CN205812031U - The secrecy remotely controlled for Internet of Things controls device - Google Patents

The secrecy remotely controlled for Internet of Things controls device Download PDF

Info

Publication number
CN205812031U
CN205812031U CN201620708389.XU CN201620708389U CN205812031U CN 205812031 U CN205812031 U CN 205812031U CN 201620708389 U CN201620708389 U CN 201620708389U CN 205812031 U CN205812031 U CN 205812031U
Authority
CN
China
Prior art keywords
key
circuit
time pad
encryption
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201620708389.XU
Other languages
Chinese (zh)
Inventor
金贤敏
庞晓玲
乔璐枫
孙轲
刘煜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN201620708389.XU priority Critical patent/CN205812031U/en
Application granted granted Critical
Publication of CN205812031U publication Critical patent/CN205812031U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

A kind of secrecy remotely controlled for Internet of Things controls device, using key sequence different storage positions in memory as bright key, carries out synchronized update after every time to instruction cryptographic operation, and as a part for ciphertext instruction;When receiving circuit and being decrypted, first read the bright key in ciphertext instruction and obtain the storage position of key, then read key and ciphertext instruction is decrypted.This utility model is by utilizing quantum true random number, the most reliable true random number cipher key source, in conjunction with one-time pad AES, it is possible to achieve telesecurity based on said system exploitation controls, and the secrecy realizing being perfectly safe between Internet of Things remote wireless communication device controls.

Description

The secrecy remotely controlled for Internet of Things controls device
Technical field
The utility model relates to the technology that between a kind of internet of things equipment, wireless encryption controls, specifically a kind of based on amount Sub-random number, in combination with the long-distance safety controller of one-time pad AES.
Background technology
Remote control technology important component part in control field, is generally divided into wired remote control and wireless remote Control.The wireless mode used between internet of things equipment sends and controls have bigger being ravesdropping compared to traditional wired mode The danger even distorted, but the most mainly by using the plain-text instructions without encryption in a lot of control system.Past 100 years in cryptography quickly grow, contemporary cryptology is broadly divided into two classes: a class is symmetric cryptosystem, another kind of right and wrong Symmetric cryptosystem.Conventional asymmetric cryptographic algorithm has RSA, Merkler Hellman, ELGamal, Rabin etc..Commonly use Symmetric cryptosystem has DES, AES, RC5 etc..One-time pad belongs to symmetry cipher, is the one preferably side of encryption Case, theoretically, uses the system of one-time pad algorithm for encryption to decode.One-time pad AES is mainly used in Sensitive low bandwidth channel, is used for secrecy top secret file by the military and government very early.One-time pad algorithm requirement Key is true random number, and the most usually utilizes computer to produce pseudo random number according to special algorithm, and pseudo random number is through foot Can produce sequence after the enough long time to repeat, this point limits one-time pad and widely answers at the aspect such as civilian and commercial With.Nowadays along with the development of modern quantum techniques, we can utilize quantum-mechanical uncertainty principle true to obtain quantum Random number, the quantum real random number generator of the most day by day commercialization makes one-time pad algorithm have bigger application prospect.
Utility model content
This utility model cannot be applied to Internet of Things for existing quantum accidental enciphering technology, and action and instruction is same Step property is difficult to meet the defects such as requirement, proposes a kind of secrecy remotely controlled for Internet of Things and controls device, deposits in hardware Storage and management key, by utilizing quantum true random number, true random number cipher key source i.e. reliably, calculate in conjunction with one-time pad encryption Method, it is possible to achieve telesecurity based on said system exploitation controls, and realizes absolutely between Internet of Things remote wireless communication device The secrecy of safety is controlled.
This utility model is achieved through the following technical solutions:
This utility model includes: key generator circuitry, key management circuit, encryption transtation mission circuit and receiving and deciphering electricity Road, wherein: key generator circuitry is connected with key management circuit and transmits key information, and key management circuit sends electricity with encryption Road is connected and carries out one-time pad cryptographic operation, and key management circuit is connected with receiving and deciphering circuit and carries out one-time pad deciphering behaviour Making, ciphertext transtation mission circuit receives circuit and is connected and transmits ciphertext instruction with ciphertext.
Described key management circuit includes: embedded controller and crypto key memory, wherein: embedded controller is with close Key memorizer is connected and transmits key information.
Described encryption transtation mission circuit includes: one-time pad encryption equipment, synchronizing address manager and wireless transmitter, its In: one-time pad encryption equipment is connected with synchronizing address manager and transmits key information, one-time pad encryption equipment and wireless transmit Device is connected and sends ciphertext instruction.
Described receiving and deciphering circuit includes: one-time pad decipher, synchronizing address manager and wireless receiver, its In: one-time pad decipher is connected with synchronizing address manager and transmits key information, one-time pad decipher and wireless receiving Device is connected and the instruction of receiving and deciphering ciphertext.
Technique effect
Compared with prior art, this utility model, by being separated with communication equipment by true Random Number Generator, devises close Key storage, manager and communication protocol, it is achieved control end and the encryption of long-range actuating station, the synchronization of deciphering;Next, in order to ensure Being perfectly safe of key, this utility model devises key storage and renovator in the way of hardware, it is to avoid key exposure;? After, this utility model employing one-time pad AES ensure that ciphertext instruction is theoretic and can not decode completely.Therefore, this is remote Process control scheme is perfectly safe.
Accompanying drawing explanation
Fig. 1 is internet of things equipment encryption control system structure chart in embodiment 1;
Fig. 2 is remote control transtation mission circuit order structure figure in embodiment 1 (as a example by unmanned aerial vehicle (UAV) control instructs);
Fig. 3 is to receive circuit order structure figure (as a example by unmanned aerial vehicle (UAV) control instructs) in embodiment 1;
Fig. 4 is the plaintext and ciphertext data waveform intercepted and captured.
Detailed description of the invention
Embodiment 1
As it is shown in figure 1, the present embodiment relates to a kind of security control system being applied to UAS, including: quantum with The instruction of machine generative circuit, key management circuit, unmanned plane performs to receive circuit and unmanned plane instruction issue circuitry, wherein: amount Sub-random number generation circuit is connected with key management circuit and transmits key information, and key management circuit sends with unmanned plane instruction Circuit is connected and carries out one-time pad encryption, and key management circuit is connected with unmanned plane command reception circuit and carries out one-time pad Deciphering, unmanned plane instruction issue circuitry and unmanned plane instruction perform receive circuit wireless connections and transmit ciphertext instruction.
The present embodiment relates to the method for controlling security of said system, comprises the following steps:
Supplementing and renewal of step 1. key: detection unmanned plane instruction performs to receive circuit and unmanned plane instruction issue circuitry Key storage circuitry in whether remain with enough random number key information, when do not have enough keys or need the most more Xinmi City During key, by quantum stochastic generation circuit evolving random number key data, it is saved in External memory equipment such as SD card, by close The key supplementary circuitry of key management circuit, successively is written to outside the Flash of transmission and reception circuit deposit by a key file In storage chip, ensure that the random number in encryption, decrypting end chip is identical with this.When existing enough in Flash external memory chip Key, then skip step 1 and directly carry out step 2;
The encryption of step 2. information and transmission: after unmanned plane instruction issue circuitry equipment starts, then the last time preserves From the beginning of current key address (if using first, then from initial address 0x000000), store core from the Flash of key management circuit Sheet reads fixing M key, is saved in buffer area, is divided into N group so that the key length often organized is more than or equal to plain-text instructions Length.Taking the 1st group key byte and command byte, step-by-step carries out XOR and obtains ciphertext.By attached to starting position and the group of key Being added to the tail portion of ciphertext instruction, order structure such as Fig. 2, a [27] a [29] in Fig. 2 is key starting position, a [30] a [31] it is group.Ciphertext instruction after encryption is sent by the wireless transmitter finally by unmanned plane instruction issue circuitry. Meanwhile, if the one-time pad encryption equipment of unmanned plane instruction issue circuitry starts creates error code when reading key, causing cannot be just Really encryption or deciphering, one-time pad encryption equipment will re-start stressed key and re-encrypted, transmission automatically.
The reception of step 3. information and deciphering: when the wireless receiver of unmanned plane instruction execution reception circuit receives remote control During instruction, first read the key storage address at instruction end, take out corresponding secret key byte according to address, decipher at one-time pad Carry out XOR obtain in plain text, finally identifying the implication of plain-text instructions with plain-text instructions byte step-by-step under device controls, perform corresponding Task, send receive answer signal, instruction results such as Fig. 3.Meanwhile, if unmanned plane instruction performs to receive circuit reading key Creating error code, cause cannot correctly encrypting or deciphering, one-time pad decipher will re-start stressed key and weight automatically New deciphering.
Described random number key data, when each encrypted instruction, consume identical length according to the length of required encrypted instruction The key of degree.Specific implementation is: the command length every time encrypted added up, and this information determines used key next time Original position, thus realize the most used key will be no longer used next time.
Described key length M value needs moderate, unsuitable excessive, spending the time oversize in order to avoid reading key, causing nothing Instruction is sent by method in time;Unsuitable too small, excessively to exempt to read continually Flash memory chip, shorten Flash and store core The sheet life-span.
Described key service condition information includes a shaping array, is stored in opening of Flash chip address space Head part, is used for recording user and uses key length, i.e. current key position in the past, and this information only comprises the use feelings of key Condition, and do not comprise any concrete key information, individualism the most in all senses, does not affect the safety of system.
Described system key service condition information when first operation is: 0x000000, every time before encryption, first from synchronization Address manager reads key service condition information, and maps that to a variable for the position of control key reading X, when consuming M key, after i.e. having encrypted the instruction of a length of M, performs X=X+M, i.e. updates X value and make as new key Use situation information content, and be newly stored into key management circuit.
Compared with prior art, the present embodiment uses the true random number produced by quantum random number generator, and Having generating random number speed faster, each key only uses once, it is achieved that real one-time pad unmanned plane is remotely pacified Full control.Encryption, decipherment algorithm that this method uses are all step-by-step operations, and it is fast that processor performs speed, it is possible to achieve refers in real time Order transmission, controls the most in real time.Therefore, the peace of unmanned plane can be conveniently realized based on telesecurity control system of the present utility model The close control of all risk insurance.
In order to verify the reliability of encrypted instruction, intercept and capture remote controller respectively with the circuit with NRF24L01 radio-circuit and send out It is mapped to aerial plaintext, ciphertext electromagnetic wave director data, stores data in SD card, carry out at data with Matlab software Reason.Finally can obtain waveform as shown in Figure 4.As can be seen here, the plaintext before encryption has obvious periodicity, and the ciphertext after encryption is miscellaneous Disorderly without chapter.
Above-mentioned be embodied as can by those skilled in the art on the premise of without departing substantially from this utility model principle and objective with Different modes carries out local directed complete set to it, protection domain of the present utility model be as the criterion with claims and not by above-mentioned specifically Implementing to be limited, each implementation in the range of it is all by the constraint of this utility model.

Claims (3)

1. the secrecy remotely controlled for Internet of Things controls device, it is characterised in that including: key generator circuitry, key Management circuit, encryption transtation mission circuit and receiving and deciphering circuit, wherein: key generator circuitry is connected with key management circuit, close Key management circuit is connected with encryption transtation mission circuit, and key management circuit is connected with receiving and deciphering circuit, and ciphertext transtation mission circuit is with close Literary composition receives circuit and is connected;
Described key management circuit includes: embedded controller and crypto key memory, wherein: embedded controller is deposited with key Reservoir is connected.
Device the most according to claim 1, is characterized in that, described encryption transtation mission circuit includes: one-time pad encryption equipment, Synchronizing address manager and wireless transmitter, wherein: one-time pad encryption equipment is connected with synchronizing address manager, one-time pad Encryption equipment is connected with wireless transmitter.
Device the most according to claim 1, is characterized in that, described receiving and deciphering circuit includes: one-time pad decipher, Synchronizing address manager and wireless receiver, wherein: one-time pad decipher is connected with synchronizing address manager, one-time pad Decipher is connected with wireless receiver.
CN201620708389.XU 2016-07-07 2016-07-07 The secrecy remotely controlled for Internet of Things controls device Active CN205812031U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620708389.XU CN205812031U (en) 2016-07-07 2016-07-07 The secrecy remotely controlled for Internet of Things controls device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620708389.XU CN205812031U (en) 2016-07-07 2016-07-07 The secrecy remotely controlled for Internet of Things controls device

Publications (1)

Publication Number Publication Date
CN205812031U true CN205812031U (en) 2016-12-14

Family

ID=58140920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620708389.XU Active CN205812031U (en) 2016-07-07 2016-07-07 The secrecy remotely controlled for Internet of Things controls device

Country Status (1)

Country Link
CN (1) CN205812031U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213257A (en) * 2019-05-28 2019-09-06 中国电子科技集团公司第三十研究所 High safety IP secret communication method based on truly random stream exclusive or encryption
CN114584368A (en) * 2022-03-02 2022-06-03 上海图灵智算量子科技有限公司 Smart home secret communication system based on quantum true random number and control method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213257A (en) * 2019-05-28 2019-09-06 中国电子科技集团公司第三十研究所 High safety IP secret communication method based on truly random stream exclusive or encryption
CN110213257B (en) * 2019-05-28 2021-07-09 中国电子科技集团公司第三十研究所 High-safety IP secret communication method based on true random stream exclusive or encryption
CN114584368A (en) * 2022-03-02 2022-06-03 上海图灵智算量子科技有限公司 Smart home secret communication system based on quantum true random number and control method

Similar Documents

Publication Publication Date Title
CN106209356A (en) The privacy control method remotely controlled for Internet of Things and system
CN109040090B (en) A kind of data ciphering method and device
KR102042739B1 (en) Apparatus and method for communication using message history-based security key using blockchain
CN109257346B (en) Concealed transmission system based on block chain
US20170085543A1 (en) Apparatus and method for exchanging encryption key
CN104821944A (en) Hybrid encrypted network data security method and system
US9898100B2 (en) Authenticating stylus device
US8948397B2 (en) Major management apparatus, authorized management apparatus, electronic apparatus for delegated key management, and key management methods thereof
CN103685323A (en) Method for realizing intelligent home security networking based on intelligent cloud television gateway
CN116318657A (en) Relay key transmission method
CN107483192A (en) A kind of data transmission method and device based on quantum communication
CN104424446A (en) Safety verification and transmission method and system
CN102377571A (en) Method and system for implementing IEC104 message transmission
CN103248476A (en) Data encryption key management method, system and terminal
CN113542428B (en) Vehicle data uploading method and device, vehicle, system and storage medium
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN205812031U (en) The secrecy remotely controlled for Internet of Things controls device
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN105634884B (en) A kind of control instruction wiring method, intelligent home furnishing control method and relevant apparatus
CN105553670A (en) Cloud electronic signature authentication method
CN103873257A (en) Secrete key updating, digital signature and signature verification method and device
CN203554473U (en) Chaotic synchronous control system for secure communication system
KR102024062B1 (en) Device of transmitting key data to subscriber in multicast group
US20190199526A1 (en) Communication system and data communication method
CN106487495B (en) Lightweight RFID authentication method based on integer chaos

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant