Abstract
This article introduces the security risks of the commonly used MQTT protocol in the Internet of Things and the security risks caused by smart door lock vulnerabilities, aiming to solve the problem of public MQTT agent leaking smart lock data, causing attackers to use the sensitive data to physically locate and remotely control the connection to the smart door lock supplier Any lock issues in the cloud infrastructure. This paper presents a wireless sensor network authentication encryption method based on SM9 algorithm. By implementing and deploying sensor network authentication encryption in practical applications, it avoids the leakage of sensitive information from public data exposed on the Internet.
Highlights
In the current era of the Internet of everything, 5G, big data, artificial intelligence and other new technologies have brought innovative vitality to the Internet of things
The purpose of this paper is to study the hidden risks of intelligent door locks caused by vulnerability risk in MQTT protocols commonly used in the Internet of things, and encrypt the MQTT public data transmission data exposed on the Internet through IBC authentication encryption method, so that attackers cannot view sensitive information in data even if they obtain MQTT public data
In order to realize the identity authentication and data encryption transmission of the sensor in the intelligent door lock, the IBC key infrastructure is deployed in the application layer, each terminal entity applies for the IBC private key, and the authentication encryption is realized when the sensor is running, so as to ensure the security of the wireless sensor network
Summary
In the current era of the Internet of everything, 5G, big data, artificial intelligence and other new technologies have brought innovative vitality to the Internet of things. A large number of Internet of things devices connected to the cloud without network security tests are on the market,We must be aware of this cumulative risk and strengthen the regulation and supervision of product network security
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.