Computer Science ›› 2019, Vol. 46 ›› Issue (4): 137-143.doi: 10.11896/j.issn.1002-137X.2019.04.022

• Information Security • Previous Articles     Next Articles

Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things

LIU Meng-jun1,3, SHA Tao1, LI Dan2, LIU Shu-bo2   

  1. School of Computer and Information Engineering,Hubei University,Wuhan 430062,China1
    School of Computer,Wuhan University,Wuhan 430072,China2
    School of Education,Hubei University,Wuhan 430062,China3
  • Received:2018-03-12 Online:2019-04-15 Published:2019-04-23

Abstract: In narrow band internet of things communication system,the data among devices are transmitted by connectionless UDP protocol.Based on the unreliable UDP protocol,it is difficult to reliably update the keys for the security door system.This paper designed a reliable key updating scheme over connectionless communication link.This scheme makes use of the characteristics of smart lock key updating,and adopts the carefully designed interactive key transmission mechanisms,so as to makelock devices get keys by UDP protocol and achieve key updating reliably.Theoretical analysis and prototype experiment results show that the proposed scheme holds small communication and computation overhead while reliably updating the key.

Key words: Key updating, NB-IoT, Reliable transmission, Secure communication, UDP

CLC Number: 

  • TP273
[1]XV C E,XV F,LI X H,et al.Design of campus comprehensive access management platform[J].Journal on Communications,2013,34(S2):141-147.(in Chinese) 许彩娥,徐锋,厉晓华,等.校园综合门禁管理平台的设计[J].通信学报,2013,34(S2):141-147.
[2]ZHU H J,PAN Z F,ZHU Y L.“Internet+” intelligent access control system[J].Application of Electronic Technique,2017,43(3):124-126,131.(in Chinese) 朱航江,潘振福,朱永利.“互联网+”智能门禁控制系统[J].电子技术应用,2017,43(3):124-126,131.
[3]NOUR K,MONA J,ZAHER D.Measurement-Based Signaling Management Strategies for Cellular IoT[J].IEEE Internet of Things Journal,2017,4(5):1434-1444.
[4]LIU Q,CUI L,CHEN H M.Key Technologies and Applications of Internet of Things[J].Computer Science,2010,37(6):1-4,10.(in Chinese) 刘强,崔莉,陈海明.物联网关键技术与应用[J].计算机科学,2010,37(6):1-4,10.
[5]ZHAO Z J,SHEN Q,TANG H,et al.Theory and Key Techno- logies of Architecture and Intelligent Information Processing for Internet of Things[J].Computer Science,2011,38(8):1-8.(in Chinese) 赵志军,沈强,唐晖,等.物联网架构和智能信息处理理论与关键技术[J].计算机科学,2011,38(8):1-8.
[6]LUAN L X.Intelligent electronic door lock system based on GPRS and laser virtual keyboard[J].Journal of Computer Applications,2016,36(S2):319-321.(in Chinese) 栾禄祥.基于GPRS和激光虚拟键盘的智能电子门锁系统[J].计算机应用,2016,36(S2):319-321.
[7]PIAO Y,KIM J U,TARIQ U,et al.Polynomial-based key ma- nagement for secure intra-group and inter-group communication[J].Computers & Mathematics with Applications,2013,65(9):1300-1309.
[8]LI Y N,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update [J].Future Generation Computer Systems,2018,76(2):789-798.
[9]LUCA R,FRANCESCO M,JUSSI K,et al.A Semantic Publish-Subscribe Architecture for the Internet of Things[J].IEEEInternet of Things Journal,2016,3(6):1274-1296.
[10]MARC B,ALEJANDRO C,JAIME L,et al.IoT-Cloud Service Optimization in Next Generation Smart Environments[J].Future Generation Computer Systems,2016,34(12):4077-4090.
[11]ZHAO X,WU M Q,CHEN D X,et al.An Adaptive Re-Keying Mechanism for Secure Multicast[J].Acta Electronica Sinica,2003,31(5):654-658.(in Chinese) 赵欣,吴敏强,陈道蓄,等.一个自适应的安全组通信密钥更新算法[J].电子学报,2003,31(5):654-658.
[12]JIN C,WEI D X,LOW S H,et al.FAST TCP:motivation,architecture,algorithms,performance[J].IEEE/ACM Transactions on Networking,2006,14(6):1246-1259.
[13]XU L S,HARFOUSH K,RHEE I.Binary increase congestion control (BIC) for fast long-distance networks[C]∥Proc. of IEEE INFOCOM.2004:2514-2524.
[14]HE E,LEIGH J,YU O,et al.Reliable blast UDP:predictable high performance bulk data transfer[C]∥Proc. of IEEE International Conference on Cluster Computing.2002:317-324.
[15]GU Y H,GROSSMAN R L.UDT:UDP-based data transfer for high-speed wide area networks[J].Computer Networks,2007,51(7):1777-1799.
[16]LIU X Z,ZHOU J,LIANG D Q.Huge Data Blocks Transmission Based on UDP[J].Telecommunication Engineering,2012,52(1):96-100.(in Chinese) 刘喜作,周晶,梁德清.基于UDP的大数据包可靠传输[J].电讯技术,2012,52(1):96-100.
[17]LI Y M,REN Y M,LI J.Comparison and evaluation of UDP-based transport protocol performance[J].Application Research of Computers,2010,27(5):3096-3910.(in Chinese) 李一鸣,任勇毛,李俊.基于UDP的传输协议性能比较与分析[J].计算机应用研究,2010,27(5):3096-3910.
[18]HUANG C W,YEN C L,CHIANG C H,et al.The five modes AES applications in sounds and images[C]∥Proc. of the 6th International Conference on Information Assurance and Security.2010:28-31.
[19]XIAO C L,ZHOU D Y,ZHANG K.CUDA based high-efficiency implementation of AES algorithm[J].Application Research of Computers,2013,30(6):1907-1909.(in Chinese) 夏春林,周德云,张堃.AES算法的CUDA高效实现方法[J].计算机应用研究,2013,30(6):1907-1909.
[1] SHEN Jia-fang, QIAN Li-ping, YANG Chao. Non-orthogonal Multiple Access and Multi-dimension Resource Optimization in EH Relay NB-IoT Networks [J]. Computer Science, 2022, 49(5): 279-286.
[2] WU Shao-qian, LI Xi-ming. Authenticable Encrypted Secure Communication Based on Adversarial Network [J]. Computer Science, 2021, 48(5): 328-333.
[3] ZHANG Jie, LIANG Jun-bin, JIANG Chan. Research Progress on Key Technologies of Data Storage Based on Wireless Sensor Networks inWide-Area Complex Fluid Systems [J]. Computer Science, 2020, 47(5): 242-249.
[4] WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9.
[5] BAI Ruo-chen, PANG Chen-xin, JIA Jia, QIU Shu-guang, SHAO Jia, LU Xiao-jiao. Design of Cloud Platform for Energy Internet of Things Based on LPWAN Multi-protocol [J]. Computer Science, 2019, 46(6A): 589-592.
[6] ZHANG Ting, ZHANG De-gan, CUI Yu-ya, CHEN Lu, GE Hui. New Method of Multi-path Reliable Transmission Based on Redundancy Strategy [J]. Computer Science, 2019, 46(11A): 363-368.
[7] XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140.
[8] LIN Cheng-kuan, ZHAO Yuan, FAN Jian-xi and CHENG Bao-lei. Research on Completely Independent Spanning Trees Based on Degree of Vertices [J]. Computer Science, 2017, 44(6): 94-96.
[9] CHAI Hong-yu and ZANG Hong-yan. Image Encryption Scheme Based on Generalized Chaotic Synchronization Systems [J]. Computer Science, 2016, 43(8): 100-104.
[10] CHAI Xiu-li and GAN Zhi-hua. New Bit-level Self-adaptive Color Image Encryption Algorithm Based on Hyperchaotic System [J]. Computer Science, 2016, 43(4): 134-139.
[11] LI Yan, WANG Cheng and FENG Xian-ju. Probability Routing Protocol Based on Delay Tolerant in Wireless Body Area Network [J]. Computer Science, 2015, 42(Z6): 274-275.
[12] CHAI Xiu-li and GAN Zhi-hua. Self-adaptive Bit-level Colour Image Encryption Algorithm Based on Spatiotemporal Chaotic System [J]. Computer Science, 2015, 42(7): 204-209.
[13] ZHU Xiao-juan,LU Yang,QIU Shu-wei and GUAN Jun-ming. Survey of Data Transmission Reliability in Wireless Sensor Networks [J]. Computer Science, 2013, 40(9): 1-7.
[14] . Analysise and Realization of Micro-satellite Communication Based on UDP Protocol [J]. Computer Science, 2013, 40(1): 22-25.
[15] . Study and Implementation of Data Transfer System in Experiment of High Energy Physics [J]. Computer Science, 2012, 39(Z6): 93-95.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!