CN203352621U - Wireless Internet of Things data safety intelligent transmission system - Google Patents
Wireless Internet of Things data safety intelligent transmission system Download PDFInfo
- Publication number
- CN203352621U CN203352621U CN2013203518390U CN201320351839U CN203352621U CN 203352621 U CN203352621 U CN 203352621U CN 2013203518390 U CN2013203518390 U CN 2013203518390U CN 201320351839 U CN201320351839 U CN 201320351839U CN 203352621 U CN203352621 U CN 203352621U
- Authority
- CN
- China
- Prior art keywords
- chip microcomputer
- data
- internet
- transmission
- wireless internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Arrangements For Transmission Of Measured Signals (AREA)
Abstract
The utility model relates to the Internet of Things technologies and specifically relates to a wireless Internet of Things data safety intelligent transmission system. The wireless Internet of Things data safety intelligent transmission system comprises an acquisition terminal, a gathering terminal, a wireless route and a terminal computer. The acquisition terminal comprises a piece of sensing equipment, a single-chip microcomputer and a 433 sending module. The sensing equipment is connected with the input end of the single-chip microcomputer. The output end of the single-chip microcomputer is connected with the 433 sending module. The gathering terminal comprises a 433 receiving module, a ucos system module and an internet access. The 433 receiving module is connected with the input end of the ucos system module. The output end of the ucos system module is connected with the internet access. The system can achieve rapid acquisition and real-time transmission of sensing data. By combining an elliptical curve encryption technology and a symmetry secret key encryption technology to construct a safe data transmission mechanism, the system further achieves safe transmission of confidential data in an open space with a transmission distance exceeding 1200 meters.
Description
Technical field
The utility model relates to technology of Internet of things, is specially a kind of wireless Internet of Things data security intelligence transmission system.
Background technology
The dynamic change that Internet of Things can conform, the service that provides ubiquitous " people-oriented " to the user, have the functions such as perception, transmission and application.It except some characteristic with wireless sensor network (for example, closely related, in large scale etc. with application) outside, some unique distinctions that also there is self, may be summarized to be three aspects: the one, the isomerism of network and node is all very strong, various types of networks have been contained, both comprise the very strong equipment of computing capability such as computer, also comprised the very weak facilities of computing capability such as transducer, electronic tag; The 2nd, the safety and reliability of requirement height, because " computing power " embedded to daily life, the overwhelming majority's application in Internet of Things can relate to individual privacy or in-house secret, what have even can have influence on user's safety of life and property; The 3rd, " people-oriented ", intelligent degree is required very high, need context aware (context) (context-awareness), the support of the technology such as artificial intelligence.
With regard to some Internet of Things demonstration systems of setting up with regard to current China various places, mainly adopted external information technology, equipment, national security has been formed to many potential threats.Because Internet of Things all needs to take wireless transmission in a lot of occasions, this signal be exposed among open place is easy to be stolen and disturb, once these signals are utilized by external hostile force, China is carried out to malicious attack, stop doing business in plant downtime, the shop that nationwide probably occurs, traffic paralysis, allows entire society fall into chaos.At present, the transmission of the data wireless of Internet of Things not yet adopts any encryption technology.
Summary of the invention
The purpose of this utility model is to overcome above-mentioned deficiency, a kind of wireless Internet of Things data security intelligence transmission system is provided, realize Quick Acquisition and the real-time Transmission of sensing data, and elliptic curve cryptography technology and symmetric key encryption technology are combined to the safe data transmission mechanism of structure, realize surpassing in the field transmission range safety of secret data transmission of 1200 meters.
For realizing above-mentioned technical purpose, the scheme that the utility model provides is: a kind of wireless Internet of Things data security intelligence transmission system, comprise collection terminal, convergence terminal, wireless routing and terminal computer, wherein said collection terminal comprises sensing equipment, single-chip microcomputer and 433 sending modules, sensing equipment connects with the input of single-chip microcomputer, and the output of single-chip microcomputer connects with 433 sending modules; Described convergence terminal comprises 433 receiver modules, ucos system module and network interface, and 433 receiver modules connect with the input of ucos system module, and the output of ucos system module connects network interface.
And described single-chip microcomputer is the single-chip microcomputer of STC12LE5A60S2 model.
And described 433 sending modules and 433 receiver modules adopt the RFDC of 433MHz frequency range
And described network interface is Internet, GSM, CDMA, GPRS or 3G network mouth.
The utility model also provides a kind of encryption method based on above-mentioned wireless Internet of Things data security intelligence transmission system, comprises the steps.
Step 1, build an elliptic curve by the user, and choose at random a some P on this elliptic curve, the secret preservation, then the user chooses a high entropy random number a at random, and calculate the value of the dot product aP of this random number and elliptic curve point P, next, the user is written to the value of aP and P in single-chip microcomputer in confidence.
Step 2, single-chip microcomputer is chosen a high entropy random number b at random, and the value of calculating abP is close as symmetric cryptography, generates the key material bP of shared key, then adopts shared session key abP and EDS symmetric encipherment algorithm to be encrypted the data that collect.
Step 3, be written to enciphered data and key material bP in data field and sent.
Step 4, single-chip microcomputer is regularly chosen high entropy random number b ' again, calculate new shared session key ab ' P and new key material b ' P, then adopt new session key ab ' P to encrypt image data, then enciphered message and new key material b ' P are written in data field and are sent.
And the described data field front portion in step 3 connects lead code, synchronous code, length field and address field, described data field afterbody connects 16 heavy remaining check codes of circulation.
Advantage of the present utility model is: 1, by the long-distance transmissions that on the field, transmission range is 1200 meters that adopted 433 frequency ranges to realize, much larger than at present in the Internet of Things secure communication, usually be less than the image data transmission range farthest of 200 meters in unobstructed situation.2, employing energy conservation pattern effectively reduces the power consumption of system, has extended the useful life of battery.3, the public key cryptography encryption technology is combined with the symmetric key encryption technology, realized the safe transmission of confidential data; The regular update of session key, effectively reduce the probability that node is attacked.
The accompanying drawing explanation
Fig. 1 is system architecture diagram of the present utility model.
Fig. 2 is working mode figure of the present utility model.
Fig. 3 is Security Data Transmission of the present utility model and drawing.
Embodiment
Below in conjunction with drawings and Examples, the utility model is described in further detail.
The present embodiment provides a kind of wireless Internet of Things data security intelligence transmission system, as shown in Figure 1, comprise collection terminal, convergence terminal, wireless routing and terminal computer, wherein said collection terminal comprises sensing equipment, single-chip microcomputer (can adopt the single-chip microcomputer of STC12LE5A60S2 model) and 433 sending modules, sensing equipment connects with the input of single-chip microcomputer, and the output of single-chip microcomputer connects with 433 sending modules; Described convergence terminal comprises 433 receiver modules, ucos system module and network interface, and 433 receiver modules connect with the input of ucos system module, and the output of ucos system module connects network interface.
Further, above-mentioned 433 sending modules and 433 receiver modules adopt the RFDC of 433MHz frequency range.
Further, above-mentioned network interface is Internet, GSM, CDMA, GPRS or 3G network mouth.
Transfer of data idiographic flow of the present utility model is as follows: at first at collection terminal, sensing equipment sends to the data that collect on single-chip microcomputer, single-chip microcomputer generates shares session key, and adopt this key to be encrypted the data that collect, then the key material of enciphered data and the shared session key of generation is transferred to 433 sending modules.433 sending modules send to the information received 433 receiver modules of convergence terminal again.Convergence terminal adopts Internet, GSM, CDMA, and GPRS, the transmission meanss such as 3G network send to enciphered data and key material on terminal computer.Terminal calculates shared key and adopts this secret key decryption enciphered data, thereby obtains image data.
The utility model has been realized the communication of wireless temperature-measuring terminal image data on 433MHz frequency range (exempting from application), and the scene temperature data that collect are sent to wireless convergence terminal in real time.Peak power output can reach 30dBm, and the field transmission range can reach 1200 meters.Current existing similar system, in unobstructed situation, transmission range is 200 meters farthest.In addition, in above-mentioned secure transmission system framework, all kinds of front end signals can be accomplished real-time Transmission, real time on-line monitoring, and can be by the setting-up time uploading data.
Mode of operation high efficiency smart of the present utility model.This pattern can effectively reduce the consumption of battery, and it mainly comprises four kinds of patterns: park mode, idle pulley, emission mode and receiving mode, as shown in Figure 2.Except park mode, can carry out the intelligence switching between each pattern.In addition, whether this mode of operation can intelligent decision enter park mode, power consumption is dropped to minimum.Least in power-consuming under park mode, can intelligence judge whether to enter resting state, effectively to reduce power consumption.In addition, other three kinds of patterns, can carry out intelligent conversion between idle pulley, emission mode and receiving mode, without artificial participation, to reach effectively energy-conservation purpose.This mode of operation has the highly sensitive feature of low-power, and effective extending battery life.
The utility model provides a kind of encryption method based on above-mentioned wireless Internet of Things data security intelligence transmission system, comprises the steps.
Step 1, build an elliptic curve (elliptic curve gets final product arbitrarily) by the user, and choose at random a some P on this elliptic curve, the secret preservation, then the user chooses a high entropy random number a at random, and calculates the value of the dot product aP of this random number and elliptic curve point P, next, user's (manually write by this user, other do not know the content write per capita) in confidence is written to the value of aP and P in single-chip microcomputer.
Step 2, single-chip microcomputer is chosen a high entropy random number b at random, and the value of calculating abP is close as symmetric cryptography, generates the key material bP of shared key, then adopts shared session key abP and EDS symmetric encipherment algorithm to be encrypted the data that collect.
Step 3, be written to enciphered data and key material bP in data field and sent.
Step 4, single-chip microcomputer is regularly chosen high entropy random number b ' again, calculate new shared session key ab ' P and new key material b ' P, then adopt new session key ab ' P to encrypt image data, then enciphered message and new key material b ' P are written in data field and are sent.
Further, the described data field front portion in step 3 connects lead code, synchronous code, length field and address field, and described data field afterbody connects 16 heavy remaining check codes of circulation, as shown in Figure 3.
Security Data Transmission mechanism of the present utility model is that public key cryptography technology combines with the symmetric key encryption technology.At first will be stored in single-chip microcomputer for the key material of session key generation, and adopt D-H key agreement mechanism session key generation based on elliptic curve cryptosystem.Then adopt the session key and the EDS symmetric encipherment algorithm that generate to be encrypted the data that collect.Finally data and session key raw material after encrypting are sent to the recipient.After legal recipient receives above-mentioned information, can calculate session key according to the secret information of the key material received and preservation, thereby can adopt this secret key decryption enciphered message, obtain the data that collect, to reach the purpose of sensing data safe transmission.In addition, single-chip microcomputer can also carry out regular renewal to session key, thereby effectively reduces the probability of being attacked.
The above is only preferred implementation of the present utility model; it should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the utility model principle; can also make some improvement or distortion, these improvement or distortion also should be considered as protection range of the present utility model.
Claims (4)
1. a wireless Internet of Things data security intelligence transmission system, comprise collection terminal, convergence terminal, wireless routing and terminal computer, it is characterized in that: described collection terminal comprises sensing equipment, single-chip microcomputer and 433 sending modules, sensing equipment connects with the input of single-chip microcomputer, and the output of single-chip microcomputer connects with 433 sending modules; Described convergence terminal comprises 433 receiver modules, ucos system module and network interface, and 433 receiver modules connect with the input of ucos system module, and the output of ucos system module connects network interface.
2. a kind of wireless Internet of Things data security intelligence transmission system according to claim 1, it is characterized in that: described single-chip microcomputer is the single-chip microcomputer of STC12LE5A60S2 model.
3. a kind of wireless Internet of Things data security intelligence transmission system according to claim 1, is characterized in that: the RFDC of described 433 sending modules and 433 receiver modules employing 433MHz frequency range.
4. a kind of wireless Internet of Things data security intelligence transmission system according to claim 1, it is characterized in that: described network interface is Internet, GSM, CDMA, GPRS or 3G network mouth.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013203518390U CN203352621U (en) | 2013-06-19 | 2013-06-19 | Wireless Internet of Things data safety intelligent transmission system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013203518390U CN203352621U (en) | 2013-06-19 | 2013-06-19 | Wireless Internet of Things data safety intelligent transmission system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN203352621U true CN203352621U (en) | 2013-12-18 |
Family
ID=49752465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013203518390U Expired - Fee Related CN203352621U (en) | 2013-06-19 | 2013-06-19 | Wireless Internet of Things data safety intelligent transmission system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN203352621U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103298157A (en) * | 2013-06-19 | 2013-09-11 | 中国地质大学(武汉) | Data safety intelligent transmission system for wireless internet of things |
CN107948145A (en) * | 2017-11-17 | 2018-04-20 | 成都正光恒电子科技有限责任公司 | A kind of wireless internet of things data safety Intelligent Transportation Systems |
CN115379444A (en) * | 2022-07-12 | 2022-11-22 | 广东技术师范大学 | Wireless Internet of things data secure intelligent transmission system and encryption method |
-
2013
- 2013-06-19 CN CN2013203518390U patent/CN203352621U/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103298157A (en) * | 2013-06-19 | 2013-09-11 | 中国地质大学(武汉) | Data safety intelligent transmission system for wireless internet of things |
CN107948145A (en) * | 2017-11-17 | 2018-04-20 | 成都正光恒电子科技有限责任公司 | A kind of wireless internet of things data safety Intelligent Transportation Systems |
CN115379444A (en) * | 2022-07-12 | 2022-11-22 | 广东技术师范大学 | Wireless Internet of things data secure intelligent transmission system and encryption method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cao et al. | [Retracted] IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security | |
CN101282213B (en) | Method and system for secure data aggregation in wireless sensor networks | |
Zhao et al. | A survey on the internet of things security | |
Chacko et al. | Security mechanisms and Vulnerabilities in LPWAN | |
Gan et al. | Internet of things security analysis | |
CN102685740B (en) | A kind of short-distance wireless communication node and wireless communications method | |
CN203352621U (en) | Wireless Internet of Things data safety intelligent transmission system | |
Azarmehr et al. | Secure authentication and access mechanism for IoT wireless sensors | |
Puthal | Secure data collection and critical data transmission technique in mobile sink wireless sensor networks | |
CN103298157A (en) | Data safety intelligent transmission system for wireless internet of things | |
CN107948145A (en) | A kind of wireless internet of things data safety Intelligent Transportation Systems | |
CN103560998A (en) | Method and system for wireless sensor network to resist DoS attacks | |
CN110166243B (en) | Aggregation data privacy protection method based on elliptic curve in crowd sensing | |
CN102916813B (en) | State estimation based intelligent power grid dynamic data encryption method | |
Juliana et al. | Seladg: Secure energy efficient location aware data gathering approach for wireless sensor networks | |
CN112188485A (en) | Encryption and decryption method based on Bluetooth communication | |
Guo et al. | Study on secrecy capacity of wireless sensor networks in internet of things based on the amplify-and-forward compressed sensing scheme | |
CN105072113B (en) | A kind of wireless sensor network security guard method based on data packet dynamic encryption | |
Banu et al. | Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling | |
CN102355356A (en) | Asymmetric encryption method suitable for ZIGBEE wireless meter reading | |
CN204350190U (en) | A kind of video data enciphering/deciphering system of quick access security access platform | |
Arun et al. | Encryption standards for security system in energy harvesting for IoT requirements | |
CN105227564A (en) | For the method for the active and passive defence of the wireless sensor network in hazardous environment | |
CN115379444A (en) | Wireless Internet of things data secure intelligent transmission system and encryption method | |
Men et al. | Designing mutual authentication protocols in industrial wireless network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20131218 Termination date: 20150619 |
|
EXPY | Termination of patent right or utility model |