CN203352621U - Wireless Internet of Things data safety intelligent transmission system - Google Patents

Wireless Internet of Things data safety intelligent transmission system Download PDF

Info

Publication number
CN203352621U
CN203352621U CN2013203518390U CN201320351839U CN203352621U CN 203352621 U CN203352621 U CN 203352621U CN 2013203518390 U CN2013203518390 U CN 2013203518390U CN 201320351839 U CN201320351839 U CN 201320351839U CN 203352621 U CN203352621 U CN 203352621U
Authority
CN
China
Prior art keywords
chip microcomputer
data
internet
transmission
wireless internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2013203518390U
Other languages
Chinese (zh)
Inventor
唐善玉
蔡之华
章丽平
朱莉
余林琛
李振华
张思发
马钊
杨帆
龚文引
熊慕舟
康晓军
江宜静
张航
朱邵辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Geosciences
Original Assignee
China University of Geosciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Geosciences filed Critical China University of Geosciences
Priority to CN2013203518390U priority Critical patent/CN203352621U/en
Application granted granted Critical
Publication of CN203352621U publication Critical patent/CN203352621U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The utility model relates to the Internet of Things technologies and specifically relates to a wireless Internet of Things data safety intelligent transmission system. The wireless Internet of Things data safety intelligent transmission system comprises an acquisition terminal, a gathering terminal, a wireless route and a terminal computer. The acquisition terminal comprises a piece of sensing equipment, a single-chip microcomputer and a 433 sending module. The sensing equipment is connected with the input end of the single-chip microcomputer. The output end of the single-chip microcomputer is connected with the 433 sending module. The gathering terminal comprises a 433 receiving module, a ucos system module and an internet access. The 433 receiving module is connected with the input end of the ucos system module. The output end of the ucos system module is connected with the internet access. The system can achieve rapid acquisition and real-time transmission of sensing data. By combining an elliptical curve encryption technology and a symmetry secret key encryption technology to construct a safe data transmission mechanism, the system further achieves safe transmission of confidential data in an open space with a transmission distance exceeding 1200 meters.

Description

A kind of wireless Internet of Things data security intelligence transmission system
Technical field
The utility model relates to technology of Internet of things, is specially a kind of wireless Internet of Things data security intelligence transmission system.
Background technology
The dynamic change that Internet of Things can conform, the service that provides ubiquitous " people-oriented " to the user, have the functions such as perception, transmission and application.It except some characteristic with wireless sensor network (for example, closely related, in large scale etc. with application) outside, some unique distinctions that also there is self, may be summarized to be three aspects: the one, the isomerism of network and node is all very strong, various types of networks have been contained, both comprise the very strong equipment of computing capability such as computer, also comprised the very weak facilities of computing capability such as transducer, electronic tag; The 2nd, the safety and reliability of requirement height, because " computing power " embedded to daily life, the overwhelming majority's application in Internet of Things can relate to individual privacy or in-house secret, what have even can have influence on user's safety of life and property; The 3rd, " people-oriented ", intelligent degree is required very high, need context aware (context) (context-awareness), the support of the technology such as artificial intelligence.
With regard to some Internet of Things demonstration systems of setting up with regard to current China various places, mainly adopted external information technology, equipment, national security has been formed to many potential threats.Because Internet of Things all needs to take wireless transmission in a lot of occasions, this signal be exposed among open place is easy to be stolen and disturb, once these signals are utilized by external hostile force, China is carried out to malicious attack, stop doing business in plant downtime, the shop that nationwide probably occurs, traffic paralysis, allows entire society fall into chaos.At present, the transmission of the data wireless of Internet of Things not yet adopts any encryption technology.
Summary of the invention
The purpose of this utility model is to overcome above-mentioned deficiency, a kind of wireless Internet of Things data security intelligence transmission system is provided, realize Quick Acquisition and the real-time Transmission of sensing data, and elliptic curve cryptography technology and symmetric key encryption technology are combined to the safe data transmission mechanism of structure, realize surpassing in the field transmission range safety of secret data transmission of 1200 meters.
For realizing above-mentioned technical purpose, the scheme that the utility model provides is: a kind of wireless Internet of Things data security intelligence transmission system, comprise collection terminal, convergence terminal, wireless routing and terminal computer, wherein said collection terminal comprises sensing equipment, single-chip microcomputer and 433 sending modules, sensing equipment connects with the input of single-chip microcomputer, and the output of single-chip microcomputer connects with 433 sending modules; Described convergence terminal comprises 433 receiver modules, ucos system module and network interface, and 433 receiver modules connect with the input of ucos system module, and the output of ucos system module connects network interface.
And described single-chip microcomputer is the single-chip microcomputer of STC12LE5A60S2 model.
And described 433 sending modules and 433 receiver modules adopt the RFDC of 433MHz frequency range
And described network interface is Internet, GSM, CDMA, GPRS or 3G network mouth.
The utility model also provides a kind of encryption method based on above-mentioned wireless Internet of Things data security intelligence transmission system, comprises the steps.
Step 1, build an elliptic curve by the user, and choose at random a some P on this elliptic curve, the secret preservation, then the user chooses a high entropy random number a at random, and calculate the value of the dot product aP of this random number and elliptic curve point P, next, the user is written to the value of aP and P in single-chip microcomputer in confidence.
Step 2, single-chip microcomputer is chosen a high entropy random number b at random, and the value of calculating abP is close as symmetric cryptography, generates the key material bP of shared key, then adopts shared session key abP and EDS symmetric encipherment algorithm to be encrypted the data that collect.
Step 3, be written to enciphered data and key material bP in data field and sent.
Step 4, single-chip microcomputer is regularly chosen high entropy random number b ' again, calculate new shared session key ab ' P and new key material b ' P, then adopt new session key ab ' P to encrypt image data, then enciphered message and new key material b ' P are written in data field and are sent.
And the described data field front portion in step 3 connects lead code, synchronous code, length field and address field, described data field afterbody connects 16 heavy remaining check codes of circulation.
Advantage of the present utility model is: 1, by the long-distance transmissions that on the field, transmission range is 1200 meters that adopted 433 frequency ranges to realize, much larger than at present in the Internet of Things secure communication, usually be less than the image data transmission range farthest of 200 meters in unobstructed situation.2, employing energy conservation pattern effectively reduces the power consumption of system, has extended the useful life of battery.3, the public key cryptography encryption technology is combined with the symmetric key encryption technology, realized the safe transmission of confidential data; The regular update of session key, effectively reduce the probability that node is attacked.
The accompanying drawing explanation
Fig. 1 is system architecture diagram of the present utility model.
Fig. 2 is working mode figure of the present utility model.
Fig. 3 is Security Data Transmission of the present utility model and drawing.
Embodiment
Below in conjunction with drawings and Examples, the utility model is described in further detail.
The present embodiment provides a kind of wireless Internet of Things data security intelligence transmission system, as shown in Figure 1, comprise collection terminal, convergence terminal, wireless routing and terminal computer, wherein said collection terminal comprises sensing equipment, single-chip microcomputer (can adopt the single-chip microcomputer of STC12LE5A60S2 model) and 433 sending modules, sensing equipment connects with the input of single-chip microcomputer, and the output of single-chip microcomputer connects with 433 sending modules; Described convergence terminal comprises 433 receiver modules, ucos system module and network interface, and 433 receiver modules connect with the input of ucos system module, and the output of ucos system module connects network interface.
Further, above-mentioned 433 sending modules and 433 receiver modules adopt the RFDC of 433MHz frequency range.
Further, above-mentioned network interface is Internet, GSM, CDMA, GPRS or 3G network mouth.
Transfer of data idiographic flow of the present utility model is as follows: at first at collection terminal, sensing equipment sends to the data that collect on single-chip microcomputer, single-chip microcomputer generates shares session key, and adopt this key to be encrypted the data that collect, then the key material of enciphered data and the shared session key of generation is transferred to 433 sending modules.433 sending modules send to the information received 433 receiver modules of convergence terminal again.Convergence terminal adopts Internet, GSM, CDMA, and GPRS, the transmission meanss such as 3G network send to enciphered data and key material on terminal computer.Terminal calculates shared key and adopts this secret key decryption enciphered data, thereby obtains image data.
The utility model has been realized the communication of wireless temperature-measuring terminal image data on 433MHz frequency range (exempting from application), and the scene temperature data that collect are sent to wireless convergence terminal in real time.Peak power output can reach 30dBm, and the field transmission range can reach 1200 meters.Current existing similar system, in unobstructed situation, transmission range is 200 meters farthest.In addition, in above-mentioned secure transmission system framework, all kinds of front end signals can be accomplished real-time Transmission, real time on-line monitoring, and can be by the setting-up time uploading data.
Mode of operation high efficiency smart of the present utility model.This pattern can effectively reduce the consumption of battery, and it mainly comprises four kinds of patterns: park mode, idle pulley, emission mode and receiving mode, as shown in Figure 2.Except park mode, can carry out the intelligence switching between each pattern.In addition, whether this mode of operation can intelligent decision enter park mode, power consumption is dropped to minimum.Least in power-consuming under park mode, can intelligence judge whether to enter resting state, effectively to reduce power consumption.In addition, other three kinds of patterns, can carry out intelligent conversion between idle pulley, emission mode and receiving mode, without artificial participation, to reach effectively energy-conservation purpose.This mode of operation has the highly sensitive feature of low-power, and effective extending battery life.
The utility model provides a kind of encryption method based on above-mentioned wireless Internet of Things data security intelligence transmission system, comprises the steps.
Step 1, build an elliptic curve (elliptic curve gets final product arbitrarily) by the user, and choose at random a some P on this elliptic curve, the secret preservation, then the user chooses a high entropy random number a at random, and calculates the value of the dot product aP of this random number and elliptic curve point P, next, user's (manually write by this user, other do not know the content write per capita) in confidence is written to the value of aP and P in single-chip microcomputer.
Step 2, single-chip microcomputer is chosen a high entropy random number b at random, and the value of calculating abP is close as symmetric cryptography, generates the key material bP of shared key, then adopts shared session key abP and EDS symmetric encipherment algorithm to be encrypted the data that collect.
Step 3, be written to enciphered data and key material bP in data field and sent.
Step 4, single-chip microcomputer is regularly chosen high entropy random number b ' again, calculate new shared session key ab ' P and new key material b ' P, then adopt new session key ab ' P to encrypt image data, then enciphered message and new key material b ' P are written in data field and are sent.
Further, the described data field front portion in step 3 connects lead code, synchronous code, length field and address field, and described data field afterbody connects 16 heavy remaining check codes of circulation, as shown in Figure 3.
Security Data Transmission mechanism of the present utility model is that public key cryptography technology combines with the symmetric key encryption technology.At first will be stored in single-chip microcomputer for the key material of session key generation, and adopt D-H key agreement mechanism session key generation based on elliptic curve cryptosystem.Then adopt the session key and the EDS symmetric encipherment algorithm that generate to be encrypted the data that collect.Finally data and session key raw material after encrypting are sent to the recipient.After legal recipient receives above-mentioned information, can calculate session key according to the secret information of the key material received and preservation, thereby can adopt this secret key decryption enciphered message, obtain the data that collect, to reach the purpose of sensing data safe transmission.In addition, single-chip microcomputer can also carry out regular renewal to session key, thereby effectively reduces the probability of being attacked.
The above is only preferred implementation of the present utility model; it should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the utility model principle; can also make some improvement or distortion, these improvement or distortion also should be considered as protection range of the present utility model.

Claims (4)

1. a wireless Internet of Things data security intelligence transmission system, comprise collection terminal, convergence terminal, wireless routing and terminal computer, it is characterized in that: described collection terminal comprises sensing equipment, single-chip microcomputer and 433 sending modules, sensing equipment connects with the input of single-chip microcomputer, and the output of single-chip microcomputer connects with 433 sending modules; Described convergence terminal comprises 433 receiver modules, ucos system module and network interface, and 433 receiver modules connect with the input of ucos system module, and the output of ucos system module connects network interface.
2. a kind of wireless Internet of Things data security intelligence transmission system according to claim 1, it is characterized in that: described single-chip microcomputer is the single-chip microcomputer of STC12LE5A60S2 model.
3. a kind of wireless Internet of Things data security intelligence transmission system according to claim 1, is characterized in that: the RFDC of described 433 sending modules and 433 receiver modules employing 433MHz frequency range.
4. a kind of wireless Internet of Things data security intelligence transmission system according to claim 1, it is characterized in that: described network interface is Internet, GSM, CDMA, GPRS or 3G network mouth.
CN2013203518390U 2013-06-19 2013-06-19 Wireless Internet of Things data safety intelligent transmission system Expired - Fee Related CN203352621U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013203518390U CN203352621U (en) 2013-06-19 2013-06-19 Wireless Internet of Things data safety intelligent transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013203518390U CN203352621U (en) 2013-06-19 2013-06-19 Wireless Internet of Things data safety intelligent transmission system

Publications (1)

Publication Number Publication Date
CN203352621U true CN203352621U (en) 2013-12-18

Family

ID=49752465

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013203518390U Expired - Fee Related CN203352621U (en) 2013-06-19 2013-06-19 Wireless Internet of Things data safety intelligent transmission system

Country Status (1)

Country Link
CN (1) CN203352621U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103298157A (en) * 2013-06-19 2013-09-11 中国地质大学(武汉) Data safety intelligent transmission system for wireless internet of things
CN107948145A (en) * 2017-11-17 2018-04-20 成都正光恒电子科技有限责任公司 A kind of wireless internet of things data safety Intelligent Transportation Systems
CN115379444A (en) * 2022-07-12 2022-11-22 广东技术师范大学 Wireless Internet of things data secure intelligent transmission system and encryption method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103298157A (en) * 2013-06-19 2013-09-11 中国地质大学(武汉) Data safety intelligent transmission system for wireless internet of things
CN107948145A (en) * 2017-11-17 2018-04-20 成都正光恒电子科技有限责任公司 A kind of wireless internet of things data safety Intelligent Transportation Systems
CN115379444A (en) * 2022-07-12 2022-11-22 广东技术师范大学 Wireless Internet of things data secure intelligent transmission system and encryption method

Similar Documents

Publication Publication Date Title
Cao et al. [Retracted] IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security
CN101282213B (en) Method and system for secure data aggregation in wireless sensor networks
Zhao et al. A survey on the internet of things security
Chacko et al. Security mechanisms and Vulnerabilities in LPWAN
Gan et al. Internet of things security analysis
CN102685740B (en) A kind of short-distance wireless communication node and wireless communications method
CN203352621U (en) Wireless Internet of Things data safety intelligent transmission system
Azarmehr et al. Secure authentication and access mechanism for IoT wireless sensors
Puthal Secure data collection and critical data transmission technique in mobile sink wireless sensor networks
CN103298157A (en) Data safety intelligent transmission system for wireless internet of things
CN107948145A (en) A kind of wireless internet of things data safety Intelligent Transportation Systems
CN103560998A (en) Method and system for wireless sensor network to resist DoS attacks
CN110166243B (en) Aggregation data privacy protection method based on elliptic curve in crowd sensing
CN102916813B (en) State estimation based intelligent power grid dynamic data encryption method
Juliana et al. Seladg: Secure energy efficient location aware data gathering approach for wireless sensor networks
CN112188485A (en) Encryption and decryption method based on Bluetooth communication
Guo et al. Study on secrecy capacity of wireless sensor networks in internet of things based on the amplify-and-forward compressed sensing scheme
CN105072113B (en) A kind of wireless sensor network security guard method based on data packet dynamic encryption
Banu et al. Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling
CN102355356A (en) Asymmetric encryption method suitable for ZIGBEE wireless meter reading
CN204350190U (en) A kind of video data enciphering/deciphering system of quick access security access platform
Arun et al. Encryption standards for security system in energy harvesting for IoT requirements
CN105227564A (en) For the method for the active and passive defence of the wireless sensor network in hazardous environment
CN115379444A (en) Wireless Internet of things data secure intelligent transmission system and encryption method
Men et al. Designing mutual authentication protocols in industrial wireless network

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131218

Termination date: 20150619

EXPY Termination of patent right or utility model