CN116366240A - Internet of things data transmission method and device - Google Patents

Internet of things data transmission method and device Download PDF

Info

Publication number
CN116366240A
CN116366240A CN202310044690.XA CN202310044690A CN116366240A CN 116366240 A CN116366240 A CN 116366240A CN 202310044690 A CN202310044690 A CN 202310044690A CN 116366240 A CN116366240 A CN 116366240A
Authority
CN
China
Prior art keywords
data
sending
internet
data transmission
things
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310044690.XA
Other languages
Chinese (zh)
Inventor
童曦
汪文霞
张兆龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Shutuxing Information Technology Co ltd
Original Assignee
Shaanxi Shutuxing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Shutuxing Information Technology Co ltd filed Critical Shaanxi Shutuxing Information Technology Co ltd
Priority to CN202310044690.XA priority Critical patent/CN116366240A/en
Publication of CN116366240A publication Critical patent/CN116366240A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an internet of things data transmission method which is applied to a receiving end of an internet of things data transmission system, wherein the internet of things data transmission system also comprises a transmitting end; the method comprises the following steps: responding to an access request sent by a sending end, and determining a key generation rule according to the security level of data sent by the sending end; sending the key generation rule to a sending end; the key generation rule is used for generating an encryption key at the transmitting end; the encryption key is used for encrypting target data of the transmitting end to obtain encrypted data, and transmitting the encrypted data to the receiving end; receiving the encrypted data and obtaining a second time for receiving the encrypted data; judging whether the difference value between the second time and the first time meets a preset time interval or not; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information. The method can ensure the data transmission safety and simultaneously shorten the data encryption and decryption time.

Description

Internet of things data transmission method and device
Technical Field
The invention relates to the technical field of the internet of things, in particular to a data transmission method and device of the internet of things.
Background
The internet of things (The Internet of things) is an important component of a new generation of information technology, and is the internet for connecting things as the name implies. Wherein, thing networking has two-layer meaning: firstly, the core and the foundation of the Internet of things are the Internet, and the Internet is a network which extends and expands on the basis of the Internet; secondly, the user side of the Internet of things extends and expands to any object to object so as to conduct information interaction and communication. The internet of things is a way of collecting data from a certain angle, the front end is a sensor (also called as internet of things equipment) for collecting data, then the data is transmitted to internet of things background equipment at the rear end through a network, and the internet of things background equipment analyzes the collected data, so that comprehensive utilization of the data is realized.
Along with the continuous development of the internet of things, data security is more and more important, and in relation to production and living safety, once data are intercepted or tampered by lawbreakers in the process that acquired data are sent to the rear end by the front-end acquisition equipment, irreparable losses can be caused. In the prior art, in the process of transmitting data detected by a front end to a rear end, an adopted encryption algorithm is complex, so that a great amount of time is consumed in the process of encrypting or decrypting the data; however, if the encryption algorithm is simplified, the transmitted data is extremely unsafe, and serious safety hazards exist.
Disclosure of Invention
The invention provides a data transmission method and device of the Internet of things, which solve the problem that the data encryption and decryption time is shorter while the data transmission safety is difficult to ensure in the existing transmission process of the Internet of things.
In order to achieve the above purpose, the invention adopts the following technical scheme:
in a first aspect, the invention provides a data transmission method of the internet of things, which is applied to a receiving end of a data transmission system of the internet of things, wherein the data transmission system of the internet of things further comprises a transmitting end; the method comprises the following steps:
after the network connection is established between the receiving end and the transmitting end, a key generation rule is determined according to the security level of data transmitted by the transmitting end in response to an access request transmitted by the transmitting end;
transmitting the key generation rule to the transmitting end; the key generation rule is used for generating an encryption key at the transmitting end; the encryption key is used for encrypting the target data of the sending end to obtain encrypted data, and sending the encrypted data and the first time for sending the encrypted data to the receiving end; the size of the security level is inversely proportional to the algorithmic complexity of the encryption key;
receiving the encrypted data and the first time, and obtaining a second time for receiving the encrypted data;
judging whether the difference value between the second time and the first time meets a preset time interval or not; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
In one possible implementation manner, determining a key generation rule according to the security level of the data sent by the sending end specifically includes:
determining the security level of the data according to the type, the source and the processing times of the data sent by the sending end;
the key generation rule comprises identification numbers and corresponding encryption algorithms, the identification numbers are in one-to-one correspondence with the security levels, the size of the security levels is inversely proportional to the size of the identification numbers, and the complexity of the encryption algorithms is directly proportional to the identification numbers;
and determining a corresponding identification number and an encryption algorithm according to the security level.
In one possible implementation manner, the determining the security level of the data according to the type, the source and the processing times of the data sent by the sending end specifically includes:
the importance index of each type of data is truly determined according to expert scoring; the size of the importance index is inversely proportional to the security level of the data;
determining a degree of difference grade of the data from the original data according to the source of the data; the magnitude of the degree of difference level is proportional to the security level of the data;
acquiring the processing times of the data, wherein the size of the processing times is in direct proportion to the security level of the data;
and determining the security level of the data according to the importance index, the difference degree level and the processing times.
In one possible implementation manner, the determining the security level of the data according to the importance index, the degree of difference level and the processing times specifically includes:
respectively acquiring the importance index, the difference degree grade and the weight of the processing times;
inverting the importance index to obtain a first coefficient;
and carrying out weighted summation on the first coefficient, the degree of difference grade and the processing times to obtain the security grade of the data.
In a possible implementation, the key generation rule further includes time interval data for changing a preset time interval in a next data transmission process.
In a second aspect, the invention provides a data transmission method of the internet of things, which is applied to a transmitting end of a data transmission system of the internet of things, wherein the data transmission system of the internet of things further comprises a receiving end; the method comprises the following steps:
after the network connection is established between the receiving end and the transmitting end, an access request is sent to the receiving end;
generating an encryption key at a transmitting end in response to the key generation rule generated by the receiving end according to the access request and the security level of the data transmitted by the transmitting end;
encrypting the target data of the transmitting end according to the encryption key to obtain encrypted data;
and sending the encrypted data and the first time for sending the encrypted data to the receiving end.
In a third aspect, the invention provides an internet of things data transmission device, which is applied to a receiving end of an internet of things data transmission system, wherein the internet of things data transmission system further comprises a transmitting end; the device comprises:
the first processing module is used for responding to the access request sent by the sending end after the network connection is established between the receiving end and the sending end, and determining a key generation rule according to the security level of the data sent by the sending end;
the second processing module is used for sending the key generation rule to the sending end; the key generation rule is used for generating an encryption key at the transmitting end; the encryption key is used for encrypting the target data of the sending end to obtain encrypted data, and sending the encrypted data and the first time for sending the encrypted data to the receiving end; the size of the security level is inversely proportional to the algorithmic complexity of the encryption key;
the third processing module is used for receiving the encrypted data and the first time and acquiring a second time for receiving the encrypted data;
the fourth processing module is used for judging whether the difference value between the second time and the first time meets a preset time interval or not; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
In a fourth aspect, the present invention provides an electronic device, where the electronic device includes a processor and a memory, where at least one instruction, at least one section of program, a code set, or an instruction set is stored in the memory, where the at least one instruction, the at least one section of program, the code set, or the instruction set is loaded and executed by the processor to implement the data transmission method of the internet of things described in any of the above.
In a fifth aspect, the present invention provides a computer readable storage medium, where at least one instruction, at least one program, a code set, or an instruction set is stored, where the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement the data transmission method of the internet of things described in any one of the above.
According to the data transmission method of the Internet of things, firstly, after a receiving end and a sending end are connected through a network, a key generation rule is determined according to the security level of data sent by the sending end in response to an access request sent by the sending end; secondly, sending a key generation rule to a sending end, generating an encryption key at the sending end through the key generation rule, encrypting target data of the sending end according to the encryption key to obtain encrypted data, wherein the size of the security level is inversely proportional to the algorithm complexity of the encryption key; thirdly, the encrypted data and the first time for transmitting the encrypted data are transmitted to a receiving end; then, receiving the encrypted data and acquiring a second time for receiving the encrypted data; finally, judging whether the difference value between the second time and the first time meets a preset time interval; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information. According to the scheme, different key generation rules are determined according to different security levels of data sent by a sending end, different encryption keys are generated to encrypt target data to be sent, and the lower the security level of the data to be sent is, the higher the complexity of an algorithm of the encryption keys is; the higher the security level of the data to be transmitted, the lower the complexity of the algorithm of the encryption key; the higher the security level of the data is, the better the security performance of the data is, and under the condition of the better security performance of the data, in order to shorten the time of data encryption and decryption, the difficulty of an encryption algorithm can be properly reduced, so that the decryption time of data encryption is shortened as much as possible while the security of data transmission is ensured.
Drawings
Fig. 1 is a flowchart of steps of a first data transmission method of the internet of things according to an embodiment of the present invention;
fig. 2 is a flowchart of steps of a second data transmission method of the internet of things according to an embodiment of the present invention;
fig. 3 is a flowchart of steps of a third data transmission method of the internet of things according to an embodiment of the present invention;
fig. 4 is a block diagram of an internet of things data transmission device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "first" and "second" are used below for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the embodiments of the present disclosure, unless otherwise indicated, the meaning of "a plurality" is two or more. In addition, the use of "based on" or "according to" is intended to be open and inclusive in that a process, step, calculation, or other action "based on" or "according to" one or more of the stated conditions or values may in practice be based on additional conditions or beyond the stated values.
In order to solve the problem that data encryption and decryption time is shorter while ensuring data transmission safety in the existing internet of things transmission process, the embodiment of the invention provides an internet of things data transmission method and device.
Fig. 1 is a flowchart of steps of a first data transmission method of the internet of things according to an embodiment of the present invention.
As shown in fig. 1, the data transmission method of the internet of things is applied to a receiving end of the data transmission system of the internet of things, and the data transmission system of the internet of things further comprises a transmitting end, and the method comprises the following steps:
step 101, after the network connection is established between the receiving end and the transmitting end, a key generation rule is determined according to the security level of the data transmitted by the transmitting end in response to the access request transmitted by the transmitting end.
The number of the receiving terminals can be one or more, when the number of the receiving terminals is one, the receiving terminals can receive multiple types of data, and when the number of the receiving terminals is more than one, each receiving terminal can receive one type of data.
One or more transmitting ends are directly or indirectly connected with the receiving ends in a wired or wireless transmission mode so as to facilitate data interaction between each transmitting end and the receiving end.
The receiving end can be an independent server, or a server cluster or a distributed system formed by a plurality of physical servers.
After receiving the access request sent by the sending end, the receiving end determines a key generation rule according to the access request and the security level of the data sent by the sending end.
Further, determining a key generation rule according to the security level of the data sent by the sending end specifically includes:
step 1011, determining the security level of the data according to the type, source and processing times of the data sent by the sending end.
Specifically, the importance index of each type of data is truly determined according to expert scoring; the size of the importance index is inversely proportional to the security level of the data.
The importance indexes comprise five indexes of 1, 2, 3, 4 and 5, and the larger the value of the importance index is, the more important the data is, and the lower the current security level of the data is.
Determining the degree of difference grade between the data and the original data according to the source of the data; the magnitude of the level of difference is proportional to the security level of the data.
The difference degree level comprises five levels of 0, 1, 2, 3 and 4, when the difference degree level is 0, the data is the original data, and the current safety level of the data is the lowest; when the level of difference is gradually increased, the more the user processes the original data, the higher the current security level of the data is, even if the data is acquired from the outside, the data is processed, the original data cannot be obtained according to the data, and the security of the data transmission process is ensured.
The processing times of the acquired data are proportional to the security level of the data.
The processing times of the data are the processing times from the original data to the current data, and the larger the processing times are, the more the data are processed, the higher the security level of the data is.
And determining the security level of the data according to the importance index, the difference degree level and the processing times.
The method for determining the safety level of the data according to the importance index, the difference degree level and the processing times specifically comprises the following steps: and respectively acquiring the importance index, the difference degree grade and the weight of the processing times.
And inverting the importance index to obtain a first coefficient.
And carrying out weighted summation on the first coefficient, the difference degree level and the processing times to obtain the security level of the data.
For example: when the weight of the importance index is 0.3, the weight of the difference degree level is 0.3, the weight of the security level is 0.4, and the importance index of one target data is 3, the difference degree is 1, and the processing frequency is 5, the security level of the data is 1.4.
Step 1012, the key generation rule includes an identification number and a corresponding encryption algorithm, the identification number corresponds to the security level one by one, the security level is inversely proportional to the identification number, and the complexity of the encryption algorithm is directly proportional to the identification number; and determining a corresponding identification number and an encryption algorithm according to the security level.
The key generation rule comprises a plurality of identification numbers, each identification number corresponds to an encryption algorithm, and the difficulty of the encryption algorithm is gradually increased along with the increase of the size of the identification number.
Each security level corresponds to a unique identification number, and a corresponding encryption algorithm is selected according to the identification number.
102, sending a key generation rule to a sending end; the key generation rule is used for generating an encryption key at the transmitting end; the encryption key is used for encrypting target data of the transmitting end to obtain encrypted data, and transmitting the encrypted data and the first time for transmitting the encrypted data to the receiving end; the size of the security level is inversely proportional to the algorithmic complexity of the encryption key.
Specifically, after different key generation rules are determined according to different security levels, the obtained key generation rules are sent to a sending end.
The sending end generates an encryption key at the sending end according to the key generation rule, encrypts target data of the sending end through the encryption key, and obtains encrypted data after encryption.
The encrypted data is transmitted to the receiving end together with the first time of transmitting the encrypted data.
Step 103, receiving the encrypted data and the first time, and obtaining a second time for receiving the encrypted data.
Specifically, the receiving end receives the encrypted data sent by the sending end and the first time, and simultaneously obtains the second time for the receiving end to receive the data.
104, judging whether the difference value between the second time and the first time meets a preset time interval; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
Specifically, calculating a difference value between the twentieth time and the first time, and when the difference value meets a preset time interval, considering that the data is not abnormal, and decrypting the data; when the difference value does not meet the preset time interval, the data is considered to have abnormal conditions that the data is possibly intercepted, the encrypted data is discarded, and a message of data transmission failure is sent to the sending end to request the sending end to resend the data.
The process of data retransmission requires the data to be re-encrypted.
Further, the first key generation rule further includes time interval data for changing a preset time interval in a next data transmission process.
According to the data transmission method of the Internet of things, firstly, after a receiving end and a sending end are connected through a network, a first key generation rule is determined according to the security level of data sent by the sending end in response to an access request sent by the sending end; secondly, a first key generation rule is sent to a sending end, the first key is generated by the sending end through the first key generation rule, target data of the sending end are encrypted according to the first key, encrypted data are obtained, and the size of the security level is inversely proportional to the algorithm complexity of the first key; thirdly, the encrypted data and the first time for transmitting the encrypted data are transmitted to a receiving end; then, receiving the encrypted data and acquiring a second time for receiving the encrypted data; finally, judging whether the difference value between the second time and the first time meets a preset time interval; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
According to the scheme, different first key generation rules are determined according to different security levels of data sent by a sending end, different first keys are generated to encrypt target data to be sent, and the complexity of an algorithm of the first keys is higher as the security level of the data to be sent is lower; the higher the security level of the data to be transmitted, the lower the complexity of the algorithm of the first key; the higher the security level of the data is, the better the security performance of the data is, and under the condition of the better security performance of the data, in order to shorten the time of data encryption and decryption, the difficulty of an encryption algorithm can be properly reduced, so that the decryption time of data encryption is shortened as much as possible while the security of data transmission is ensured.
Fig. 2 is a flowchart of steps of a second data transmission method of the internet of things according to an embodiment of the present invention.
As shown in fig. 2, the data transmission method of the internet of things is applied to a transmitting end of the data transmission system of the internet of things, and the data transmission system of the internet of things further comprises a receiving end; the method comprises the following steps:
step 201, after the receiving end and the transmitting end establish network connection, an access request is sent to the receiving end.
Step 202, generating an encryption key at the transmitting end in response to a key generation rule generated by the receiving end according to the access request and the security level of the data transmitted by the transmitting end.
And 203, encrypting the target data of the transmitting end according to the encryption key to obtain encrypted data.
Step 204, the encrypted data and the first time of sending the encrypted data are sent to the receiving end.
Fig. 3 is a flowchart of steps of a third data transmission method of the internet of things according to an embodiment of the present invention.
As shown in fig. 3, the data transmission method of the internet of things includes:
step 301, after the sending end establishes network connection with the receiving end, the sending end sends an access request to the receiving end.
Step 302, the receiving end responds to the access request sent by the sending end, and determines a key generation rule according to the security level of the data sent by the sending end.
Step 303, the receiving end sends the key generation rule to the sending end.
Step 304, the sender responds to the key generation rule and generates an encryption key at the sender;
step 305, the transmitting end encrypts the target data of the transmitting end according to the encryption key to obtain encrypted data;
step 306, the transmitting end transmits the encrypted data and the first time of transmitting the encrypted data to the receiving end;
step 307, the receiving end receives the encrypted data and the first time, and obtains a second time for receiving the encrypted data;
step 308, the receiving end determines whether the difference between the second time and the first time satisfies a preset time interval; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
Fig. 4 is a block diagram of an internet of things data transmission device according to an embodiment of the present invention.
As shown in fig. 4, the data transmission device of the internet of things is applied to a receiving end of the data transmission system of the internet of things, and the data transmission system of the internet of things further comprises a transmitting end; the device comprises:
the first processing module is used for responding to the access request sent by the sending end after the network connection is established between the receiving end and the sending end, and determining a key generation rule according to the security level of the data sent by the sending end;
the second processing module is used for sending the key generation rule to the sending end; the key generation rule is used for generating an encryption key at the transmitting end; the encryption key is used for encrypting target data of the transmitting end to obtain encrypted data, and transmitting the encrypted data and the first time for transmitting the encrypted data to the receiving end; the magnitude of the security level is inversely proportional to the algorithm complexity of the encryption key;
the third processing module is used for receiving the encrypted data and the first time and acquiring a second time for receiving the encrypted data;
the fourth processing module is used for judging whether the difference value between the second time and the first time meets a preset time interval or not; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The embodiment of the invention also provides electronic equipment, which comprises a processor and a memory, wherein at least one instruction, at least one section of program, a code set or an instruction set is stored in the memory, and the at least one instruction, the at least one section of program, the code set or the instruction set is loaded and executed by the processor so as to realize the data transmission method of the Internet of things in the embodiment of the invention.
The embodiment of the invention also provides a computer readable storage medium, wherein at least one instruction, at least one section of program, code set or instruction set is stored in the storage medium, and the at least one instruction, the at least one section of program, the code set or the instruction set is loaded and executed by a processor to realize the data transmission method of the Internet of things in the embodiment of the invention.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present invention are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.) means from one website, computer, server, or data center. Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc., that contain an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
The foregoing is merely illustrative of specific embodiments of the present invention, and the scope of the present invention is not limited thereto, but any changes or substitutions within the technical scope of the present invention should be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. The data transmission method of the Internet of things is characterized by being applied to a receiving end of a data transmission system of the Internet of things, and the data transmission system of the Internet of things further comprises a transmitting end; the method comprises the following steps:
after the network connection is established between the receiving end and the transmitting end, a key generation rule is determined according to the security level of data transmitted by the transmitting end in response to an access request transmitted by the transmitting end;
transmitting the key generation rule to the transmitting end; the key generation rule is used for generating an encryption key at the transmitting end; the encryption key is used for encrypting the target data of the sending end to obtain encrypted data, and sending the encrypted data and the first time for sending the encrypted data to the receiving end; the size of the security level is inversely proportional to the algorithmic complexity of the encryption key;
receiving the encrypted data and the first time, and obtaining a second time for receiving the encrypted data;
judging whether the difference value between the second time and the first time meets a preset time interval or not; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
2. The method according to claim 1, wherein determining the key generation rule according to the security level of the data sent by the sender specifically comprises:
determining the security level of the data according to the type, the source and the processing times of the data sent by the sending end;
the key generation rule comprises identification numbers and corresponding encryption algorithms, the identification numbers are in one-to-one correspondence with the security levels, the size of the security levels is inversely proportional to the size of the identification numbers, and the complexity of the encryption algorithms is directly proportional to the identification numbers;
and determining a corresponding identification number and an encryption algorithm according to the security level.
3. The method according to claim 2, wherein the determining the security level of the data according to the type, the source and the processing times of the data sent by the sending end specifically includes:
the importance index of each type of data is truly determined according to expert scoring; the size of the importance index is inversely proportional to the security level of the data;
determining a degree of difference grade of the data from the original data according to the source of the data; the magnitude of the degree of difference level is proportional to the security level of the data;
acquiring the processing times of the data, wherein the size of the processing times is in direct proportion to the security level of the data;
and determining the security level of the data according to the importance index, the difference degree level and the processing times.
4. A method according to claim 3, wherein said determining the security level of the data according to the importance index, the degree of difference level and the number of processing times comprises:
respectively acquiring the importance index, the difference degree grade and the weight of the processing times;
inverting the importance index to obtain a first coefficient;
and carrying out weighted summation on the first coefficient, the degree of difference grade and the processing times to obtain the security grade of the data.
5. The method of claim 2, wherein the key generation rule further comprises time interval data for modifying a preset time interval in a next data transmission.
6. The data transmission method of the Internet of things is applied to a transmitting end of a data transmission system of the Internet of things, and the data transmission system of the Internet of things further comprises a receiving end; the method comprises the following steps:
after the network connection is established between the receiving end and the transmitting end, an access request is sent to the receiving end;
generating an encryption key at a transmitting end in response to the key generation rule generated by the receiving end according to the access request and the security level of the data transmitted by the transmitting end;
encrypting the target data of the transmitting end according to the encryption key to obtain encrypted data;
and sending the encrypted data and the first time for sending the encrypted data to the receiving end.
7. The data transmission device of the Internet of things is characterized by being applied to a receiving end of a data transmission system of the Internet of things, and the data transmission system of the Internet of things further comprises a transmitting end; the device comprises:
the first processing module is used for responding to the access request sent by the sending end after the network connection is established between the receiving end and the sending end, and determining a key generation rule according to the security level of the data sent by the sending end;
the second processing module is used for sending the key generation rule to the sending end; the key generation rule is used for generating an encryption key at the transmitting end; the encryption key is used for encrypting the target data of the sending end to obtain encrypted data, and sending the encrypted data and the first time for sending the encrypted data to the receiving end; the size of the security level is inversely proportional to the algorithmic complexity of the encryption key;
the third processing module is used for receiving the encrypted data and the first time and acquiring a second time for receiving the encrypted data;
the fourth processing module is used for judging whether the difference value between the second time and the first time meets a preset time interval or not; if yes, decrypting the encrypted data; if not, discarding the encrypted data and sending data transmission failure information.
8. An electronic device comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the internet of things data transmission method of any one of claims 1-6.
9. A computer readable storage medium having stored therein at least one instruction, at least one program, code set, or instruction set, the at least one instruction, the at least one program, the code set, or instruction set being loaded and executed by a processor to implement the internet of things data transmission method of any one of claims 1-6.
CN202310044690.XA 2023-01-30 2023-01-30 Internet of things data transmission method and device Pending CN116366240A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310044690.XA CN116366240A (en) 2023-01-30 2023-01-30 Internet of things data transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310044690.XA CN116366240A (en) 2023-01-30 2023-01-30 Internet of things data transmission method and device

Publications (1)

Publication Number Publication Date
CN116366240A true CN116366240A (en) 2023-06-30

Family

ID=86938484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310044690.XA Pending CN116366240A (en) 2023-01-30 2023-01-30 Internet of things data transmission method and device

Country Status (1)

Country Link
CN (1) CN116366240A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117640220A (en) * 2023-12-04 2024-03-01 广州启宁信息科技有限公司 Data transmission safety management method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117640220A (en) * 2023-12-04 2024-03-01 广州启宁信息科技有限公司 Data transmission safety management method and device

Similar Documents

Publication Publication Date Title
CN108632261B (en) Multi-party quantum summation method and system
KR102177411B1 (en) Method for managing industrial control systems via physical one-way encryption remote monitoring
EP1631037B1 (en) Apparatus and method for mitigating DoS attacks in a service discovery system
CN114268429B (en) Encryption communication access equipment for specific terminal
CN116366240A (en) Internet of things data transmission method and device
CN112637109B (en) Data transmission method, system, electronic device and computer readable medium
CN103679000A (en) Apparatus and method for remotely deleting critical information
CN109729000B (en) Instant messaging method and device
CN111294203A (en) Information transmission method
CN113381984A (en) Data processing method, device and system, electronic equipment and storage medium
CN113890730A (en) Data transmission method and system
CN111756528A (en) Quantum session key distribution method and device and communication architecture
CN115277219A (en) Message encryption method, message decryption method, message encryption device, message decryption device, and storage medium
CN111343131A (en) Data transmission method and device
CN115277055A (en) Method and device for guaranteeing data interaction safety of Internet of things and electronic equipment
CN112231765A (en) Data transmission method and device, electronic equipment and storage medium
CN110602055A (en) Long connection authentication method, device, server and storage medium
CN116668200A (en) Internet of things data security transmission method and system
CN116132035B (en) High-performance password operation method and device based on multi-parameter dynamic adjustment
CN113541930B (en) Method, device, system and storage medium for checking digital certificate state
CN112367360B (en) Method and device for expanding public cloud data processing capacity
US20100162366A1 (en) Apparatus and method of protecting private information in distributed network
CN117349867B (en) Intelligent contract deployment method, system, equipment and medium
CN113206837B (en) Information transmission method and device, electronic equipment and computer readable medium
CN108809632A (en) A kind of quantum Secure Socket Layer apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination