计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 137-143.doi: 10.11896/j.issn.1002-137X.2019.04.022

• 信息安全 • 上一篇    下一篇

窄带物联网下的安全门锁密钥可靠更新方案

刘梦君1,3, 沙涛1, 李丹2, 刘树波2   

  1. 湖北大学计算机与信息工程学院 武汉4300621
    武汉大学计算机学院 武汉4300722
    湖北大学教育学院 武汉4300623
  • 收稿日期:2018-03-12 出版日期:2019-04-15 发布日期:2019-04-23
  • 通讯作者: 沙 涛(1996-),男,主要研究方向为物联网、信息安全,E-mail:st_1996@foxmail.com(通信作者)
  • 作者简介:刘梦君(1988-),男,博士,讲师,主要研究方向为移动/无线网络、移动社交/分布式系统上的安全与隐私,E-mail:lmj_whu@163.com;李 丹(1981-),男,博士生,主要研究方向为数据挖掘、信息安全;刘树波(1970-),男,博士,教授,博士生导师,主要研究方向为物联网安全与隐私保护、数据隐私挖掘与发布。
  • 基金资助:
    本文受国家自然科学基金面上项目(41671443),湖北省自然科学基金项目(201711111201003),湖北省教育厅自然科学基金项目(201711131001003),武汉市科技局应用基础研究计划资助项目(2016010101010024)资助。

Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things

LIU Meng-jun1,3, SHA Tao1, LI Dan2, LIU Shu-bo2   

  1. School of Computer and Information Engineering,Hubei University,Wuhan 430062,China1
    School of Computer,Wuhan University,Wuhan 430072,China2
    School of Education,Hubei University,Wuhan 430062,China3
  • Received:2018-03-12 Online:2019-04-15 Published:2019-04-23

摘要: 在窄带物联网(Narrow Band Internet of Things,NB-IoT)通信系统中,设备间的数据通信以无连接的UDP(User Datagram Protocol)报文方式传输。在不可靠的UDP传输机制下,密钥的可靠更新成了安全门锁机制研究中的难点。文中设计了一个无连接通信链路上的密钥可靠更新方案,该方案利用智能门锁密钥更新的特点,通过精心设计的密钥传输交互机制,使门锁设备通过UDP协议获取密钥并且可靠地完成密钥更新。理论分析和原型实验的结果表明,该方案能够可靠地更新密钥,并具有较小的通信开销和计算开销。

关键词: UDP, 安全通信, 可靠传输, 密钥更新, 窄带物联网

Abstract: In narrow band internet of things communication system,the data among devices are transmitted by connectionless UDP protocol.Based on the unreliable UDP protocol,it is difficult to reliably update the keys for the security door system.This paper designed a reliable key updating scheme over connectionless communication link.This scheme makes use of the characteristics of smart lock key updating,and adopts the carefully designed interactive key transmission mechanisms,so as to makelock devices get keys by UDP protocol and achieve key updating reliably.Theoretical analysis and prototype experiment results show that the proposed scheme holds small communication and computation overhead while reliably updating the key.

Key words: Key updating, NB-IoT, Reliable transmission, Secure communication, UDP

中图分类号: 

  • TP273
[1]XV C E,XV F,LI X H,et al.Design of campus comprehensive access management platform[J].Journal on Communications,2013,34(S2):141-147.(in Chinese) 许彩娥,徐锋,厉晓华,等.校园综合门禁管理平台的设计[J].通信学报,2013,34(S2):141-147.
[2]ZHU H J,PAN Z F,ZHU Y L.“Internet+” intelligent access control system[J].Application of Electronic Technique,2017,43(3):124-126,131.(in Chinese) 朱航江,潘振福,朱永利.“互联网+”智能门禁控制系统[J].电子技术应用,2017,43(3):124-126,131.
[3]NOUR K,MONA J,ZAHER D.Measurement-Based Signaling Management Strategies for Cellular IoT[J].IEEE Internet of Things Journal,2017,4(5):1434-1444.
[4]LIU Q,CUI L,CHEN H M.Key Technologies and Applications of Internet of Things[J].Computer Science,2010,37(6):1-4,10.(in Chinese) 刘强,崔莉,陈海明.物联网关键技术与应用[J].计算机科学,2010,37(6):1-4,10.
[5]ZHAO Z J,SHEN Q,TANG H,et al.Theory and Key Techno- logies of Architecture and Intelligent Information Processing for Internet of Things[J].Computer Science,2011,38(8):1-8.(in Chinese) 赵志军,沈强,唐晖,等.物联网架构和智能信息处理理论与关键技术[J].计算机科学,2011,38(8):1-8.
[6]LUAN L X.Intelligent electronic door lock system based on GPRS and laser virtual keyboard[J].Journal of Computer Applications,2016,36(S2):319-321.(in Chinese) 栾禄祥.基于GPRS和激光虚拟键盘的智能电子门锁系统[J].计算机应用,2016,36(S2):319-321.
[7]PIAO Y,KIM J U,TARIQ U,et al.Polynomial-based key ma- nagement for secure intra-group and inter-group communication[J].Computers & Mathematics with Applications,2013,65(9):1300-1309.
[8]LI Y N,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update [J].Future Generation Computer Systems,2018,76(2):789-798.
[9]LUCA R,FRANCESCO M,JUSSI K,et al.A Semantic Publish-Subscribe Architecture for the Internet of Things[J].IEEEInternet of Things Journal,2016,3(6):1274-1296.
[10]MARC B,ALEJANDRO C,JAIME L,et al.IoT-Cloud Service Optimization in Next Generation Smart Environments[J].Future Generation Computer Systems,2016,34(12):4077-4090.
[11]ZHAO X,WU M Q,CHEN D X,et al.An Adaptive Re-Keying Mechanism for Secure Multicast[J].Acta Electronica Sinica,2003,31(5):654-658.(in Chinese) 赵欣,吴敏强,陈道蓄,等.一个自适应的安全组通信密钥更新算法[J].电子学报,2003,31(5):654-658.
[12]JIN C,WEI D X,LOW S H,et al.FAST TCP:motivation,architecture,algorithms,performance[J].IEEE/ACM Transactions on Networking,2006,14(6):1246-1259.
[13]XU L S,HARFOUSH K,RHEE I.Binary increase congestion control (BIC) for fast long-distance networks[C]∥Proc. of IEEE INFOCOM.2004:2514-2524.
[14]HE E,LEIGH J,YU O,et al.Reliable blast UDP:predictable high performance bulk data transfer[C]∥Proc. of IEEE International Conference on Cluster Computing.2002:317-324.
[15]GU Y H,GROSSMAN R L.UDT:UDP-based data transfer for high-speed wide area networks[J].Computer Networks,2007,51(7):1777-1799.
[16]LIU X Z,ZHOU J,LIANG D Q.Huge Data Blocks Transmission Based on UDP[J].Telecommunication Engineering,2012,52(1):96-100.(in Chinese) 刘喜作,周晶,梁德清.基于UDP的大数据包可靠传输[J].电讯技术,2012,52(1):96-100.
[17]LI Y M,REN Y M,LI J.Comparison and evaluation of UDP-based transport protocol performance[J].Application Research of Computers,2010,27(5):3096-3910.(in Chinese) 李一鸣,任勇毛,李俊.基于UDP的传输协议性能比较与分析[J].计算机应用研究,2010,27(5):3096-3910.
[18]HUANG C W,YEN C L,CHIANG C H,et al.The five modes AES applications in sounds and images[C]∥Proc. of the 6th International Conference on Information Assurance and Security.2010:28-31.
[19]XIAO C L,ZHOU D Y,ZHANG K.CUDA based high-efficiency implementation of AES algorithm[J].Application Research of Computers,2013,30(6):1907-1909.(in Chinese) 夏春林,周德云,张堃.AES算法的CUDA高效实现方法[J].计算机应用研究,2013,30(6):1907-1909.
[1] 沈家芳, 钱丽萍, 杨超.
面向集能型中继窄带物联网的非正交多址接入和多维网络资源优化
Non-orthogonal Multiple Access and Multi-dimension Resource Optimization in EH Relay NB-IoT Networks
计算机科学, 2022, 49(5): 279-286. https://doi.org/10.11896/jsjkx.210400239
[2] 吴少乾, 李西明.
对抗网络上的可认证加密安全通信
Authenticable Encrypted Secure Communication Based on Adversarial Network
计算机科学, 2021, 48(5): 328-333. https://doi.org/10.11896/jsjkx.200300177
[3] 向阿新, 高鸿峰, 田有亮.
基于改进P2PKHCA脚本方案的比特币密钥更新机制
Key Update Mechanism in Bitcoin Based on Improved P2PKHCA Script Scheme
计算机科学, 2021, 48(11): 159-169. https://doi.org/10.11896/jsjkx.210400027
[4] 张婕, 梁俊斌, 蒋婵.
广域复杂流体系统中基于无线传感网的数据保存关键技术研究进展
Research Progress on Key Technologies of Data Storage Based on Wireless Sensor Networks inWide-Area Complex Fluid Systems
计算机科学, 2020, 47(5): 242-249. https://doi.org/10.11896/jsjkx.190400025
[5] 王春东, 罗婉薇, 莫秀良, 杨文军.
车联网互信认证与安全通信综述
Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles
计算机科学, 2020, 47(11): 1-9. https://doi.org/10.11896/jsjkx.200800024
[6] 江泽涛,黄锦,胡硕,徐智.
云计算下可撤销的全外包CP-ABE方案
Fully-outsourcing CP-ABE Scheme with Revocation in Cloud Computing
计算机科学, 2019, 46(7): 114-119. https://doi.org/10.11896/j.issn.1002-137X.2019.07.018
[7] 张婷, 张德干, 崔玉亚, 陈露, 葛辉.
一种基于冗余策略的多路径可靠传输新方法
New Method of Multi-path Reliable Transmission Based on Redundancy Strategy
计算机科学, 2019, 46(11A): 363-368.
[8] 薛昊, 陈鸣, 钱红燕.
基于NFV的防范SDN控制器中UDP控制分组冗余的机制
NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller
计算机科学, 2019, 46(10): 135-140. https://doi.org/10.11896/jsjkx.180901659
[9] 林政宽,赵源,樊建席,程宝雷.
基于顶点度数的完全独立生成树研究
Research on Completely Independent Spanning Trees Based on Degree of Vertices
计算机科学, 2017, 44(6): 94-96. https://doi.org/10.11896/j.issn.1002-137X.2017.06.016
[10] 周健,孙丽艳.
独立群密钥更新模型研究
Research on Independence Rekey Model for Group Key Management
计算机科学, 2015, 42(8): 190-193.
[11] 徐旸, 周薇, 杜秋双, 王国军.
基于多叉树的多权限群组密钥管理
Multiway Tree-based Group Key Management Scheme for Multi-privileged Group Communications
计算机科学, 2014, 41(5): 41-45. https://doi.org/10.11896/j.issn.1002-137X.2014.05.009
[12] 朱晓娟,陆阳,邱述威,官骏鸣.
无线传感器网络数据传输可靠性研究综述
Survey of Data Transmission Reliability in Wireless Sensor Networks
计算机科学, 2013, 40(9): 1-7.
[13] 于世洁,徐勇航,张 帆.
UDP协议在微小卫星通信上的分析与实现
Analysise and Realization of Micro-satellite Communication Based on UDP Protocol
计算机科学, 2013, 40(1): 22-25.
[14] 曾珊,齐法制,王萌.
高能物理实验中数据传输系统的研究与实现
Study and Implementation of Data Transfer System in Experiment of High Energy Physics
计算机科学, 2012, 39(Z6): 93-95.
[15] 李晓燕,苗长云.
一种网络入侵检测系统安全通信协议及其验证
A Kind of Network Security Protocols and Verification
计算机科学, 2011, 38(Z10): 87-88.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!