Research on authentication encryption mechanism based on intelligent door lock vulnerability risk

被引:0
|
作者
Lu, Yili [1 ]
机构
[1] Minist Transport Management, Cyber Secur, Cadre Coll, Beijing, Peoples R China
关键词
D O I
10.1051/matecconf/202133608009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article introduces the security risks of the commonly used MQTT protocol in the Internet of Things and the security risks caused by smart door lock vulnerabilities, aiming to solve the problem of public MQTT agent leaking smart lock data, causing attackers to use the sensitive data to physically locate and remotely control the connection to the smart door lock supplier Any lock issues in the cloud infrastructure. This paper presents a wireless sensor network authentication encryption method based on SM9 algorithm. By implementing and deploying sensor network authentication encryption in practical applications, it avoids the leakage of sensitive information from public data exposed on the Internet.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Research of ABAC Mechanism Based on the Improved Encryption Algorithm Under Cloud Environment
    Zhang, Long-xiang
    Zou, Jia-shun
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 463 - 469
  • [42] Cross-domain Authentication Mechanism Design and Research Based on the Mobile Internet
    Cheng, Xiao-hui
    Li, Ming-yue
    Zhang, Li-yun
    INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION (ICCA 2016), 2016, : 501 - 506
  • [43] Intelligent optimization based risk control research of virtual enterprises
    Xue Peng-fei
    2013 10TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT (ICSSSM), 2013, : 763 - 767
  • [44] Research on mobile intelligent mine platform based on risk control
    Wu, Chao
    Wu, Yuliang
    Zhu, Changsheng
    Zhang, Chengyuan
    Song, Qingjun
    INTERNATIONAL WORKSHOP ON GREEN ENERGY, ENVIRONMENT AND SUSTAINABLE DEVELOPMENT, 2020, 601
  • [45] An Innovative Risk-Based Authentication Mechanism for Closing the new Banking Vault
    Dlamini, Moses
    Venter, H. S.
    Eloff, J. H. P.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INNOVATION AND ENTREPRENEURSHIP (ICIE-2015), 2015, : 72 - 80
  • [46] Research advancements for impact chain based climate risk and vulnerability assessments
    Petutschnig, Linda
    Rome, Erich
    Lueckerath, Daniel
    Milde, Katharina
    Swartling, Asa Gerger
    Aall, Carlo
    Meyer, Mark
    Jorda, Gabriel
    Gobert, Julie
    Englund, Mathilda
    Andre, Karin
    Bour, Muriel
    Attoh, Emmanuel M. N. A. N.
    Dale, Brigt
    Renner, Kathrin
    Cauchy, Adeline
    Reuschel, Saskia
    Rudolf, Florence
    Agulles, Miguel
    Melo-Aguilar, Camilo
    Zebisch, Marc
    Kienberger, Stefan
    FRONTIERS IN CLIMATE, 2023, 5
  • [47] Research on Student Modeling of Intelligent Learning System Based on CMA Mechanism
    Li, Yi
    Hu, Qingchun
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 556 - 560
  • [48] Research on Dynamic Propagation Mechanism of Network Resources Based on Intelligent Tags
    Liu, Shan
    Dong, Yao
    Chai, Jianping
    2018 11TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2018), 2018,
  • [49] Research on the fault diagnosis of gun recoil mechanism based on intelligent algorithm
    Zhang Xiaodong
    Zhang Peilin
    Fu Jianping
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 2407 - 2410
  • [50] Secure and efficient intelligent transport system based on cryptographic authentication mechanism for vehicular ad hoc networks
    Hadi, Hayder Sabeeh
    Obaid, Ahmed J.
    Alkhafaji, Mohammed Ayad
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (05): : 1539 - 1554