• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用LoRa接口在物联网网络中构建安全环境的程序。

Procedures for Building a Secure Environment in IoT Networks Using the LoRa Interface.

作者信息

Łeska Sebastian, Furtak Janusz

机构信息

Faculty of Cybernetics, Military University of Technology, 00-908 Warsaw, Poland.

出版信息

Sensors (Basel). 2025 Jun 22;25(13):3881. doi: 10.3390/s25133881.

DOI:10.3390/s25133881
PMID:40648140
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12252349/
Abstract

IoT devices typically have limited memory resources and computing power. For this reason, it is often not possible to use the authentication and trusted environment mechanisms commonly used on the Internet. Due to the autonomous operation of IoT devices, solutions that require user interaction should be excluded. Additionally, due to the limited capabilities of IoT devices, mechanisms performing complex cryptographic operations are also not always recommended. This paper proposes a set of mechanisms for building a trusted IoT environment using a hardware TPM 2.0 module. The developed set includes procedures for securely registering nodes in the network, which are designed for use in an untrusted and uncontrolled environment. The authors also proposed a protocol for device authentication using PCR registries supported by the TPM based on the Proof of Knowledge concept. Using a direct method, the solution also involves implementing a symmetric key distribution protocol based on the KTC (Key Translation Centre) scheme. The developed procedures can be used in networks where nodes have limited memory resources and low computing power. The communication interface used in the developed demonstrator is LoRa (Long Range), for which a proprietary method of identifying network devices has been proposed to ensure the confidentiality of the communicating parties' identities.

摘要

物联网设备通常具有有限的内存资源和计算能力。因此,通常无法使用互联网上常用的认证和可信环境机制。由于物联网设备的自主运行,需要用户交互的解决方案应被排除。此外,由于物联网设备的能力有限,执行复杂加密操作的机制也并非总是被推荐。本文提出了一套使用硬件TPM 2.0模块构建可信物联网环境的机制。所开发的这套机制包括在网络中安全注册节点的程序,这些程序设计用于不可信和不受控制的环境。作者还基于知识证明概念提出了一种使用TPM支持的PCR注册表进行设备认证的协议。通过直接方法,该解决方案还涉及基于KTC(密钥转换中心)方案实现对称密钥分发协议。所开发的程序可用于节点内存资源有限且计算能力较低的网络。所开发的演示器中使用的通信接口是LoRa(长距离),针对该接口提出了一种专有方法来识别网络设备,以确保通信双方身份的保密性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/4c5848b8a644/sensors-25-03881-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/f937d6848c55/sensors-25-03881-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/58b654acd8a5/sensors-25-03881-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/6a499cfc4a5e/sensors-25-03881-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/6f23443a905b/sensors-25-03881-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/8febfe9ea68f/sensors-25-03881-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/f7f90b96ef7f/sensors-25-03881-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/36430f8805fc/sensors-25-03881-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/a8ebea379319/sensors-25-03881-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/4c5848b8a644/sensors-25-03881-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/f937d6848c55/sensors-25-03881-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/58b654acd8a5/sensors-25-03881-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/6a499cfc4a5e/sensors-25-03881-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/6f23443a905b/sensors-25-03881-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/8febfe9ea68f/sensors-25-03881-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/f7f90b96ef7f/sensors-25-03881-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/36430f8805fc/sensors-25-03881-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/a8ebea379319/sensors-25-03881-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d98b/12252349/4c5848b8a644/sensors-25-03881-g009.jpg

相似文献

1
Procedures for Building a Secure Environment in IoT Networks Using the LoRa Interface.使用LoRa接口在物联网网络中构建安全环境的程序。
Sensors (Basel). 2025 Jun 22;25(13):3881. doi: 10.3390/s25133881.
2
Short-Term Memory Impairment短期记忆障碍
3
Management of urinary stones by experts in stone disease (ESD 2025).结石病专家对尿路结石的管理(2025年结石病专家共识)
Arch Ital Urol Androl. 2025 Jun 30;97(2):14085. doi: 10.4081/aiua.2025.14085.
4
[Volume and health outcomes: evidence from systematic reviews and from evaluation of Italian hospital data].[容量与健康结果:来自系统评价和意大利医院数据评估的证据]
Epidemiol Prev. 2013 Mar-Jun;37(2-3 Suppl 2):1-100.
5
Automated devices for identifying peripheral arterial disease in people with leg ulceration: an evidence synthesis and cost-effectiveness analysis.用于识别下肢溃疡患者外周动脉疾病的自动化设备:证据综合和成本效益分析。
Health Technol Assess. 2024 Aug;28(37):1-158. doi: 10.3310/TWCG3912.
6
Assessing the comparative effects of interventions in COPD: a tutorial on network meta-analysis for clinicians.评估慢性阻塞性肺疾病干预措施的比较效果:面向临床医生的网状Meta分析教程
Respir Res. 2024 Dec 21;25(1):438. doi: 10.1186/s12931-024-03056-x.
7
Factors that impact on the use of mechanical ventilation weaning protocols in critically ill adults and children: a qualitative evidence-synthesis.影响重症成人和儿童机械通气撤机方案使用的因素:一项定性证据综合分析
Cochrane Database Syst Rev. 2016 Oct 4;10(10):CD011812. doi: 10.1002/14651858.CD011812.pub2.
8
Sexual Harassment and Prevention Training性骚扰与预防培训
9
Cost-effectiveness of using prognostic information to select women with breast cancer for adjuvant systemic therapy.利用预后信息为乳腺癌患者选择辅助性全身治疗的成本效益
Health Technol Assess. 2006 Sep;10(34):iii-iv, ix-xi, 1-204. doi: 10.3310/hta10340.
10
Comparison of the effectiveness of inhaler devices in asthma and chronic obstructive airways disease: a systematic review of the literature.吸入装置在哮喘和慢性阻塞性气道疾病中的有效性比较:文献系统评价
Health Technol Assess. 2001;5(26):1-149. doi: 10.3310/hta5260.

本文引用的文献

1
Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing.通过优化正交压缩感知开发高质量重建图像加密策略。
Sci Rep. 2024 Apr 16;14(1):8805. doi: 10.1038/s41598-024-59277-z.
2
A Security Framework for Increasing Data and Device Integrity in Internet of Things Systems.一种用于增强物联网系统中数据和设备完整性的安全框架。
Sensors (Basel). 2023 Aug 30;23(17):7532. doi: 10.3390/s23177532.
3
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment.物联网系统在 MQTT 环境中的加密密钥分配系统。
Sensors (Basel). 2023 May 26;23(11):5102. doi: 10.3390/s23115102.
4
LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review.基于 LoRaWAN 物理层的攻击与对策综述。
Sensors (Basel). 2022 Apr 19;22(9):3127. doi: 10.3390/s22093127.
5
Cryptographic Keys Generating and Renewing System for IoT Network Nodes-A Concept.物联网网络节点的加密密钥生成与更新系统——概念
Sensors (Basel). 2020 Sep 3;20(17):5012. doi: 10.3390/s20175012.
6
A Framework for Constructing a Secure Domain of Sensor Nodes.构建传感器节点安全域的框架
Sensors (Basel). 2019 Jun 21;19(12):2797. doi: 10.3390/s19122797.