用户名: 密码: 验证码:
窄带物联网下的安全门锁密钥可靠更新方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things
  • 作者:刘梦君 ; 沙涛 ; 李丹 ; 刘树波
  • 英文作者:LIU Meng-jun;SHA Tao;LI Dan;LIU Shu-bo;School of Computer and Information Engineering,Hubei University;School of Education,Hubei University;School of Computer,Wuhan University;
  • 关键词:窄带物联网 ; 密钥更新 ; 安全通信 ; UDP ; 可靠传输
  • 英文关键词:NB-IoT;;Key updating;;Secure communication;;UDP;;Reliable transmission
  • 中文刊名:JSJA
  • 英文刊名:Computer Science
  • 机构:湖北大学计算机与信息工程学院;湖北大学教育学院;武汉大学计算机学院;
  • 出版日期:2018-05-17 10:04
  • 出版单位:计算机科学
  • 年:2019
  • 期:v.46
  • 基金:国家自然科学基金面上项目(41671443);; 湖北省自然科学基金项目(201711111201003);; 湖北省教育厅自然科学基金项目(201711131001003);; 武汉市科技局应用基础研究计划资助项目(2016010101010024)资助
  • 语种:中文;
  • 页:JSJA201904022
  • 页数:7
  • CN:04
  • ISSN:50-1075/TP
  • 分类号:143-149
摘要
在窄带物联网(Narrow Band Internet of Things,NB-IoT)通信系统中,设备间的数据通信以无连接的UDP(User Datagram Protocol)报文方式传输。在不可靠的UDP传输机制下,密钥的可靠更新成了安全门锁机制研究中的难点。文中设计了一个无连接通信链路上的密钥可靠更新方案,该方案利用智能门锁密钥更新的特点,通过精心设计的密钥传输交互机制,使门锁设备通过UDP协议获取密钥并且可靠地完成密钥更新。理论分析和原型实验的结果表明,该方案能够可靠地更新密钥,并具有较小的通信开销和计算开销。
        In narrow band internet of things communication system,the data among devices are transmitted by connectionless UDP protocol.Based on the unreliable UDP protocol,it is difficult to reliably update the keys for the security door system.This paper designed a reliable key updating scheme over connectionless communication link.This scheme makes use of the characteristics of smart lock key updating,and adopts the carefully designed interactive key transmission mechanisms,so as to make lock devices get keys by UDP protocol and achieve key updating reliably.Theoretical analysis and prototype experiment results show that the proposed scheme holds small communication and computation overhead while reliably updating the key.
引文
[1] XV C E,XV F,LI X H,et al.Design of campus comprehensive access management platform[J].Journal on Communications,2013,34(S2):141-147.(in Chinese)许彩娥,徐锋,厉晓华,等.校园综合门禁管理平台的设计[J].通信学报,2013,34(S2):141-147.
    [2] ZHU H J,PAN Z F,ZHU Y L.“Internet+” intelligent access control system[J].Application of Electronic Technique,2017,43(3):124-126,131.(in Chinese)朱航江,潘振福,朱永利.“互联网+”智能门禁控制系统[J].电子技术应用,2017,43(3):124-126,131.
    [3] NOUR K,MONA J,ZAHER D.Measurement-Based Signaling Management Strategies for Cellular IoT[J].IEEE Internet of Things Journal,2017,4(5):1434-1444.
    [4] LIU Q,CUI L,CHEN H M.Key Technologies and Applications of Internet of Things[J].Computer Science,2010,37(6):1-4,10.(in Chinese)刘强,崔莉,陈海明.物联网关键技术与应用[J].计算机科学,2010,37(6):1-4,10.
    [5] ZHAO Z J,SHEN Q,TANG H,et al.Theory and Key Techno- logies of Architecture and Intelligent Information Processing for Internet of Things[J].Computer Science,2011,38(8):1-8.(in Chinese)赵志军,沈强,唐晖,等.物联网架构和智能信息处理理论与关键技术[J].计算机科学,2011,38(8):1-8.
    [6] LUAN L X.Intelligent electronic door lock system based on GPRS and laser virtual keyboard[J].Journal of Computer Applications,2016,36(S2):319-321.(in Chinese)栾禄祥.基于GPRS和激光虚拟键盘的智能电子门锁系统[J].计算机应用,2016,36(S2):319-321.
    [7] PIAO Y,KIM J U,TARIQ U,et al.Polynomial-based key ma- nagement for secure intra-group and inter-group communication[J].Computers & Mathematics with Applications,2013,65(9):1300-1309.
    [8] LI Y N,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update [J].Future Generation Computer Systems,2018,76(2):789-798.
    [9] LUCA R,FRANCESCO M,JUSSI K,et al.A Semantic Publish-Subscribe Architecture for the Internet of Things[J].IEEE Internet of Things Journal,2016,3(6):1274-1296.
    [10] MARC B,ALEJANDRO C,JAIME L,et al.IoT-Cloud Service Optimization in Next Generation Smart Environments[J].Future Generation Computer Systems,2016,34(12):4077-4090.
    [11] ZHAO X,WU M Q,CHEN D X,et al.An Adaptive Re-Keying Mechanism for Secure Multicast[J].Acta Electronica Sinica,2003,31(5):654-658.(in Chinese)赵欣,吴敏强,陈道蓄,等.一个自适应的安全组通信密钥更新算法[J].电子学报,2003,31(5):654-658.
    [12] JIN C,WEI D X,LOW S H,et al.FAST TCP:motivation,architecture,algorithms,performance[J].IEEE/ACM Transactions on Networking,2006,14(6):1246-1259.
    [13] XU L S,HARFOUSH K,RHEE I.Binary increase congestion control (BIC) for fast long-distance networks[C]//Proc.of IEEE INFOCOM.2004:2514-2524.
    [14] HE E,LEIGH J,YU O,et al.Reliable blast UDP:predictable high performance bulk data transfer[C]//Proc.of IEEE International Conference on Cluster Computing.2002:317-324.
    [15] GU Y H,GROSSMAN R L.UDT:UDP-based data transfer for high-speed wide area networks[J].Computer Networks,2007,51(7):1777-1799.
    [16] LIU X Z,ZHOU J,LIANG D Q.Huge Data Blocks Transmission Based on UDP[J].Telecommunication Engineering,2012,52(1):96-100.(in Chinese)刘喜作,周晶,梁德清.基于UDP的大数据包可靠传输[J].电讯技术,2012,52(1):96-100.
    [17] LI Y M,REN Y M,LI J.Comparison and evaluation of UDP-based transport protocol performance[J].Application Research of Computers,2010,27(5):3096-3910.(in Chinese)李一鸣,任勇毛,李俊.基于UDP的传输协议性能比较与分析[J].计算机应用研究,2010,27(5):3096-3910.
    [18] HUANG C W,YEN C L,CHIANG C H,et al.The five modes AES applications in sounds and images[C]//Proc.of the 6th International Conference on Information Assurance and Security.2010:28-31.
    [19] XIAO C L,ZHOU D Y,ZHANG K.CUDA based high-efficiency implementation of AES algorithm[J].Application Research of Computers,2013,30(6):1907-1909.(in Chinese)夏春林,周德云,张堃.AES算法的CUDA高效实现方法[J].计算机应用研究,2013,30(6):1907-1909.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700