CN102355356A - Asymmetric encryption method suitable for ZIGBEE wireless meter reading - Google Patents
Asymmetric encryption method suitable for ZIGBEE wireless meter reading Download PDFInfo
- Publication number
- CN102355356A CN102355356A CN201110309726XA CN201110309726A CN102355356A CN 102355356 A CN102355356 A CN 102355356A CN 201110309726X A CN201110309726X A CN 201110309726XA CN 201110309726 A CN201110309726 A CN 201110309726A CN 102355356 A CN102355356 A CN 102355356A
- Authority
- CN
- China
- Prior art keywords
- terminal node
- data
- key
- messages
- encryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an asymmetric encryption method suitable for ZIGBEE wireless meter reading, which comprises the following the following steps that: step 1, when hardware is initialized, the same public key and private key are generated by specific p, q and e in an RSA (Rivest-Shamir-Adleman) algorithm in a central node and a terminal node, accordingly, a public key and a private key are stored in the central node and the terminal node, the public key is used for encrypting messages, and the private key is used for decrypting the messages; step 2, when the central node sends messages to the terminal node, the data is encrypted by the public key firstly, and then the messages are sent to the terminal node; and step 3, after the terminal node receives the data, the data is decrypted by the private key and are restored into original messages; and when the terminal node sends the messages to the central node, the step 2 to the step 3 is adopted. The reliability of the symmetric encryption method of RSA and the characteristic that each frame data is less in ZIGBEE wireless transmission are combined to effectively improve the security of wireless transmission.
Description
Technical field
The present invention relates to a kind of radio communication and transmission encryption method.Be specifically related to a kind of asymmet-ric encryption method of the ZIGBEE of being applicable to radio meter register.
Background technology
The ZIGBEE technology is a kind of two-way wireless communication technology towards automation and controlled in wireless of rise in recent years.It has closely, low data rate, low complex degree, low-power consumption, characteristics cheaply.Spendable frequency range that ZIGBEE is wireless has 3, is respectively ISM (the Industrial Scientific Medical) frequency range of 2.4GHz, the 915MHz frequency range of the U.S. and the 868MHz frequency range in Europe.Adopting the 2.4GHz frequency range in China, is the frequency of exempting to apply for and exempt from usage charges.Its transmission rate is 20kb/s ~ 250kb/s, and transmission range is 10m ~ 75m.It coordinates to realize communication each other according to the 802.15.4 standard between thousands of small transducers.These transducers only need energy seldom, through radio wave data are passed to another transducer from a transducer with the mode of relay, so communication efficiency is very high.And the characteristics of lower data speed and less communication range have determined it to be suitable for carrying the less business of data traffic, and main application fields comprises occasions such as data acquisition, wireless industrial control, consumer electronics device, automotive automation, family and building automatic, medical equipment control, telecommunication network control.In addition, whole advantages that ZIGBEE has taked the strong radio physical layer of IEEE 802.15.4 to be had: power saving, simple, specification that cost is low have increased logical network, network security and application layer.
The ZIGBEE safe practice is based on that one group 128 key realizes, uses the AES-128 block encryption.In data encryption process, can use three kinds of basic keys.Be respectively master key, link key and netkey.Master key can be installed when device fabrication, also can pass through the trust center setting, or based on the data of user capture, for example, PIN (PIN), password and password etc.Master key is the basis of two equipment long-term safety communications, also can be used as general link key and uses.So, must safeguard the confidentiality and the correctness of master key.When in network transmission process, adopt master key can stop eavesdropping.Link key is shared by two equipment in a PAN network, and it can be set up through master key, also can when device fabrication, install.Netkey can pass through the trust center setting, also can when device fabrication, install.It can be applicable to data link layer, network layer and application layer.Link key and netkey constantly periodically upgrade.When two equipment all have these two kinds of keys, adopt link key to communicate.Because security mechanism is based on shared key, the safety guarantee of network mainly depends on the storage security of initialization safety and all keys.
Yet the use of symmetric key need be distributed on up to a hundred the device nodes in application, and there is very big potential safety hazard in this, and more defectives of AES encryption method can manifest afterwards day by day.All use single symmetric encryption method perhaps can become the weak spot in the ZIGBEE safeguard construction to data encryption and interchange key.Based on this reason, use asymmet-ric encryption method to come the distributed key expectation to expand to some extent.
Summary of the invention
The objective of the invention is to solve the single shortcoming of symmetric encryption method key, propose a kind of asymmet-ric encryption method of in ZIGBEE, using.
The technical scheme that the present invention adopts is: utilize the RSA asymmetric methods, the data of sending are encrypted with PKI at transmitting terminal, the data that receive are deciphered with private key at receiving terminal.Method comprises following content:
A kind of asymmet-ric encryption method that is applicable to the ZIGBEE radio meter register may further comprise the steps:
Step 1: Centroid and terminal node are when hardware initialization; Use p specific in the RSA Algorithm, q and e to generate identical PKI and key; Centroid and terminal node have all been preserved a PKI and key like this, and PKI is used for to message encryption, and private key is used for to decrypt messages;
Step 2: when the center node sends message to terminal node, use public-key earlier, send to terminal node then to data encryption;
Step 3: after terminal node is received data, use the private key data decryption and be reduced into origination message.
When terminal node sends message to Centroid, also will adopt identical step.
The conspicuousness progress and the characteristics of technical scheme of the present invention are mainly reflected in: the advantage of the reliability of RSA asymmet-ric encryption method is combined with the few characteristics of the every frame data amount of ZIGBEE wireless transmission, effectively improve the fail safe of wireless transmission.Because the 20-250kb/s overall transmission rate of ZIGBEE network, when the number of nodes in the network was 100 nodes, the speed of each node was less than 2kb/s.And the key length of rsa encryption needs at least 1024 bits, and receive the bigger restriction of view data this moment, and the ZIGBEE network will not carry this transmission demand.Therefore the present invention adopts the meter reading data (less than the kb level) of the minimum data volume of ZIGBEE Network Transmission, and network capacity can reach the scale of 100 nodes, and the key length of RSA can reach 2048 bits, has strengthened fail safe.
Embodiment
So-called asymmetric, be meant that this method needs pair of secret keys, use one of them encryption, then need use another to decipher.The RSA method is wherein a kind of asymmetric cryptography method.
One: generate PKI and private key
1. get two big at random prime number p and q, p is not equal to q, calculates N=p*q;
2. according to Euler's function, be not more than N and be (p-1) * (q-1) with the relatively prime integer number of N;
3. integer e of picked at random is with (p-1) * (q-1) is relatively prime, and e is less than (p-1) * (q-1);
4. calculate d:d*e ≡ 1 (mod (p-1) * (q-1)) with following formula;
5. the record of p and q is destroyed.
Thus, (N e) is PKI, and (N d) is private key, and (N is secret d).(N e) encrypts the data of sending to transmit leg, and (N d) deciphers the data that receive with private key with PKI.
Two: encrypting messages
Suppose that Centroid wants to send message m to terminal node, it know PKI (N, e).Its use converts m into an Integer n less than N with the form that terminal node is arranged in advance, such as m is represented heuristicimal code, these heuristicimal codes is connected together form a numeral then.With following this formula n is encrypted as c then:
Centroid just can send to terminal node with c after calculating c.
Three: decrypt
Terminal node receives and just can utilize private key behind the message c (N d) decodes.Can convert c into n with following formula:
After obtaining n, terminal node can be reduced into n origination message m.
The easy explanation with a long history of RSA method, and can be used as encryption and decryption simultaneously.And the speed of RSA has determined it generally to be used for the low volume data encryption.
In sum, after the RSA asymmet-ric encryption method, can in the ZIGBEE wireless network, transmit data more safely.
The above; It only is preferred embodiment of the present invention; Be not that the present invention is done any pro forma restriction, every foundation technical spirit of the present invention all still belongs in the scope of technical scheme of the present invention any simple modification, equivalent variations and decoration that above embodiment did.
Claims (1)
1. asymmet-ric encryption method that is applicable to the ZIGBEE radio meter register may further comprise the steps:
Step 1: Centroid and terminal node are when hardware initialization; Use p specific in the RSA Algorithm, q and e to generate identical PKI and key; Centroid and terminal node have all been preserved a PKI and key like this, and PKI is used for to message encryption, and private key is used for to decrypt messages;
Step 2: when the center node sends message to terminal node, use public-key earlier, send to terminal node then to data encryption;
Step 3: after terminal node is received data, use the private key data decryption and be reduced into origination message;
When terminal node sends message to Centroid, also adopt the step of step 2 to step 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110309726XA CN102355356A (en) | 2011-10-13 | 2011-10-13 | Asymmetric encryption method suitable for ZIGBEE wireless meter reading |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110309726XA CN102355356A (en) | 2011-10-13 | 2011-10-13 | Asymmetric encryption method suitable for ZIGBEE wireless meter reading |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102355356A true CN102355356A (en) | 2012-02-15 |
Family
ID=45578854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110309726XA Pending CN102355356A (en) | 2011-10-13 | 2011-10-13 | Asymmetric encryption method suitable for ZIGBEE wireless meter reading |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102355356A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102546184A (en) * | 2012-02-17 | 2012-07-04 | 北京海联捷讯信息科技发展有限公司 | Method and system for message secure transmission or key distribution in sensor network |
CN108173641A (en) * | 2018-02-11 | 2018-06-15 | 福州大学 | A kind of Zigbee safety communicating methods based on RSA |
CN112907933A (en) * | 2021-03-15 | 2021-06-04 | 宁波三星医疗电气股份有限公司 | Meter reading method of electric energy meter |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202621A (en) * | 2006-12-13 | 2008-06-18 | 联想(北京)有限公司 | Method and system for security verification of data among non-contact equipments |
US20090251282A1 (en) * | 2008-04-02 | 2009-10-08 | William Fitzgerald | System for mitigating the unauthorized use of a device |
-
2011
- 2011-10-13 CN CN201110309726XA patent/CN102355356A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202621A (en) * | 2006-12-13 | 2008-06-18 | 联想(北京)有限公司 | Method and system for security verification of data among non-contact equipments |
US20090251282A1 (en) * | 2008-04-02 | 2009-10-08 | William Fitzgerald | System for mitigating the unauthorized use of a device |
Non-Patent Citations (1)
Title |
---|
靳丽君: "非对称加密体制中RSA算法的研究", 《电子设计工程》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102546184A (en) * | 2012-02-17 | 2012-07-04 | 北京海联捷讯信息科技发展有限公司 | Method and system for message secure transmission or key distribution in sensor network |
CN102546184B (en) * | 2012-02-17 | 2015-05-27 | 北京海联捷讯科技股份有限公司 | Method and system for message secure transmission or key distribution in sensor network |
CN108173641A (en) * | 2018-02-11 | 2018-06-15 | 福州大学 | A kind of Zigbee safety communicating methods based on RSA |
CN112907933A (en) * | 2021-03-15 | 2021-06-04 | 宁波三星医疗电气股份有限公司 | Meter reading method of electric energy meter |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102869013B (en) | Based on the safe communication system of radio channel characteristic | |
CN102333093A (en) | Data encryption transmission method and system | |
CN106533656B (en) | A kind of key multilayer mixing method for encryption/decryption based on WSN | |
CN105577357A (en) | Intelligent household data privacy protection method based on full homomorphic encryption | |
CN105163309A (en) | Method for secure communication of wireless sensor network based on combined password | |
CN104333860A (en) | ZigBee security network with public key cryptography system NTRU (number theory research unit) | |
CN111224974A (en) | Method, system, electronic device and storage medium for network communication content encryption | |
Alghamdi et al. | Routing-aware and malicious node detection in a concealed data aggregation for WSNs | |
CN104113420A (en) | Identity based aggregate signcryption method | |
CN103023646B (en) | The polymerisable label decryption method of a kind of label ciphertext | |
KR20180096189A (en) | LPWA Module performing Encrypted Communication and method thereof | |
Puthal | Secure data collection and critical data transmission technique in mobile sink wireless sensor networks | |
CN102355356A (en) | Asymmetric encryption method suitable for ZIGBEE wireless meter reading | |
CN103152733A (en) | Communication method and device | |
Abdelgader et al. | Exploiting the physical layer security for providing a simple user privacy security system for vehicular networks | |
Sahana et al. | Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis | |
CN113795023A (en) | Bluetooth data transmission encryption method based on chaotic sequence and block encryption | |
CN112188485A (en) | Encryption and decryption method based on Bluetooth communication | |
CN103200007A (en) | Serial advanced technology attachment (SATA) data asymmetrical encryption hardware achieving system based on field programmable gate array (FPGA) | |
CN203352621U (en) | Wireless Internet of Things data safety intelligent transmission system | |
Chen et al. | An authentication framework for multi-domain machine-to-machine communication in cyber-physical systems | |
Al-Haija et al. | Estimating energy consumption of diffie hellman encrypted key exchange (DH-EKE) for wireless sensor network | |
CN108282777B (en) | Security networking transmission method based on double encryption mechanism and used in intelligent lock system | |
Chen et al. | A new kind of session keys based on message scheme for sensor networks | |
Chunqing et al. | Research of ZigBee's data security and protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120215 |