * 2018-08-29 2019-03-01 上海麦士信息技术有限公司 One kind being based on bluetooth Mesh distributed block chain data grant encryption method
US10600009B1 (en) * 2018-12-18 2020-03-24 Rokfin, Inc. Mint-and-burn blockchain-based feedback-communication protocol
CN109728898A (en) * 2019-03-08 2019-05-07 湖南师范大学 Internet-of-things terminal safety communicating method based on block chain technology
CN210724835U (en) * 2019-12-04 2020-06-09 神华神东煤炭集团有限责任公司 Ultra-large mining height fully-mechanized coal mining face communication system based on wireless mesh network
CN111277978A (en) * 2020-01-21 2020-06-12 南京如般量子科技有限公司 Vehicle networking system and method based on secret sharing and alliance chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
分散式区块链技术与加密安全法的兴起;亚伦·赖特;《民商法论丛》;20191031(第02期);全文 *

Also Published As

Publication number Publication date
CN112566114A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
Cao et al. Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network
US8913747B2 (en) Secure configuration of a wireless sensor network
US8254581B2 (en) Lightweight key distribution and management method for sensor networks
WO2008145059A1 (en) A method for secure data transmission in wireless sensor network
US8069470B1 (en) Identity and authentication in a wireless network
US20040015689A1 (en) Mobile-ad-hoc network including node authentication features and related methods
WO2023082599A1 (en) Blockchain network security communication method based on quantum key
CN108650028B (en) Multiple identity authentication system and method based on quantum communication network and true random number
Othman et al. Physically secure lightweight and privacy-preserving message authentication protocol for VANET in smart city
CN105577383A (en) Management of cryptographic keys
KR102282633B1 (en) Method of linkage certification between railway control system and multiple radio-blocking devices
CN116471587B (en) Method for generating and updating intra-train communication key under V2V communication
CN111371543B (en) Internet of things equipment access control method based on double-block chain structure
CN112491550B (en) Mobile terminal equipment credibility authentication method and system based on Internet of vehicles
KR101704540B1 (en) A method of managing group keys for sharing data between multiple devices in M2M environment
CN112566114B (en) WLAN (Wireless local area network) mesh network secure communication method based on block chain
CN116614239B (en) Data transmission method and system in Internet of things
CN111245611B (en) Anti-quantum computation identity authentication method and system based on secret sharing and wearable equipment
CN110752934B (en) Method for network identity interactive authentication under topological structure
CN113364803B (en) Block chain-based security authentication method for power distribution Internet of things
CN112069487B (en) Intelligent equipment network communication safety implementation method based on Internet of things
US9930015B2 (en) Communication device and method for performing encrypted communication in multipoint networks
Yao et al. Post Quantum KEM authentication in SPDM for secure session establishment
CN113556355B (en) Key processing system and method for intelligent equipment of power distribution network
US7327845B1 (en) Transmission of encrypted messages between a transmitter and a receiver utilizing a one-time cryptographic pad

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant