Many constrained devices of Internet of Things (IoT) are operating under low power, and with limited computational and network resources. The devices cannot use standard security protocols to protect end-to-end security because they become the weakness of IoT. Narrow Band Internet of Things (NB-IoT) is of broad application prospects in production management, life-cycle asset management and smart power utilization of smart grid. Its characteristics and security demands of application domain present a challenge for the security of electric power business. In order to improve the high security of power network data transmission, a security encryption method for ubiquitous power Internet of things terminal based on physical unclonable function (PUF) and state secret algorithm SM3 is proposed in this paper. A self-controllable NB-IoT application layer security architecture is designed by introducing the domestic cryptographic algorithm SM3, extending the existing key derivation structure of LTE, and combining the physical unclonable function to ensure the generation of encryption keys between NB-IoT terminals and power grid business platforms. The developed IoT security transmission module is applied in the intelligent inspection robot of substation to realize transparent and encrypted transmission of video and thermal sensing data. The scheme of this paper realizes secure data transmission and bidirectional identity authentication between IoT devices and terminals. Experimental results validate its features, including lightweight, low communication costs and flexible key update.
[1]
Liu Weiqiang,et al.
Design and Implementation of a Low-Cost Physical Unclonable Function and Its Application in RFID
,
2016
.
[2]
Li Dawei,et al.
Research on Security Technology of Power Internet of Things Based on NB-IoT
,
2019
.
[3]
Wang Yu-min.
Authentication and Key Negotiation Protocol Between Two Nodes of Wireless Sensor Networks
,
2008
.
[4]
R. Pappu,et al.
Physical One-Way Functions
,
2002,
Science.
[5]
Guo Yuan-bo.
Survey of physical unclonable function
,
2012
.
[6]
Xu Xing-kun.
Research on technical framework and cyber security protection system of IOT in smart grid
,
2012
.
[7]
Zhu Wang,et al.
Research on PUF-Based Security Enhancement of Narrow-Band Internet of Things
,
2018,
2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).
[8]
Ma Jun.
RFID Mutual Authentication Based on Physical Unclonable Function
,
2013
.
[9]
Yan Da-sun.
Security Protocol for Low-cost RFID System Based on PUF
,
2010
.
[10]
Liu Hong,et al.
THE AUTHENTICATION PROTOCOL FOR INTELLIGENT POLICE DEVICES BASED ON PHYSICAL UNCLONABLE FUNCTION
,
2016
.