[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108259174A - The update method of safety door unblocking key based on narrowband Internet of Things - Google Patents

The update method of safety door unblocking key based on narrowband Internet of Things Download PDF

Info

Publication number
CN108259174A
CN108259174A CN201810368835.0A CN201810368835A CN108259174A CN 108259174 A CN108259174 A CN 108259174A CN 201810368835 A CN201810368835 A CN 201810368835A CN 108259174 A CN108259174 A CN 108259174A
Authority
CN
China
Prior art keywords
key
lock
message
smart lock
updating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810368835.0A
Other languages
Chinese (zh)
Inventor
胡慧玲
李军
范雷
胡德
刘梦君
杨帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Only Wisdom (hubei) Technology Co Ltd
Original Assignee
Only Wisdom (hubei) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Only Wisdom (hubei) Technology Co Ltd filed Critical Only Wisdom (hubei) Technology Co Ltd
Priority to CN201810368835.0A priority Critical patent/CN108259174A/en
Publication of CN108259174A publication Critical patent/CN108259174A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to field of information security technology, more particularly to a kind of update method of the safety door unblocking key based on narrowband Internet of Things, this method is sequentially completed the smart lock key updating based on narrowband Internet of Things by intelligent lock system, the user key based on Transmission Control Protocol in 3G/4G networks updates, smart lock updates key and user and updates the effective unlocking instruction of cipher key match realization.Wherein based on the smart lock key updating of narrowband Internet of Things by cipher key delivery interaction mechanism, door latch device is allowed to pass through udp protocol and obtain key realize.This method is implemented to pertain only to administrator and smart lock and the interaction of user in entire key updating process, the participation of third-party server is not needed to, and by theory analysis and prototype experiment the result shows that, the program can obtain smaller communication and computing cost in reliably more new key simultaneously.

Description

The update method of safety door unblocking key based on narrowband Internet of Things
Technical field
The present invention relates to field of information security technology, and in particular to a kind of safety door unblocking key based on narrowband Internet of Things Update method.
Background technology
It is quick universal with mobile Internet, internet+deep development, people are increasingly dependent on intelligentized product Service, intelligent door lock is one of typical case therein.Intelligent door lock on ordinary meaning includes card lock, Fingerprint Lock, coded lock, Voiceprint lock, recognition of face lock etc..The use of these door locks or it is expensive, energy consumption is big, installation and deployment are inconvenient, as Fingerprint Lock, Voiceprint lock and recognition of face lock, need mains-supplied;Management means is low, such as card lock and coded lock, without long-range Management interface, O&M are costly.Tradesman is forced to design the novel intelligent door that can solve the problems, such as above-mentioned two aspect simultaneously Lock.
The appearance of narrowband Internet of Things (Narrow Band Internet of Things, NB-IoT), to solve intelligent door The these two aspects problem in lock field brings possibility.Based on cellular narrowband Internet of Things (Narrow Band Internet of Things, NB-IoT) it is implemented on cellular network basis, required bandwidth is about 180KHz, can be deployed in original 2G, 3G, 4G On network base station, lower deployment cost is low.NB-IoT focuses on low-power consumption and extensively covers (LPWA) Internet of Things (IOT) market, because of NB- The IoT communication technologys have the advantages such as low-power consumption, wide covering, low cost, large capacity so that it can be widely used in a variety of vertical rows Industry, such as logistic track, intelligent road-lamp, intelligent water, electricity, gas meter, intelligent garbage bin, the various fields of wisdom agricultural.These equipment Mostly it is extensive and applying under unattended environment in large area, completes respective function simultaneously, has for a long time With lock management person's communication function, so as in low installation, dispose, under operation cost, the efficient management function of equipment is completed.
Then, different from smart machine in general sense, intelligent door lock is the last line of defense of safe household how Provide easily door lock service of goods simultaneously, ensure the high security of door lock, be intelligent door lock design must take into consideration it is primary Problem.In general, having the intelligent door lock of remote management capability, such as has the door lock of GPRS, WiFi communication interface, whether user has There is the permission of opening door lock equipment, be all that administrator distributes key to determine by remote online.Smart lock system as shown in Figure 1 Mainly there is three classes entity in system, respectively user, smart lock, administrator (is usually performed by the server of administrator's O&M Role function).Key manager and key demander can be divided into according to function, user and smart lock are key demanders, Key manager is lock management person.For security consideration, the unlocking instruction that user is sent to smart lock is needed using specific close Key is encrypted, and only in cipher key match, smart lock could obtain effective unlocking instruction, unlock.And certain specific Under occasion, if government's public affairs are rented a house and personal rental housing, building management side or the owner need control door lock key permission namely Management and control is carried out to associated user's unlocking authority, this just needs to be updated user's unblocking key.
Using GPRS or the intelligent door lock of WiFi communication mode, although user's unblocking key can reliably be updated, They need larger communication overhead, it is difficult to long-play.And the intelligent door lock of NB-IoT communication modes is used, although greatly Communication overhead is reduced, substantially prolongs the intelligent door lock working time, but low due to being used in the design of the NB-IoT communication technologys Power consumption operation mode so that it employs insecure UDP communication protocols to transmit data, and meeting maximum probability faces door lock key more The problem of new failure, and door lock key once updates failure, may result in user can not unlock.Researcher also proposed thus The methods of UDT, AUDP of RBUDP, GUI et al., improves the unstability in UDP transmission, but these methods needs are set manually Transmission rate is put, seems less suitable under key updating this application background, and if the transfer rate of setting is higher than Network status at that time, it may occur that it is a large amount of to retransmit, easily cause the wasting of resources and congestion.
Therefore, it develops one kind to be suitable under the insecure UDP message transmission modes of existing NB-IoT, with as small as possible It calculates and communication overhead, the reliable update method for completing user's unblocking key has great meaning.
Invention content
For the technical problems in the prior art, the purpose of the present invention is to provide a kind of based on narrowband Internet of Things The update method of safety door unblocking key, this method energy is at a high speed, expense is few and steadily updates lock management person and smart lock hardware The key updating of equipment, it is final to realize the update of safety door unblocking key.
To achieve the above object, the present invention provides a kind of update sides of the safety door unblocking key based on narrowband Internet of Things Method, this method are sequentially completed the smart lock key updating based on narrowband Internet of Things, based in 3G/4G networks by intelligent lock system The user key update of Transmission Control Protocol, smart lock update key and user update cipher key match realize effective unlocking instruction, wherein base Include the following steps in the smart lock key updating of narrowband Internet of Things:
(1) new key that generation user unlocks;
(2) for smart lock to lock management person's upload information, lock management person sends initial key update message to smart lock, and waits Confirmation message to be passed back;
(3) smart lock receive initial key update message after to lock management person send confirmation message;
(4) if lock management person receives the confirmation message that the smart lock returns, lock management person sends true to smart lock Recognize key updating message;
If lock management person does not receive the confirmation message that the smart lock returns, lock management person retransmits initial to smart lock Key updating message if lock management person does not receive confirmation message after Nmax times retransmits, judges that this key updating is lost It loses, lock management person terminates to retransmit and to receiving confirmation message corresponding equipment hair if receiving confirmation message within retransmit Nmax time It send and confirms key updating message, the Nmax updates message maximum retransmission for initial key;
(5) smart lock sends information using current key to lock management person, if administrator, which receives, confirms key more The then smart lock key updating success of new message if lock management person receives sends information with old key, informs that lock management person updates Failure, both sides are continuing with old key and carry out the key updating negotiation of a new round.
Further, as long as smart lock has received initial key update message and confirms any in key updating message Key updating message will stop renewal process.
Further, the initial key update message maximum retransmission Nmax is preset fixed for intelligent lock system Value.
Further, the initial key update message maximum retransmission Nmax is dynamically changed according to Network status.
Further, initial key update message includes new key and close for more new stage that identifies current key Key more new logo, temporal information are identified containing key updating.
Further, it is described to confirm that key updating message includes the key updating mark for more new stage that identifies current key Knowledge and temporal information, not comprising new key.
Further, the user key update carries out after smart lock key updating success, so as to ensure to use The consistency of family mobile phone key and smart lock key.
Compared with prior art, the beneficial effects of the present invention are:
(1) update method of the safety door unblocking key provided by the invention based on narrowband Internet of Things passes through NB-IoT networks The resource-constrained UDP transmission services provided, realize close between alap expense completion lock management person and smart lock Key updates and keeps cipher consistency;
(2) update method of the safety door unblocking key based on narrowband Internet of Things that the present invention can provide substantially reduces key Average delay is updated, improves and is updated to power, so as to fulfill best energy consumption and safe and reliable sexual balance;
(3) method of the invention pertains only to administrator and smart lock and the friendship of user in entire key updating process is implemented Mutually, the participation of third-party server is not needed to.
Description of the drawings
Fig. 1 is intelligent lock system Organization Chart;
Fig. 2 is the smart lock key updating flow chart of the present invention;
Fig. 3 is P in embodiment 3lWhen=0.6, three kinds of scheme key updating success rate result schematic diagrams;
Fig. 4 is P in embodiment 3lWhen=0.4, three kinds of scheme key updating success rate result schematic diagrams;
Fig. 5 is P in embodiment 3lWhen=0.2, three kinds of scheme key updating success rate result schematic diagrams;
Fig. 6 is average cipher code renewal time comparative result schematic diagram in embodiment 3;
Fig. 7 is the performance comparison result schematic diagram under heterogeneous networks situation and maximum retransmission in embodiment 3.
Specific embodiment
It shows that example illustrates certain embodiments of the present invention, and should not be construed as the model of the limitation present invention It encloses.Present disclosure can be improved from material, method and reaction condition simultaneously, all these improvement should all It falls within the spirit and scope of the present invention.
Fig. 1 is intelligent lock system Organization Chart, as shown in Figure 1, mainly there is three classes entity in intelligent lock system, is respectively used Family, smart lock, lock management person (usually by the server executive role function of administrator's O&M).In system, lock management person Believable, he ensures that the key for being sent to user and lock is correct, and will not get around system administration mechanism, with user or The sealed scheme of person sends the key that should not be obtained by user or lock, will not give Key Exposure to unrelated third party.User is half Honest, i.e., user can abide by system key update scheme, but he can give information using existing system as much as possible, without close In the case of key or key expiration, unlock.Lock is safely controllable, will not be kidnapped by the external world.Malice is not considered herein The active attack behavior of user, such as user's violence unlocks or malice implements dos attack, it is all newer to system key to attack It hits and is only set in the communication process to key updating and data transmission, including eavesdropping, man-in-the-middle attack etc..
Based on intelligent lock system shown in FIG. 1, the update method of safety door unblocking key of the invention, which is sequentially completed, to be based on The smart lock key updating of narrowband Internet of Things, the user key based on Transmission Control Protocol in 3G/4G networks update, smart lock more Xinmi City Key updates cipher key match with user and realizes effective three steps of unlocking instruction, wherein the smart lock key based on narrowband Internet of Things is more New method includes following 5 steps, as shown in Figure 2:
1st, the generation phase for the new key that user unlocks
This stage must assure that the randomness of new key, can not be obtained by attacker, by generating one in this programme Random number R andom and timestamp respectively using hash function operation, generate two 64bit cryptographic Hash, form a 128bit Key.
2nd, lock management person sends the initial key update message stage
For smart lock to lock management person's upload information, lock management person sends initial key update message to smart lock, and waits for Pass confirmation message back, the initial key update message include new key and for more new stage that identifies current key key more New logo, temporal information are identified containing key updating.
3rd, initial key update message confirmation stage
Smart lock receives and sends confirmation message to lock management person after initial key update message, and lock management person will receive Confirmation message is compared with the initial key update message most started, and specific method is believed for the update that smart lock receives first Breath one Boolean set of composition, judges each element in set, if element value is equal to 1, corresponding smart lock will Confirmation message is sent to lock management person, the confirmation message received can be formed a new Boolean set by lock management person, close with sending The set of key update number is compared, and lock management person sends to smart lock if two values are equal confirms key updating message, if Two unequal then lock management persons of value will retransmit initial key update message to smart lock.It is described true in order to save communication overhead Recognize key updating message and include the key updating mark for more new stage that identifies current key, temporal information mark containing key updating Know, and not comprising new key.
4th, retransmission phase
The confirmation message received is compared lock management person with the initial key update message most started, if sent Initial key update message, which does not receive confirmation message, can then repeat the operation of second step, so as to which lock management person will be to smart lock Retransmit initial key update message.But if without a kind of security mechanism ensure retransmit be more than certain restrictions after can interrupt this behaviour Make, system will be absorbed in Infinite Cyclic re-transmission when network condition extremely deteriorates, and cause system crash, and design is a kind of thus Mechanism, we set maximum retransmission Nmax to limit number of retransmissions.If lock management person does not receive after Nmax times retransmits To confirmation message, then judge that this key updating fails, lock management person terminates if receiving confirmation message within retransmit Nmax times It retransmits and confirms key updating message to receiving the corresponding equipment of confirmation message and sending.In the present invention, initial key update message Maximum retransmission Nmax can be the preset definite value of intelligent lock system;For network signal it is excessively poor when, initially Key updating message maximum retransmission Nmax can also be according to Network status dynamic change, so as to ensure key updating success.
5th, confirm key updating message confirmation stage
Smart lock sends information using current key to lock management person, if lock management person receives confirmation key updating Message then smart lock key updating success if lock management person receives sends information with old key, is informed that lock management person updates and is lost It loses, both sides are continuing with old key and carry out the key updating negotiation of a new round.
In the inventive solutions, as long as smart lock has received initial key update message and confirms key updating report Any key updating message will stop renewal process in text.
For user key renewal process, since user mobile phone can reliably carry out key updating with lock management person, in order to Ensure that user can normally unlock, the key of user is designed to sluggish update, also in order to ensureing user mobile phone key and intelligence The consistency of key can be locked, mobile phone key has to after lock key updating success, can carry out.On the other hand, Yong Humi The update type of message of key will lack as far as possible, and include key information as far as possible.User key update is using in 3G/4G networks Transmission Control Protocol reliably updates completion, and specific method can be found in document:Comer D E.Internetworking with TCP/ IP. [M] People's Telecon Publishing Houses, 1998.
Embodiment 1:Smart lock key updating method
Table 1
This example demonstrates that the meaning representated by the middle symbol used is as shown in table 1.Since smart lock generally passes through dry electricity Pond powers, and cannot use and calculate and the excessive key updating of communication overhead on the connectionless Message Services of UDP provided in NB-IoT Scheme.And the first function of smart lock is that correct key user is allowed normally to unlock and can not unlock without correct key user.
Specifically, at a time t, lock management person LM have found user UiUnblocking key beforeChanged, needed It is updated to current new keyIt is assumed that smart lock SLiIn order to which the communication overhead of more new key is between LM CommLM→SLi, then the present embodiment is the Scheme of Key Update established on a kind of resource-constrained UDP transmission mechanismsMin(CommLM→SLi) so thatIn the network of NB-IoT, smart lock key updating method establishes following mechanism:
1st, the generation for the new key that user unlocks
It locks after passing its record information of unlocking, LM begins preparing for updating required new key Wherein i=n, to ensure the safety of key, keyGeneration is as follows:
Wherein Random () generates 8 decimals and Random () ∈ [0,1], t for a random functionnFor LM The timestamp of time, h () are Hash hash function, and it is also current for Encryption Algorithm of new generation to take SHA3-64, SHA3 herein The highest hash algorithm of security intensity, 64bit patterns will generate a 64bit cryptographic Hash, we by random value and Timestamp carries out SHA3-64 operations respectively, and obtain two 64bit cryptographic Hash are assembled into the new key of 128bit.
2nd, lock management person sends initial key update message
After new key generation, it is assumed that LM needs to send newer key for i-th of smart lock SLiLM is to smart lock SL passes the first secondary keyWherein i=n, it is initial key that key updating packet the inside, which identifies this, Message is updated, and waits for the response of lock, initial key update message packet is denoted as Key_Pack#1, and composition is as follows:
Wherein, we have made some improvements udp protocol, increase a UID field in its stem, increase in its tail portion One C field, specifically, UID fields are used to identify the unique ID of equipment for 2 bytes, to ensure that smart lock SL information is believed with LM Consistency is ceased, C fields are check field, store 16 cyclic redundancy checks, tsTo send information time,Being i.e. will be newer new Key, IDiFor the newer identification number of current key, E () is a symmetric cryptographic algorithm, such as AES, meanwhile, for each not The key consulted when carrying out key updating with equipment, before useCome to new key in message and key updating identifier Encryption.
3rd, initial key update message confirms
For all equipment for carrying out key updating, we define a boolean set BN to indicate whether to receive Key_ Pack#1.BN={ bn1,bn2,…,bni, wherein i=n, after user receives and is successfully updated key, to bni=1 corresponding sets Preparation send confirmation message message, and LM is waited for send and confirms key updating message, and confirmation message is denoted as Ack, and composition is as follows:
Wherein M is confirmation message, comprising necessary equipment and key corresponding informance, for identifying some key sent out more Whether new packet is received.
4th, lock management person, which sends, confirms key updating message
The situation of the confirmation message Ack of SL transmissions is received for LM, we define a boolean set BM={ bm1, bm2,…,bmi, LM is to calculating F1={ k1∧bm1,k2∧bm2,…,ki∧bmi, forki∧bmi=1, hair Second of update key packet is sent, it is to confirm key updating message that this is identified inside key packet, is denoted as Key_Pack#2, Key_ Pack#2 compositions are as follows:
5th, it retransmits
The situation of the confirmation message Ack of lock is not received for LM, LM is to calculating F1={ k1⊕bm1,k2⊕bm2,…,ki ⊕bmi, forki⊕bmi=1, LM do not receive the confirmation message Ack of lock, continue retransmission information Rem, Rem Composition is as follows:
Key_Pack#2 is passed again after receiving the confirmation message Ack of lock.Increase RT fields in Rem for indicating number of retransmissions, LM only can pass N in totalmaxSecondary initial key updates message, if RT>NmaxWhen, the still initial key update message of transmission, table Bright both sides this time key updating failure, both sides are continuing with original cipher key.
SL certain interval of time sends status information with old key again, shows that key updating is failed, the two is opened again Open key agreement.
6th, confirm that key updating message confirms
Under normal circumstances it cannot be guaranteed that Key_Pack#2 is centainly sent to, SLi is set thus and is used afterwards for a period of time currentlyInformation is sent to LM, the smart lock key updating success if LM is received and confirmed key updating message, if LM is received with old Key sends information, then informs that LM updates do not complete, both sides are continuing with old key, to ensure cipher consistency, are carried out at the same time The key updating of a new round is negotiated.
The pseudocode of the smart lock key updating method of the present embodiment is as follows:
In this method, no matter whether key is updated successfully, and LM is by being Ack that SLi is sent and reporting information and determine SLi Which kind of key used;SLi decides whether to use by the way that whether LM sends Key_Pack#2This ensures that LM can ensure Ui It usesIt is used with SLiAlways consistent, i.e., whenever authorized user can normally unlock.
By the above method, LM is sentLater, with regard to user can be made to unlock with smart lock using kt SLi, or otherwise It can assert that SLi does not receive Key_Pack#1 because Ack is not received and start to retransmit or just because of information that SLi is sent later It is middle to useAssert update failure.
Embodiment 2:Dynamic and intelligent locks key updating method
Power is updated in order to continue reduction communication overhead and raising, the present embodiment increases on the basis of embodiment 1 The function of number of retransmissions is dynamically changed according to Network status.
It is wanted during key updating there are efficiency of transmission, key updating success rate and three aspect of average renewal time It asks, with AUDP (referring to document in efficiency of transmission:Liu Xizuo, Zhou Jing, big data packet transmittings of beam Deqing based on UDP [J] telecom technologies, 2012,52 (01):96-100) as a comparison, with AES/ECBPKCS5 cipher modes generation key (referring to Document:HUANG C W,YEN C L,CHIANG C H,et al.The five modes AES applications in sounds and images[C]//proc of the 6th International Conference on Information Assurance and Security.2010:28-31;Xia Chunlin, Zhou Deyun, the efficient side of realization of the CUDA of Kun .AES algorithms Method [J] computer application is studied, 2013,30 (06):1907-1909), key data part is 16 bytes, is carried out by formula AUDP efficiencies of transmission and the efficiency of transmission of algorithm is calculated, by changing TwWith the value of N carry out assay optimization key updating into Power and average renewal time carry out dynamic and achieve the purpose that meet user demand.
Define algorithm evaluation function Eval:
Eval=(1-Ps)*Tavg (6)
T is found by algorithm evaluation function Eval valuesWWith the optimal solution of N.
LM first forCorresponding lock is sent to, interlocking receives the information composition BN that LM methods are come, forRegulation wherein 1 is represented and is received, and 0 representative does not receive, for Lock will give LM Confirmation message is sent, the confirmation message received is formed BM by LM, forLM will be to corresponding Lock be sent to second of key updating information, represent entire key updating process and complete, in this process entire renewal time For:
Ttotali=TKey_Pack#1+Tprop+TAck+Tprop+TKey_Pack#2+Tprop (7)
It is bm to also have a dvielement during thisi∈BM∧bmi=0, for this dvielement, comparison k that LM can be one by onei ∈ K,And bmi∈ BM,ForThis represents key updating process Middle generation packet loss, LM will retransmit lock first time key updating information, and maximum re-transmission number is no more than set-point Nmax, It retransmits and spends time calculation formula as follows:
It is certain to that key updating information occurs in actual key renewal process or confirmation message is lost, the time is spent by retransmitting It is incorporated to formula (7) and obtains complete cipher code renewal time calculation formula:
Wherein N≤Nmax, TtotaliThe total time spent by each key updating, the N=if key updating not successfully Nmax, after having obtained each key updating and having taken time, we can be derived by key and be averaged renewal time:
Wherein | K | for element sum in set, set is established for the element that BM element values are 1Key updating success rate can be expressed as key updating and successfully count divided by key Updating sum is:
Formula (10) and formula (11) are substituted into formula (6) and can obtain complete valuation functions expression formula:
This function gives the benefit that smart lock key updating method is brought in embodiment 1 and the cum rights of loss is quantitatively commented Estimate result.Based on this function, it is proposed that the reliable update scheme of dynamic security door lock key, pseudocode represents as follows:
Wherein N is represented currently to be retransmitted for which time, NmaxMaximum retransmission is represented, when N is more than maximum retransmission, NmaxIt is corresponding to increase a unit, on the contrary then one unit of reduction.By the parameter in Modification growth function, dynamically to determine key more Re-transmission maximum times and waiting acknowledging time in new, reduce communication overhead and raising are updated to power, to reach this key more The purpose that new departure optimizes.
Embodiment 3:Safety door latch key updating method Performance Evaluation
The present embodiment is used to test the key updating of the safety door latch key updating method of this present invention under various circumstances Success rate and renewal time.
1st, test environment
LM is configured to Inter (R) Xeon (R) CPU E5-2682v4@2.50GHz processors, 2GB main memories, The performance parameter of MSP430F5438A is 16 super low-power consumption microcontrollers, and 256KB flash memories, 16KBRAM uses narrowband network Communication module is moves remote BC95, upstream rate 62.5kbps, downstream rate 24kbps.
2nd, performance evaluation
(1) influence of the Network status to scheme performance
The maximum retransmission Nmax and NB- that the key updating success rate of the key updating method of the present invention is mainly set Network packet loss rate P in IoTlIt is related, smart lock is placed under varying environment, is carried out telecommunication with Ali cloud lock management person, is surveyed 2000 communication experiments are tried, and its average packet loss ratio PlAs herein with reference to index.By theory analysis, it is updated to power It will increase with the reduction of packet loss.Choose Pl=0.2, Pl=0.4, Pl=0.6 in the environment of, respectively carry out RSKU, AUDP is (referring to document:Liu Xizuo, Zhou Jing, big data packet transmitting [J] the telecom technologies of beam Deqing based on UDP, 2012, 52(01):96-100), the experiment of tri- kinds of scheme key updating success rates of DRSKU, experimental result is as shown in Fig. 3, Fig. 4 and Fig. 5.
Fig. 3,4,5 show RSKU, DRSKU and AUDP scheme of the present embodiment proposition in heterogeneous networks, key The variation of power is updated to, compares and obtains:In setting NmaxWhen=2, RSKU and AUDP schemes for key in NB-IoT networks more New success rate is close, and DRSKU can change according to network condition, dynamically set number of retransmissions, institute best to achieve the effect that With DRSKU in three kinds of schemes success rate highest.
(2) propagation delay time and scheme evaluation
An important factor for cipher code renewal time is another influence scheme performance, the present embodiment is positioned at Hubei University's computer Experimental center tests tri- kinds of schemes of RSKU, DRSKU and AUDP and is averaged cipher code renewal time, three kinds of schemes be averaged key updating when Between test result it is as shown in Figure 6.
From Fig. 6 test results can be seen that carry out key updating when, RSKU than AUDP be averaged renewal time reduction 32%, And DRSKU average renewal times compared with AUDP reduce 15%;Maximum retransmission Nmax, secret key be updated to power PsAnd network Packet loss PlThe performance of this programme will all be had an impact.These parameters are adjusted respectively, and are passed through valuation functions Eval and carried out The performance of scheme compares under different parameters.Fig. 7 has reflected part comparison result:
Fig. 7 results are shown as Network status deteriorates (packet loss PlIt is increasing), when the present embodiment performance is best Maximum retransmission NmaxAlso it is increasing.This embodies dynamic and intelligent lock key updating method and can be adjusted according to the tendency of user Maximum retransmission, with the usage experience for giving user best.From these results it can also be seen that, can using dynamic security door lock key It to be got well using the performance of AUDP progress key updatings by the performance ratio of update scheme.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (7)

1. a kind of update method of the safety door unblocking key based on narrowband Internet of Things, this method are complete successively by intelligent lock system Into the smart lock key updating based on narrowband Internet of Things, based on the user key update of Transmission Control Protocol, smart lock in 3G/4G networks It updates key and user update cipher key match and realizes effective unlocking instruction, which is characterized in that the smart lock based on narrowband Internet of Things Key updating includes the following steps:
(1) new key that generation user unlocks;
(2) for smart lock to lock management person's upload information, lock management person sends initial key update message to smart lock, and waits to be passed Return confirmation message;
(3) smart lock receive initial key update message after to lock management person send confirmation message;
(4) if lock management person receives the confirmation message that the smart lock returns, lock management person confirms close to smart lock transmission Key updates message;
If lock management person does not receive the confirmation message that the smart lock returns, lock management person retransmits initial key to smart lock Message is updated, if lock management person does not receive confirmation message after Nmax times retransmits, judges that this key updating fails, if Lock management person receives confirmation message and then terminates to retransmit and be sent really to receiving the corresponding equipment of confirmation message within retransmitting Nmax times Recognize key updating message, the Nmax updates message maximum retransmission for initial key;
(5) smart lock sends information using current key to lock management person, if administrator, which receives, confirms key updating report Literary then smart lock key updating success if lock management person receives sends information with old key, informs that lock management person updates failure, Both sides are continuing with old key and carry out the key updating negotiation of a new round.
2. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature It is, as long as smart lock has received initial key update message and confirms any key updating message in key updating message It will stop renewal process.
3. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature It is, the initial key update message maximum retransmission Nmax is the preset definite value of intelligent lock system.
4. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature It is, the initial key update message maximum retransmission Nmax is dynamically changed according to Network status.
5. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature Be, initial key update message include new key and for more new stage that identifies current key key updating mark, Temporal information is identified containing key updating.
6. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature It is, it is described to confirm that key updating message is included for the identify current key key updating mark of more new stage and time letter Breath, not comprising new key.
7. a kind of update method of safety door unblocking key based on narrowband Internet of Things according to claim 1, feature Be, user key update carries out after smart lock key updating success, so as to ensure user mobile phone key and The consistency of smart lock key.
CN201810368835.0A 2018-04-23 2018-04-23 The update method of safety door unblocking key based on narrowband Internet of Things Pending CN108259174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810368835.0A CN108259174A (en) 2018-04-23 2018-04-23 The update method of safety door unblocking key based on narrowband Internet of Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810368835.0A CN108259174A (en) 2018-04-23 2018-04-23 The update method of safety door unblocking key based on narrowband Internet of Things

Publications (1)

Publication Number Publication Date
CN108259174A true CN108259174A (en) 2018-07-06

Family

ID=62748289

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810368835.0A Pending CN108259174A (en) 2018-04-23 2018-04-23 The update method of safety door unblocking key based on narrowband Internet of Things

Country Status (1)

Country Link
CN (1) CN108259174A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040114A (en) * 2018-09-05 2018-12-18 唯得智慧(湖北)科技有限公司 Safe and reliable image transfer method based on narrowband Internet of Things
CN109544747A (en) * 2018-11-20 2019-03-29 北京千丁互联科技有限公司 Encryption key update method, system and the computer storage medium of intelligent door lock
CN109995527A (en) * 2019-04-12 2019-07-09 上海巨微集成电路有限公司 Code key exchange method, device, host computer, slave computer and storage medium
CN110139273A (en) * 2019-05-31 2019-08-16 无锡东源工业自动化有限公司 A kind of safety encryption and system for Internet of Things wireless transmission
CN113611020A (en) * 2021-08-31 2021-11-05 龙芯中科(金华)技术有限公司 Intelligent lock control method, device and equipment
CN113936362A (en) * 2021-10-14 2022-01-14 广东电网有限责任公司东莞供电局 Transformer substation safety region prevention and control method and system based on Internet of things and face recognition
CN114293846A (en) * 2021-11-16 2022-04-08 武汉小安科技有限公司 Unlocking control method and device for battery compartment lock, electronic equipment and storage medium
CN114614985A (en) * 2022-05-12 2022-06-10 施维智能计量系统服务(长沙)有限公司 Communication key updating method, key server and readable storage medium
CN115603901A (en) * 2022-09-28 2023-01-13 杭州粒合信息科技有限公司(Cn) Key updating method, device, acquisition terminal equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102677987A (en) * 2012-05-17 2012-09-19 黎荣金 Control device of intelligent electronic password lock, control method thereof and management system thereof
CN104282058A (en) * 2014-08-08 2015-01-14 厦门华数电力科技有限公司 Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function
CN106355772A (en) * 2016-10-12 2017-01-25 杭州行我行网络有限公司 Smart coded lock and system for bicycle and operation method thereof
CN106652117A (en) * 2016-10-14 2017-05-10 张智 Method and system for enabling dynamic passwords to realize offline unlocking, mobile terminal and server
CN106934886A (en) * 2017-02-28 2017-07-07 南京东屋电气有限公司 A kind of dynamic puzzle-lock OTC keys are set and update method
US20170250806A1 (en) * 2016-02-25 2017-08-31 Arm Ip Limited Methods and resources for generating secure communications
CN107195061A (en) * 2017-07-07 2017-09-22 东峡大通(北京)管理咨询有限公司 The control method and system of a kind of intelligent bicycle lock, intelligent bicycle lock
CN107244364A (en) * 2017-07-06 2017-10-13 东峡大通(北京)管理咨询有限公司 A kind of lock control device, control method, lock and lock control system
CN107730676A (en) * 2017-09-29 2018-02-23 东峡大通(北京)管理咨询有限公司 Unlocking method, device and the storage medium of the vehicles

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102677987A (en) * 2012-05-17 2012-09-19 黎荣金 Control device of intelligent electronic password lock, control method thereof and management system thereof
CN104282058A (en) * 2014-08-08 2015-01-14 厦门华数电力科技有限公司 Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function
US20170250806A1 (en) * 2016-02-25 2017-08-31 Arm Ip Limited Methods and resources for generating secure communications
CN106355772A (en) * 2016-10-12 2017-01-25 杭州行我行网络有限公司 Smart coded lock and system for bicycle and operation method thereof
CN106652117A (en) * 2016-10-14 2017-05-10 张智 Method and system for enabling dynamic passwords to realize offline unlocking, mobile terminal and server
CN106934886A (en) * 2017-02-28 2017-07-07 南京东屋电气有限公司 A kind of dynamic puzzle-lock OTC keys are set and update method
CN107244364A (en) * 2017-07-06 2017-10-13 东峡大通(北京)管理咨询有限公司 A kind of lock control device, control method, lock and lock control system
CN107195061A (en) * 2017-07-07 2017-09-22 东峡大通(北京)管理咨询有限公司 The control method and system of a kind of intelligent bicycle lock, intelligent bicycle lock
CN107730676A (en) * 2017-09-29 2018-02-23 东峡大通(北京)管理咨询有限公司 Unlocking method, device and the storage medium of the vehicles

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040114A (en) * 2018-09-05 2018-12-18 唯得智慧(湖北)科技有限公司 Safe and reliable image transfer method based on narrowband Internet of Things
CN109040114B (en) * 2018-09-05 2021-02-26 唯得智慧(湖北)科技有限公司 Safe and reliable image transmission method based on narrow-band Internet of things
CN109544747A (en) * 2018-11-20 2019-03-29 北京千丁互联科技有限公司 Encryption key update method, system and the computer storage medium of intelligent door lock
CN109995527A (en) * 2019-04-12 2019-07-09 上海巨微集成电路有限公司 Code key exchange method, device, host computer, slave computer and storage medium
CN110139273A (en) * 2019-05-31 2019-08-16 无锡东源工业自动化有限公司 A kind of safety encryption and system for Internet of Things wireless transmission
CN113611020A (en) * 2021-08-31 2021-11-05 龙芯中科(金华)技术有限公司 Intelligent lock control method, device and equipment
CN113936362A (en) * 2021-10-14 2022-01-14 广东电网有限责任公司东莞供电局 Transformer substation safety region prevention and control method and system based on Internet of things and face recognition
CN114293846A (en) * 2021-11-16 2022-04-08 武汉小安科技有限公司 Unlocking control method and device for battery compartment lock, electronic equipment and storage medium
CN114614985A (en) * 2022-05-12 2022-06-10 施维智能计量系统服务(长沙)有限公司 Communication key updating method, key server and readable storage medium
CN115603901A (en) * 2022-09-28 2023-01-13 杭州粒合信息科技有限公司(Cn) Key updating method, device, acquisition terminal equipment and storage medium
CN115603901B (en) * 2022-09-28 2024-08-09 杭州粒合信息科技有限公司 Key updating method and device, acquisition terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108259174A (en) The update method of safety door unblocking key based on narrowband Internet of Things
Ataei Nezhad et al. An authentication-based secure data aggregation method in internet of things
CN110234111A (en) A kind of two-factor authentication key agreement protocol suitable for multiple gateway wireless sensor network
CN109728898A (en) Internet-of-things terminal safety communicating method based on block chain technology
CN109040114A (en) Safe and reliable image transfer method based on narrowband Internet of Things
Park et al. Symmetric key-based authentication and the session key agreement scheme in IoT environment
WO2023236551A1 (en) Decentralized trusted access method for cellular base station
CN112770321A (en) Internet of things equipment authentication and secure transmission method, computer equipment and storage medium
Li et al. An anonymous authentication and key agreement protocol in smart living
Kgwadi et al. Securing RDS broadcast messages for smart grid applications
Maleh et al. Towards an efficient datagram transport layer security for constrained applications in Internet of Things
CN106230840A (en) A kind of command identifying method of high security
CN112311553B (en) Equipment authentication method based on challenge response
CN118337386A (en) Network security communication method, storage medium, device and computer program product based on improved enhanced quantum security encryption algorithm
Feng et al. Formal security analysis and improvement based on LonTalk authentication protocol
Ma et al. DScPA: A Dynamic Sub-cluster Privacy-preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT
Zou et al. Information Security Transmission Technology in Internet of Things Control System.
Ahmed et al. Optimizing V2G Dynamics: An AI-Enhanced Secure Protocol for Energy Management in Industrial Cyber-Physical Systems
Lucks et al. Concrete security for entity recognition: The Jane Doe protocol
Faye et al. A user authentication-based probabilistic risk approach for Wireless Sensor Networks
Ramya et al. SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework
Ambarkar et al. An efficient authentication technique to protect iot networks from impact of rpl attacks
Pradeep et al. Formal Verification of CHAP PPP authentication Protocol for Smart City/Safe City Applications.
CN110224827A (en) A kind of edge gateway of internet of things of encryption
Ya-tao et al. A novel authentication scheme based on trust-value updated model in adhoc network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706

RJ01 Rejection of invention patent application after publication