CN114900328A - Internet of things security sensing access system and method - Google Patents

Internet of things security sensing access system and method Download PDF

Info

Publication number
CN114900328A
CN114900328A CN202210339231.XA CN202210339231A CN114900328A CN 114900328 A CN114900328 A CN 114900328A CN 202210339231 A CN202210339231 A CN 202210339231A CN 114900328 A CN114900328 A CN 114900328A
Authority
CN
China
Prior art keywords
layer
security
data
sensing
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210339231.XA
Other languages
Chinese (zh)
Inventor
陈锦煌
陈钊淇
邱泽敏
万智萍
许志明
涂珮琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xinhua College
Original Assignee
Guangzhou Xinhua College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xinhua College filed Critical Guangzhou Xinhua College
Priority to CN202210339231.XA priority Critical patent/CN114900328A/en
Publication of CN114900328A publication Critical patent/CN114900328A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a security sensing access system and a security sensing access method for an Internet of things, wherein the system comprises a sensing layer, a network layer and an application layer, the sensing layer acquires external physical information data, and the external physical information data is transmitted to the application layer through the network layer. According to the invention, the security layer is arranged between the sensing layer and the network layer, and the corresponding verification rule and encryption are established in the process of sending data to the sensing layer equipment in the security layer in consideration of the fact that the process of sending data by the sensing layer equipment is easy to crack and tamper, so that the security of the data is ensured.

Description

Internet of things security sensing access system and method
Technical Field
The invention relates to the technical field of security of an Internet of things system, in particular to a security sensing access system and a security sensing access method for the Internet of things.
Background
The Internet of Things (Internet of Things, IoT for short) is to collect any object or process needing monitoring, connection and interaction in real time and collect various required information such as sound, light, heat, electricity, mechanics, chemistry, biology and location through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors and laser scanners, and to realize ubiquitous connection of objects and people through various possible network accesses, and to realize intelligent sensing, identification and management of objects and processes. The system of the internet of things is divided into three layers from bottom to top, namely a perception layer, a network layer and an application layer, as shown in fig. 1. The sensing layer is used as an initial level of the internet of things and is also a source of basic data, and basic elements of the sensing layer are various types of sensors and units for accessing a network layer and transmitting data to each other. In the sensing layer, the equipment adopts a simple encryption mode or does not encrypt data, and a weak password is set when the sensing layer is accessed to the network layer.
The security problem of the sensing layer in the hierarchical architecture of the internet of things mainly lies in that false or missing of identification information and various sensors do not have any authentication mechanism or adopt a weak password mode as authentication, so that the security problem is easy to occur, and the method has the following defects:
(1) the sensing layer device is not provided with safety protection or adopts a simple encryption mode.
The sensor equipment of a general sensing layer can acquire detection information almost without any verification, all data are not encrypted, and no identity authentication is performed, and part of connection units adopt encryption authentication, but common user name passwords are used, such as all 0 or all 1.
(2) When the sensing layer is accessed to the network layer, a weak password is set or false problems occur in the access process.
The network accessed by the sensing layer is generally mobile communication, a wireless local area network or a wired local area network, the encryption user name and the password of the hardware are all pure digital passwords within less than 6 characters, and the forced scanning decryption time can be cracked if the forced scanning decryption time is short at the speed of the computer.
(3) Security issues for data transmission in the network layer.
Mainly presents as security problem of mobile communication network and wired and wireless computer network in transmission, and the cheating of hacker presents as the problems of transfer of remote false base station, wireless false signal connection, intermediate user and false terminal, etc.
The prior art discloses a method and a device for safe transmission of the Internet of things, wherein the method comprises the following steps: step 110, dividing the Internet of things into a sensing layer, a transmission layer and an application layer; step 120, randomly encrypting the data of the internet of things in the sensing layer to obtain a data ciphertext of the sensing layer, and sending the data ciphertext of the sensing layer to the transmission layer; step 130, decrypting the data ciphertext of the perception layer to obtain data of a transmission layer, and integrating the data of the transmission layer; step 140, randomly encrypting the integrated transmission layer data to obtain a transmission layer data ciphertext, and sending the transmission layer data ciphertext to an application layer; and 150, decrypting the data ciphertext of the transmission layer to obtain the data of the Internet of things. Although the method encrypts the perception layer data, the encryption is decentralized and easy to crack.
Disclosure of Invention
The invention aims to provide a security sensing access system of the Internet of things, which solves the problem of data security between a sensing layer and an access network layer in the existing Internet of things system.
The invention further aims to provide a security perception access method of the Internet of things.
In order to solve the technical problems, the technical scheme of the invention is as follows:
the utility model provides a thing networking security perception access system, includes perception layer, network layer and application layer, the perception layer acquires external physical information data, external physical information data passes through the network layer is transmitted to the application layer, still includes the security layer, the security layer uses asymmetric encryption algorithm to encrypt and transmit the external physical information data that the perception layer transmitted after establishing the safety communication mechanism between perception layer, network layer and application layer.
In order to ensure the safety of data and avoid hijacking the data under the condition of weak passwords, the system adopts a decentralized encryption mode in the process of accessing the data from the sensing layer to the network layer, namely, an asymmetric encryption algorithm is used for encrypting the data of the sensing layer, the sensing layer uses a public key of an application layer to encrypt the data, and the application layer uses a private key of the application layer to decrypt the data after receiving the data, otherwise. Namely, a security layer is formed between the network layer and the application layer and the perception layer. The advantage of this is that the data can be verified by the own key without verifying the authenticity of the data by the data center. The system is generally divided into three layers, one layer is a mechanism for forming encryption communication, the second layer is used for encrypting data by adopting a decentralized encryption algorithm, and the third layer is used for encrypting data.
Preferably, the security layer comprises a data encryption module and a data decryption module, wherein:
the data encryption module encrypts verification data of request communication initiated by the sensing layer when a secure communication mechanism is established among the sensing layer, the network layer and the application layer, and encrypts external physical information data transmitted by the sensing layer after the secure communication mechanism is established;
and the data decryption module decrypts encrypted communication-agreeable verification data returned by the network layer when a secure communication mechanism is established among the sensing layer, the network layer and the application layer.
Preferably, the authentication data of the request communication initiated by the perception layer and the encrypted authentication data of the agreement communication returned by the network layer are encrypted by using a DES algorithm.
Preferably, the external physical information data transmitted by the sensing layer is encrypted and transmitted by using an asymmetric encryption algorithm, specifically:
the sensing layer encrypts the external physical information data by using the public key of the application layer, and the application layer decrypts the external physical information data by using the private key of the application layer after receiving the encrypted external physical information data.
Preferably, the external physical information data transmitted by the sensing layer is encrypted by using an RSA algorithm.
Preferably, the network layer adopts wireless transmission and adopts TCP/IP protocol.
An Internet of things security perception access method is applied to the Internet of things security perception access system and comprises the following steps:
s1: the sensing layer establishes a secure communication mechanism with the network layer and the application layer through the security layer;
s2: the sensing layer sends the external physical information data encrypted by the asymmetric encryption algorithm to the application layer through the security layer.
Preferably, the sensing layer in step S1 establishes a secure communication mechanism with the network layer and the application layer through the security layer, specifically:
the method comprises the steps that a sensing layer initiates authentication data requesting communication, the authentication data requesting communication is encrypted by a DES algorithm in a security layer and then is sent to an application layer through a network layer;
the application layer receives a message of requesting communication of the sensing layer through decryption, sends a piece of communication agreement verification data encrypted by a DES algorithm, sends the communication agreement verification data to the security layer through the network layer, and forwards the encrypted communication agreement verification data to the sensing layer after the security layer decrypts the encrypted communication agreement verification data;
and the perception layer receives the verification data agreeing to the communication, and the establishment of the secure communication mechanism is completed.
Preferably, the sensing layer in step S2 sends the external physical information data encrypted by the asymmetric encryption algorithm to the application layer through the security layer, specifically:
the sensing layer sends the acquired external physical information data to the security layer, the security layer encrypts the external physical information data by using an RSA algorithm, and the external physical information data is sent to the application layer through the network layer after encryption is completed.
Preferably, the method further comprises the step S3: after the transmission of the external physical information data is finished, the sensing layer transmits verification data for finishing the communication request to the security layer, the security layer encrypts the verification data for finishing the communication request by using a DES algorithm, then transmits the encrypted verification data for finishing the communication request to the application layer through the network layer, and the application layer closes the communication after receiving the verification data for finishing the communication request.
Compared with the prior art, the technical scheme of the invention has the beneficial effects that:
according to the invention, the security layer is arranged between the sensing layer and the network layer, and the corresponding verification rule and encryption are established in the process of sending data to the sensing layer equipment in the security layer in consideration of the fact that the process of sending data by the sensing layer equipment is easy to crack and tamper, so that the security of the data is ensured.
Drawings
Fig. 1 is a schematic diagram of a three-layer architecture of a conventional internet of things.
Fig. 2 is a schematic diagram of an architecture of an internet of things security aware access system according to an embodiment.
FIG. 3 is a schematic flow chart of the method of the present invention.
Fig. 4 is a schematic diagram of data interaction between layers of an internet of things security aware access system according to an embodiment.
Detailed Description
The drawings are for illustrative purposes only and are not to be construed as limiting the patent;
for the purpose of better illustrating the embodiments, certain features of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product;
it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The technical solution of the present invention is further described below with reference to the accompanying drawings and examples.
Example 1
The embodiment provides a security sensing access system of the internet of things, which comprises a sensing layer, a network layer and an application layer, wherein the sensing layer acquires external physical information data, the external physical information data is transmitted to the application layer through the network layer, as shown in fig. 2, the security layer is used for encrypting and transmitting the external physical information data transmitted by the sensing layer by using an asymmetric encryption algorithm after a security communication mechanism is established among the sensing layer, the network layer and the application layer.
Taking a set of environment monitoring internet of things system as an example, the system comprises a sensing layer, a network layer and an application layer. The terminal equipment comprises an RFID, a temperature sensor, a humidity sensor, an illumination sensor, a smoke sensor, an application platform and the like, and data is transmitted through a wireless local area network;
in the sensing layer, a sensor acquires environmental data, a temperature sensor acquires temperature data, a humidity sensor acquires humidity data, and after data is formed in the sensor, the data is sent to an application platform through a Local Area Network (LAN), namely a network layer.
In the embodiment, an asymmetric encryption authentication algorithm is used for authenticating data between nodes of the internet of things, and various authentication modes are tried to be used in the design of the internet of things system, so that the problem of data security between a sensing layer and an access network layer in the internet of things system is solved. And a decentralized encryption mode is adopted, namely the data of the sensing layer is encrypted by using an asymmetric encryption algorithm, the sensing layer uses a public key of the application layer to encrypt the data, and the application layer uses a private key of the application layer to decrypt the data after receiving the data, otherwise. Namely, a security layer is formed between the network layer and the application layer and the perception layer. The advantage of this is that the data can be verified by the own key without verifying the authenticity of the data by the data center.
Example 2
This example continues to disclose the following on the basis of example 1:
the security layer comprises a data encryption module and a data decryption module, wherein:
the data encryption module encrypts verification data of request communication initiated by the sensing layer when a secure communication mechanism is established among the sensing layer, the network layer and the application layer, and encrypts external physical information data transmitted by the sensing layer after the secure communication mechanism is established;
and the data decryption module decrypts encrypted communication-agreeable verification data returned by the network layer when a secure communication mechanism is established among the sensing layer, the network layer and the application layer.
And the authentication data of the request communication initiated by the perception layer and the encrypted authentication data of the agreement communication returned by the network layer are encrypted by using a DES algorithm.
The external physical information data transmitted by the sensing layer is encrypted and transmitted by using an asymmetric encryption algorithm, and the method specifically comprises the following steps:
the sensing layer encrypts external physical information data by using a public key of the application layer, and the application layer decrypts the external physical information data by using a private key of the application layer after receiving the encrypted external physical information data.
And encrypting the external physical information data transmitted by the sensing layer by using an RSA algorithm.
The network layer adopts wireless transmission and adopts a TCP/IP protocol.
In order to ensure the safety of data and avoid hijacking the data under the condition of weak passwords, the system adopts a decentralized encryption mode in the process of accessing the data from the sensing layer to the network layer, namely, an asymmetric encryption algorithm is used for encrypting the data of the sensing layer, the sensing layer uses a public key of an application layer to encrypt the data, and the application layer uses a private key of the application layer to decrypt the data after receiving the data, otherwise. Namely, a security layer is formed between the network layer and the application layer and the perception layer. The advantage of this is that the data can be verified by the own key without verifying the credibility of the data through the data center. The system is generally divided into three layers, one layer is a mechanism for forming encryption communication, the second layer is used for encrypting data by adopting a decentralized encryption algorithm, and the third layer is used for encrypting data.
The first layer is to form an encrypted communication using the DES algorithm on a string of authentication data before sending the second layer of encrypted data; the second layer encrypts the data of the third layer by using an RSA algorithm; the third layer is encrypted data, i.e. data formed at the sensing layer.
The method comprises the following specific steps:
the method comprises the steps that firstly, environment information acquired by a sensing layer forms data in equipment and is required to be sent to an application layer, an encryption communication mechanism is required to be established before sending the data, verification data requesting communication is initiated by the sensing layer, the data is encrypted by a DES algorithm in a security layer and is sent to the application layer through a network layer, the application layer sends verification data agreeing to communication after receiving a message requesting communication of the sensing layer through decryption, the verification data is also encrypted by the DES algorithm and reaches the sensing layer through the network layer, the data is sent to the security layer after the message agreeing to communication is received by the sensing layer, the data is encrypted by the RSA algorithm in the security layer, the data is sent to the application layer through the network layer after the encryption is completed, the verification data finishing the communication is initiated by the sensing layer, the data is encrypted by the DES algorithm and is sent to the application layer through the network layer, and after the application layer receives the verification data finishing the communication, and closing the communication channel and ending the process.
Example 3
The embodiment provides an internet of things security sensing access method, as shown in fig. 3 and 4, which is applied to the internet of things security sensing access systems described in embodiments 1 and 2, and includes the following steps:
s1: the sensing layer establishes a secure communication mechanism with the network layer and the application layer through the security layer;
s2: and the sensing layer sends the external physical information data encrypted by the asymmetric encryption algorithm to the application layer through the security layer.
In step S1, the sensing layer establishes a secure communication mechanism with the network layer and the application layer through the security layer, specifically:
the method comprises the steps that a sensing layer initiates authentication data requesting communication, the authentication data requesting communication is encrypted by a DES algorithm in a security layer and then is sent to an application layer through a network layer;
the application layer receives a message of requesting communication of the sensing layer through decryption, sends a piece of authentication data which is encrypted by a DES algorithm and agrees with communication, sends the authentication data to the security layer through the network layer, and forwards the encrypted authentication data which agrees with communication to the sensing layer after the security layer decrypts the encrypted authentication data;
and the perception layer receives the verification data agreeing to the communication, and the establishment of the secure communication mechanism is completed.
In step S2, the sensing layer sends the external physical information data encrypted by the asymmetric encryption algorithm to the application layer through the security layer, which specifically includes:
the sensing layer sends the acquired external physical information data to the security layer, the security layer encrypts the external physical information data by using an RSA algorithm, and the external physical information data is sent to the application layer through the network layer after encryption is completed.
Further comprising step S3: after the transmission of the external physical information data is finished, the sensing layer transmits verification data for finishing the communication request to the security layer, the security layer encrypts the verification data for finishing the communication request by using a DES algorithm, then transmits the encrypted verification data for finishing the communication request to the application layer through the network layer, and the application layer closes the communication after receiving the verification data for finishing the communication request.
The same or similar reference numerals correspond to the same or similar parts;
the terms describing positional relationships in the drawings are for illustrative purposes only and are not to be construed as limiting the patent;
it should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.

Claims (10)

1. The security perception access system for the Internet of things comprises a perception layer, a network layer and an application layer, wherein the perception layer acquires external physical information data, the external physical information data are transmitted to the application layer through the network layer, and the security perception access system is characterized by further comprising a security layer, and after a security communication mechanism is established among the perception layer, the network layer and the application layer, the security layer encrypts and transmits the external physical information data transmitted by the perception layer by using an asymmetric encryption algorithm.
2. The internet of things security-aware access system of claim 1, wherein the security layer comprises a data encryption module and a data decryption module, wherein:
the data encryption module encrypts verification data of request communication initiated by the sensing layer when a secure communication mechanism is established among the sensing layer, the network layer and the application layer, and encrypts external physical information data transmitted by the sensing layer after the secure communication mechanism is established;
and the data decryption module decrypts encrypted communication-agreeable verification data returned by the network layer when a secure communication mechanism is established among the sensing layer, the network layer and the application layer.
3. The internet of things security awareness access system according to claim 2, wherein the authentication data of the request communication initiated by the awareness layer and the encrypted authentication data of the agreement communication returned by the network layer are encrypted by using a DES algorithm.
4. The internet of things security perception access system according to claim 2, wherein the external physical information data transmitted by the perception layer is encrypted and transmitted by using an asymmetric encryption algorithm, specifically:
the sensing layer encrypts external physical information data by using a public key of the application layer, and the application layer decrypts the external physical information data by using a private key of the application layer after receiving the encrypted external physical information data.
5. The security awareness access system of the internet of things according to claim 4, wherein the external physical information data transmitted by the awareness layer is encrypted by using an RSA algorithm.
6. The internet of things security-aware access system of claim 1, wherein the network layer employs wireless transmission and employs TCP/IP protocol.
7. An Internet of things security perception access method is applied to the Internet of things security perception access system of any one of claims 1 to 6, and comprises the following steps:
s1: the sensing layer establishes a secure communication mechanism with the network layer and the application layer through the security layer;
s2: and the sensing layer sends the external physical information data encrypted by the asymmetric encryption algorithm to the application layer through the security layer.
8. The internet of things security awareness access method according to claim 7, wherein the secure communication mechanism is established between the sensing layer and the network layer and between the sensing layer and the application layer through the security layer in step S1, and specifically includes:
initiating verification data requesting communication by a sensing layer, wherein the verification data requesting communication is encrypted by a DES algorithm in a security layer and then is sent to an application layer through a network layer;
the application layer receives a message of requesting communication of the sensing layer through decryption, sends a piece of authentication data which is encrypted by a DES algorithm and agrees with communication, sends the authentication data to the security layer through the network layer, and forwards the encrypted authentication data which agrees with communication to the sensing layer after the security layer decrypts the encrypted authentication data;
and the perception layer receives the verification data agreeing to the communication, and the establishment of the secure communication mechanism is completed.
9. The internet of things security perception access method according to claim 8, wherein the perception layer in the step S2 sends the external physical information data encrypted by the asymmetric encryption algorithm to the application layer through the security layer, specifically:
the sensing layer sends the acquired external physical information data to the security layer, the security layer encrypts the external physical information data by using an RSA algorithm, and the external physical information data is sent to the application layer through the network layer after encryption is completed.
10. The internet of things security-aware access method according to any one of claims 7 to 9, further comprising step S3: after the external physical information data is sent, the sensing layer sends verification data for finishing the communication request to the security layer, the security layer encrypts the verification data for finishing the communication request by using a DES algorithm, sends the encrypted verification data for finishing the communication request to the application layer through the network layer, and the application layer closes the communication after receiving the verification data for finishing the communication request.
CN202210339231.XA 2022-04-01 2022-04-01 Internet of things security sensing access system and method Pending CN114900328A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210339231.XA CN114900328A (en) 2022-04-01 2022-04-01 Internet of things security sensing access system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210339231.XA CN114900328A (en) 2022-04-01 2022-04-01 Internet of things security sensing access system and method

Publications (1)

Publication Number Publication Date
CN114900328A true CN114900328A (en) 2022-08-12

Family

ID=82715509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210339231.XA Pending CN114900328A (en) 2022-04-01 2022-04-01 Internet of things security sensing access system and method

Country Status (1)

Country Link
CN (1) CN114900328A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951386A (en) * 2010-10-12 2011-01-19 成都卫士通信息产业股份有限公司 Safe method for data convergence and information feedback of internet of things
CN102118393A (en) * 2011-01-21 2011-07-06 成都卫士通信息产业股份有限公司 Safety sensing convergence device for Internet of things
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things
CN106657148A (en) * 2017-01-23 2017-05-10 林海 Architecture for internet of things
US20180293391A1 (en) * 2017-04-11 2018-10-11 Box, Inc. Method and system for implementing an encryption sdk
CN111431841A (en) * 2019-01-10 2020-07-17 北京普安信科技有限公司 Internet of things security sensing system and Internet of things data security transmission method
US10952069B1 (en) * 2017-11-07 2021-03-16 Imam Abdulrahman Bin Faisal University IoT cryptosystem device, system, method and computer program product

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951386A (en) * 2010-10-12 2011-01-19 成都卫士通信息产业股份有限公司 Safe method for data convergence and information feedback of internet of things
CN102118393A (en) * 2011-01-21 2011-07-06 成都卫士通信息产业股份有限公司 Safety sensing convergence device for Internet of things
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things
CN106657148A (en) * 2017-01-23 2017-05-10 林海 Architecture for internet of things
US20180293391A1 (en) * 2017-04-11 2018-10-11 Box, Inc. Method and system for implementing an encryption sdk
US10952069B1 (en) * 2017-11-07 2021-03-16 Imam Abdulrahman Bin Faisal University IoT cryptosystem device, system, method and computer program product
CN111431841A (en) * 2019-01-10 2020-07-17 北京普安信科技有限公司 Internet of things security sensing system and Internet of things data security transmission method

Similar Documents

Publication Publication Date Title
WO2021023164A1 (en) Intelligent lock control method and system
CN109903433B (en) Access control system and access control method based on face recognition
JP4621200B2 (en) Communication apparatus, communication system, and authentication method
WO2019184736A1 (en) Access authentication method and device, and server
JP4804983B2 (en) Wireless terminal, authentication device, and program
CN101112039B (en) Wireless network system and communication method for external device to temporarily access wireless network
CN1224213C (en) Method for issuing an electronic identity
CN107454079B (en) Lightweight equipment authentication and shared key negotiation method based on Internet of things platform
CN101340436B (en) Method and apparatus implementing remote access control based on portable memory apparatus
CN103532713B (en) Sensor authentication and shared key production method and system and sensor
WO2016201811A1 (en) Identity authentication method, apparatus and system
US20080175449A1 (en) Fingerprint-based network authentication method and system thereof
CN110474921B (en) Perception layer data fidelity method for local area Internet of things
US10133861B2 (en) Method for controlling access to a production system of a computer system not connected to an information system of said computer system
CN112788042B (en) Method for determining device identifier of Internet of things and device of Internet of things
CN105828332A (en) Method of improving wireless local area authentication mechanism
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
US20070081672A1 (en) Methods to enhance wlan security
CN104135471B (en) The anti-abduction communication means of DNS
CN116170143A (en) Intelligent community data safe transmission, storage and fusion use system based on national encryption algorithm
Zhang et al. Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
KR101308498B1 (en) authentification method based cipher and smartcard for WSN
KR101745482B1 (en) Communication method and apparatus in smart-home system
US9979539B2 (en) Method and system of authenticating a network device in a location based verification framework
CN114900328A (en) Internet of things security sensing access system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination