CN112822216A - Authentication method for binding of Internet of things sub-equipment - Google Patents

Authentication method for binding of Internet of things sub-equipment Download PDF

Info

Publication number
CN112822216A
CN112822216A CN202110202768.7A CN202110202768A CN112822216A CN 112822216 A CN112822216 A CN 112822216A CN 202110202768 A CN202110202768 A CN 202110202768A CN 112822216 A CN112822216 A CN 112822216A
Authority
CN
China
Prior art keywords
bound
edge gateway
binding
server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110202768.7A
Other languages
Chinese (zh)
Inventor
王燕朋
胥哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Jiewei Technology Co ltd
Original Assignee
Chengdu Jiewei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Jiewei Technology Co ltd filed Critical Chengdu Jiewei Technology Co ltd
Priority to CN202110202768.7A priority Critical patent/CN112822216A/en
Publication of CN112822216A publication Critical patent/CN112822216A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an authentication method for binding of Internet of things sub-equipment. The method comprises the following steps: establishing trust between the equipment to be bound and the edge gateway, and generating a communication key for communication through a key exchange algorithm; and the device to be bound sends the preset device ID and the key to the edge gateway, and the edge gateway initiates authentication to the server instead of the device to be bound. The server obtains the authentication information of the device to be bound through the edge gateway, and simultaneously interacts with the terminal software to determine whether the device to be bound confirms the binding relationship, the server receives the message that the application software determines the binding through the authentication of the device to be bound and then sends the message that the binding is determined to the edge gateway, the edge gateway immediately sends the server and the network login confirmation message to the device to be bound, and after receiving the message, the device to be bound directly establishes communication with the gateway or the server, namely the binding is successful. The link authentication problem of the grouped and complete-set mutually-cooperated Internet of things intelligent equipment and the efficiency problem of binding a large amount of equipment and application software are effectively solved, the production cost is greatly reduced, and the working efficiency is improved.

Description

Authentication method for binding of Internet of things sub-equipment
Technical Field
The invention relates to the technical field of Internet of things, in particular to an authentication method for binding of sub-equipment of an Internet of things.
Background
Along with the development of the internet of things technology, intelligent equipment is continuously emerged, through complete sets and groups of intelligent equipment, the situations meeting the complex requirements of specific application scenes are more and more, for example, scenes such as safety power utilization, intelligent fire protection and intelligent communities need different intelligent equipment to monitor data and parameters of different types and report the data and the parameters, and then the terminal application passes through the data, can remotely control and intervene the equipment, and the purpose of remotely keeping the good running state of the application environment is achieved.
In actual application deployment, although complete sets and groups of intelligent devices have different functions and are divided into different parts, the complete sets and groups of intelligent devices have a common requirement, namely, the complete sets and groups of intelligent devices are authenticated and communicated with a server, the number of the devices is large, and the workload of manually adding mapping devices to application software by users is huge. Meanwhile, due to different requirements of application scenarios under different conditions, deployment schemes of sets and groups of intelligent devices are non-standardized, which is particularly obvious when the intelligent devices are oriented to consumer services, and the solution is to integrate edge gateways or authentication gateways on each intelligent device.
In some specific application scenarios, such as intelligent fire protection, for intelligent devices, parameters such as power, hydraulic pressure, gas, smoke, etc. need to be monitored, and other scenarios, such as intelligent power consumption, besides monitoring the same power consumption parameter, also need to monitor power consumption of different loops, i.e. different power consumption loops, and install the same intelligent device, in this case, the edge gateway or the authentication gateway is integrated on each intelligent device, and the economy and efficiency will become worse.
Disclosure of Invention
The invention provides an authentication method for binding sub-equipment of an internet of things.
In order to achieve the above object, the present invention adopts the following technical solutions.
S1: the device to be bound sends a request to the edge gateway in a specific data frame broadcasting mode.
S2: and after receiving the request, the edge gateway replies the ACK identification survival to the equipment.
S3: and generating a communication key by the equipment to be bound and the edge gateway through a key exchange algorithm.
S4: and the device to be bound sends the information of the device to the edge gateway.
S5: and after receiving the equipment information, the edge gateway replaces the equipment to be bound to initiate an authentication request to the server.
S6: and after the server successfully authenticates, sending authentication success information to the edge gateway and sending request binding confirmation information to the application software of the corresponding user.
S7: after the user confirms the binding of the equipment to be bound by the application software, the server receives the binding relation confirming information and immediately sends the equipment binding relation confirming information to the edge gateway.
S8: the edge gateway sends the server and the network login confirmation information to the equipment, and the equipment to be bound directly establishes communication with the server by using the information after receiving the login information until the equipment is bound successfully.
Preferably, the device to be bound sends a request to the edge gateway in a specific data frame broadcasting manner, and further includes that the device to be bound is an internet of things terminal or an internet of things sub-device. The edge gateway is an Internet of things terminal of an authentication gateway or an integrated gateway. The link mode of the device to be bound and the edge gateway can be established through a logical link including but not limited to wifi, bluetooth, zigbee and the like, and also through a physical link including but not limited to RS485 and the like.
Preferably, after receiving the request, the edge gateway replies an ACK identifier to the device for survival, further including that a link between the edge gateway and the device to be bound supports a TCP/IP protocol.
Preferably, the device to be bound and the edge gateway generate a communication key through a key exchange algorithm, and further include that the preset symmetric encryption key pair generates a communication key through a protocol agreed common key through the key exchange algorithm.
Preferably, the device to be bound sends the information of the device to the edge gateway, and further includes that the device to be bound encrypts the preset device information through a communication key and sends a ciphertext to the edge gateway.
Preferably, after receiving the device information, the edge gateway initiates an authentication request to the server instead of the device to be bound. And further comprising that after receiving the equipment information ciphertext, the edge gateway initiates authentication information to the server after passing decryption verification.
Preferably, after the server successfully authenticates, the server sends successful authentication information to the edge gateway and sends request binding confirmation information to the application software of the corresponding user. The method further comprises the steps that after the edge gateway receives the successful authentication message, the message is returned to the device to be bound, the device to be bound enters a waiting confirmation state, and the application software receives the request binding confirmation and needs the user to perform manual operation confirmation.
Preferably, after the user confirms to bind the device to be bound by the application software, the server receives the binding relation confirmation information and immediately sends the device binding relation confirmation information to the edge gateway. Further, the application software includes but is not limited to APP, small programs, WEB applications and the like, and the user only needs to confirm the binding relationship and does not need to perform complicated steps such as equipment import.
Preferably, the edge gateway sends the server and the network login confirmation information to the device, and the device to be bound directly establishes communication with the server by using the information after receiving the login information, so that the device is bound successfully. The method further comprises the steps that the login information comprises login confirmation information such as SSID (service set identifier), login keys and the like, and the device to be bound directly establishes a link with the server after receiving the information.
Drawings
FIG. 1 is a business flow diagram of an embodiment of the invention.
Fig. 2 is a schematic diagram of an authentication method for binding of internet of things sub-devices according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings, in which it is understood that the embodiments described are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the authentication method between the device to be bound and the edge gateway is that the device to be bound broadcasts in a specific frame manner to find an available edge gateway in a signal coverage area of the device to be bound, and the available edge gateway replies an ACK to the device to be bound to confirm survival.
The communication between the device to be bound and the edge gateway is encrypted by a preset symmetric encryption pair, then a communication key is generated by encrypting through a key exchange algorithm through a key and an encryption mode agreed by a protocol, and encrypted communication is carried out on the basis of the communication key.
The method comprises the steps that an edge gateway initiates authentication of equipment to be bound to a server, firstly, the equipment to be bound needs to send equipment information such as an equipment ID and a secret key preset in a factory to the edge gateway through communication secret key encryption, the edge gateway receives information and then initiates authentication of the equipment to be bound to the server instead, and the server needs to confirm that the equipment is trustable equipment.
The server confirms authentication to the edge gateway, namely the server returns authentication information of whether the device to be bound is a trusted device to the edge gateway, if the device to be bound is the trusted device, the edge gateway sends a message to the device to be bound, and the device to be bound enters a waiting confirmation state determined by the next binding with the application software.
The server requests the application software for binding, the server initiates confirmation of the binding to the application software, and the user needs to manually confirm on the application software.
The server confirms the binding to the edge gateway, the user confirms and then sends confirmation information to the server, and the server sends the information for confirming the binding relationship to the edge gateway.
The edge gateway sends the server and the network login information to the equipment to be bound, and the edge gateway sends the distributed server information and the stored network login information to the equipment to be bound.
If the device to be bound has the TCP/IP protocol stack and the communication access capability, the communication with the server is established, and the device to be bound uses the server and the network login information to carry out the link and establishes the communication with the server.
Further, as shown in fig. 2, the symmetric key pair used in the key exchange algorithm is preset in the edge gateway and the device to be bound before the factory shipment.
The edge gateway and the application software have established a link with the server and the edge gateway stores the network login information in local memory.
S1: the device to be bound sends a request to the edge gateway in a specific data frame broadcasting mode.
The device to be bound is the internet of things sub-device, and the edge gateway can be an independent authentication gateway or an internet of things device integrated with the authentication gateway. The link between the device to be bound and the edge gateway can be established through a logical link including but not limited to wifi, bluetooth, zigbee and the like, and also through a physical link including but not limited to RS485 and the like. Further, the device to be bound searches for an available gateway through a specific data frame broadcasting mode.
S2: and after receiving the request, the edge gateway replies the ACK identification survival to the equipment.
The link between the device to be bound and the edge gateway supports a TCP/IP protocol, and the available edge gateway returns an ACK to the device to be bound after receiving the broadcast of the device to be bound.
S3: and generating a communication key by the equipment to be bound and the edge gateway through a key exchange algorithm.
And carrying out a key exchange algorithm by using a preset key pair and a protocol to generate a communication key for communication between the device to be bound and the edge gateway.
S4: and the device to be bound sends the information of the device to the edge gateway.
Before leaving the factory, the device information is preset in a local memory of the device to be bound, includes information used for authentication, such as a device ID and a secret key, and is encrypted and sent to the edge gateway by using a communication secret key.
S5: and after receiving the equipment information, the edge gateway replaces the equipment to be bound to initiate an authentication request to the server.
After receiving the ciphertext, the edge gateway decrypts the ciphertext by using the communication key, performs rule verification on the plaintext, and initiates authentication of the equipment to be bound to the server instead after the plaintext is successfully verified.
S6: and after the server successfully authenticates, sending authentication success information to the edge gateway and sending request binding confirmation information to the application software of the corresponding user.
The edge gateway and the server communicate through the established link and communication mode, after the server authenticates the equipment to be bound as trustable equipment, the server sends a confirmation authentication message to the edge gateway, the edge gateway immediately sends a message to the equipment to be bound, the equipment to be bound enters a waiting binding confirmation state, and meanwhile, the server sends a request binding confirmation to an application of a corresponding user and enters a manual confirmation stage of the user.
S7: after the user confirms the binding of the equipment to be bound by the application software, the server receives the binding relation confirming information and immediately sends the equipment binding relation confirming information to the edge gateway.
The user only needs to confirm the binding at the terminal software, so that the complicated step of adding the equipment is omitted, namely, the equipment can be automatically authenticated by networking, and the binding relationship is confirmed by the user. Then, sending a binding confirmation message to the server, and after receiving the message, the server sends the binding confirmation message to the edge gateway.
S8: the edge gateway sends the server and the network login confirmation information to the equipment, and the equipment to be bound directly establishes communication with the server by using the information after receiving the login information until the equipment is bound successfully.
The server and the network login information include, but are not limited to, an SSID and a key of the network, a login account and a key of the server, and a transmission method, an encryption and decryption method, and the like. After the binding is successful, the communication mode of the device optionally communicates with the server through the edge gateway or directly communicates with the server without the edge gateway.
According to the invention, by using an encryption algorithm and a set of communication mechanism, the problem of communication authentication and connection of the intelligent equipment of the internet of things working in groups and in a set is ensured, the step of manually adding equipment and mapping the equipment to terminal software by a user is omitted, the working efficiency is greatly improved, more importantly, the problem of high cost is solved that a plurality of intelligent equipment of the internet of things are not required to be integrated with a gateway for networking and communication authentication in a scene of co-operation.
And finally: the above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit and principle of the present invention are intended to be included in the scope of the present invention.

Claims (10)

1. An authentication method for binding of Internet of things sub-devices comprises the following steps: the device to be bound sends a request to the edge gateway, and the edge gateway replies a confirmation to the device to be bound after receiving the request; after trust is established, a communication key is generated through a key exchange algorithm; the device to be bound sends the device information to the edge gateway, and the edge gateway initiates authentication to the server instead of the binding device after receiving the device information; after the authentication is successful, the server respectively sends authentication success information and request binding confirmation to the edge gateway and the application software; after the user confirms the binding by the application software, the server receives the confirmation information and immediately sends the information for confirming the binding relationship of the equipment to the edge gateway; the edge gateway sends the server and the network login confirmation information to the equipment, and the equipment to be bound directly establishes communication with the server by using the information after receiving the login information until the equipment is bound successfully.
2. The method for authenticating the binding of the internet of things sub-device according to claim 1, wherein: the method for sending the request to the edge gateway by the device to be bound, wherein the response of the edge gateway to the confirmation to the device to be bound after receiving the request comprises the following steps:
the device to be bound sends a request to the edge gateway in a specific data frame broadcasting mode;
after receiving the request, the edge gateway replies ACK identification survival to the equipment;
the device to be bound communicates with the edge gateway, including but not limited to establishing communication in a physical or logical link.
3. The method for authenticating the binding of the internet of things sub-device according to claim 2, wherein: the device to be bound communicates with the edge gateway, including but not limited to establishing communication in a physical or logical link manner, including that the edge gateway may be an independent gateway or a device with gateway function, and may establish communication with the device to be bound in a logical link manner including but not limited to wifi, bluetooth, zigbee and the like, and may also establish communication in a physical link manner including but not limited to RS485 and the like.
4. The method for authenticating the binding of the internet of things sub-device according to claim 1, wherein: after establishing trust, generating a communication key through a key exchange algorithm, including: the communication key is generated by a key exchange algorithm from a preset key pair to a common key agreed upon by the protocol.
5. The method for authenticating the binding of the internet of things sub-device according to claim 4, wherein: the preset key pair generates a communication key through a common key agreed by a protocol through a key exchange algorithm; the method comprises the following steps: presetting two groups of symmetric encryption key pairs, wherein one group is an initial key and is used for verifying whether the equipment to be bound is trusted equipment or not by an edge gateway; one group is 'verification key' used for verifying whether the edge gateway is a trusting device or not by the device to be bound; and the two groups of key pairs are preset before the equipment to be bound and the edge gateway leave a factory.
6. The method for authenticating the binding of the internet of things sub-device according to claim 1, wherein: the device to be bound sends the device information to the edge gateway, and the edge gateway initiates authentication to the server instead of the binding device after receiving the device information; the method comprises the following steps: the device information comprises a device ID, a secret key and the like preset before the device to be bound leaves a factory, the device ID, the secret key and the like are encrypted through a communication secret key and then sent to the edge gateway, and the edge gateway sends a ciphertext of the device information to the server side for authentication.
7. The method for authenticating the binding of the internet of things sub-device according to claim 1, wherein: after the authentication is successful, the server respectively sends authentication success information and request binding confirmation to the edge gateway and the application software; the method comprises the following steps: and after the server side decrypts the ciphertext, the rule is verified, an authentication success message is returned to the edge gateway after the verification is successful, and meanwhile, the confirmation of the request binding is initiated in the application software.
8. The method for authenticating the binding of the internet of things sub-device according to claim 6, wherein: the application software initiates confirmation of the request binding; the method comprises the following steps: application software includes, but is not limited to, APP, applets, WEB applications, and the like.
9. The method for authenticating the binding of the internet of things sub-device according to claim 1, wherein: after the user confirms the binding by the application software, the server receives the confirmation information and immediately sends the information of the binding relationship of the confirmation equipment to the edge gateway, and the method comprises the following steps: the user needs to perform manual confirmation on the application software, and the server sends a binding relation confirmation message to the edge gateway after receiving the confirmation message.
10. The method for authenticating the binding of the internet of things sub-device according to claim 1, wherein: the edge gateway sends the server and the network login confirmation information to the equipment, the equipment to be bound directly establishes communication with the server by using the information after receiving the login information, and the equipment binding is successful, and the method comprises the following steps: the server login information comprises confirmation information such as server SSID (service set identifier), a secret key and the like, the confirmation information is sent to the device to be bound by the gateway, the device to be bound is linked with the server through the login information, communication is established successfully through the link, and the device is bound successfully.
CN202110202768.7A 2021-02-24 2021-02-24 Authentication method for binding of Internet of things sub-equipment Pending CN112822216A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110202768.7A CN112822216A (en) 2021-02-24 2021-02-24 Authentication method for binding of Internet of things sub-equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110202768.7A CN112822216A (en) 2021-02-24 2021-02-24 Authentication method for binding of Internet of things sub-equipment

Publications (1)

Publication Number Publication Date
CN112822216A true CN112822216A (en) 2021-05-18

Family

ID=75863805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110202768.7A Pending CN112822216A (en) 2021-02-24 2021-02-24 Authentication method for binding of Internet of things sub-equipment

Country Status (1)

Country Link
CN (1) CN112822216A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113595992A (en) * 2021-07-07 2021-11-02 青岛海尔科技有限公司 Secure binding method and system, storage medium and electronic device
CN114666151A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Equipment binding method, device, terminal, Internet of things equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113595992A (en) * 2021-07-07 2021-11-02 青岛海尔科技有限公司 Secure binding method and system, storage medium and electronic device
CN114666151A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Equipment binding method, device, terminal, Internet of things equipment and storage medium
CN114666151B (en) * 2022-04-08 2024-02-27 深圳市欧瑞博科技股份有限公司 Equipment binding method, device, terminal, internet of things equipment and storage medium

Similar Documents

Publication Publication Date Title
US10379839B2 (en) Device and method for facilitating secure communications over a cellular network
EP2590356B1 (en) Method, device and system for authenticating gateway, node and server
CN104145465B (en) The method and apparatus of bootstrapping based on group in machine type communication
US20100034386A1 (en) Device manager repository
CN102957584B (en) Home network equipment management method, control equipment and home network equipment
CN113347741B (en) Online method and system of gateway equipment
WO2011116589A1 (en) Combination network and method for wireless sensor network terminal to join in network
CN111970699B (en) Terminal WIFI login authentication method and system based on IPK
Messerges et al. A security design for a general purpose, self-organizing, multihop ad hoc wireless network
CN112822216A (en) Authentication method for binding of Internet of things sub-equipment
Khan et al. Secure communication architecture for dynamic energy management in smart grid
WO2012075814A1 (en) Method and system for application key management for mtc group devices
CN110716441A (en) Method for controlling intelligent equipment, intelligent home system, equipment and medium
CN109962781A (en) A kind of digital certificate diostribution device
CN101527907A (en) Wireless local area network access authentication method and wireless local area network system
CN110741660B (en) Data transmission between a terminal and an associated server
CN117119012A (en) Urban lifeline data processing method and equipment
CN100428748C (en) Dual-status-based multi-party communication method
CN103560891A (en) Method for identifying communication identifier of household wireless Internet of Things
CN115567195A (en) Secure communication method, client, server, terminal and network side equipment
US11778036B2 (en) Management of communication between a terminal and a network server
CN113973274A (en) Management method compatible with LoRaWAN standard communication and private LoRa communication simultaneously
Martignon et al. DSA‐Mesh: a distributed security architecture for wireless mesh networks
CN101753353B (en) SNMP based safety management method, Trap message processing method and device
Cavalieri et al. Implementing encryption and authentication in KNX using Diffie-Hellman and AES algorithms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication