Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Equipment area provable security verification method with resistance to collusion attack

A security verification and anti-collusion technology, applied in the field of network security, can solve the problems of not satisfying security, lack of password verification methods, unable to help verify the specific location of the verified person, etc., to achieve the effect of high security

Active Publication Date: 2016-08-17
XIDIAN UNIV
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] (1) The positioning technology based on network technology does not consider the security issues of positioning in the environment where the attack exists;
[0014] (2) The protocol scheme given by wireless security positioning and location verification does not satisfy the provable security under collusion attack;
[0015] (3) The safety distance constraint can only verify whether the verified person is within a certain distance, and cannot help verify the specific location of the verified person;
[0016] (4) Location-based cryptography lacks an area-based password verification method that uses the area as credential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment area provable security verification method with resistance to collusion attack
  • Equipment area provable security verification method with resistance to collusion attack
  • Equipment area provable security verification method with resistance to collusion attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] With the development of Internet and mobile communication technology, location information has become increasingly important, and secure location verification is essential. The current existing research technologies mainly include positioning based on network technology, wireless security positioning and location verification, security distance constraint technology and positioning technology based on location cryptography, but the positioning technology based on network technology does not consider the security of positioning in the environment where attacks exist Problem: The protocol scheme given by wireless security positioning and location verification is not provably safe under collusion attacks, and can only resist the attacks of a single or two attackers without collusion; the security distance constraint can only verify whether the verified person is Within a certain distance, it cannot help to verify the specific location of the prover; location-based cryptogra...

Embodiment 2

[0066] The device area provable security verification method against collusion attacks is the same as that in Embodiment 1, wherein the process of sending the verifier message in step (4), the specific steps are as follows:

[0067] (4a) Let the verifier V 1 , V 2 , V 3 The first message sent reaches the center O at the same time T, O(x 0 ,y 0 ) represents the coordinates of the center of the circle, and the second message arrives at O ​​at the time T', where T'=T+Δt, Δt=2r 0 / v, r 0 Indicates the radius of the target area circle, and v indicates that the verifier sends messages at the speed of radio waves;

[0068] (4b) The distance between the verifier and the center O is different, and the message needs to reach the center of the circle at the same time, so the verifier V i The moment of sending the message is different, let V 1 , V 2 , V 3 The time of sending the first message is respectively represented by T 1 ,T 2 ,T 3 Indicates that the time to send the seco...

Embodiment 3

[0077] The device area provable security verification method against collusion attacks is the same as that in Embodiment 1, wherein in step (5) the prover P receives all verifiers V i The first message M sent i time t i , and the prover P receives all verifiers V i The second message M sent i ’ time t i ’ is calculated as follows:

[0078] t 1 =T 1 +d 1 / v,t 1 '=t 1 +Δt;

[0079] t 2 =T 2 +d 2 / v,t 2 '=t 2 +Δt;

[0080] t 3 =T 3 +d 3 / v,t 3 '=t 3 +Δt;

[0081] d 1 , d 2 , d 3 Denotes the verifier V 1 (x 1 ,y 1 ), V 2 (x 2 ,y 2 ), V 3 (x 3 ,y 3 ) is the distance from the prover P(x,y).

[0082] Both the first message and the second message sent by the verifier are sent in the form of broadcast, because the prover is in the circular area, so the prover can receive all the messages sent by each verifier. The moment when each message is received by the prover in the area is equal to the moment when the verifier sends the message plus the time requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment area provable security verification method with resistance to collusion attack and mainly solves the problem of absence of a security verification method with areas as credential information in existing position-based cryptography technologies. The implementation scheme of the method comprises steps as follows: a provable security verification model is built, and a prover is located in a target area; verifiers select information sources and random series and share information with one another, and the verifiers replay information in a broadcasting manner; a metric value is generated by the prover, and a verification value is calculated, and position information of the prover is broadcasted; the verifiers verify correctness of the verification value, whether the position information of the prover is accepted is judged, if the verification value passes the verification, the position information of the prover is broadcasted, otherwise, the verification value does not pass the verification, that is, the position claimed by the prover is not in the area, and the verification is finished. According to the method, any prover in the target area can effectively resist the collusion attack of multiple opponents after verification, and the security verification of the position of the prover is realized. The method can be used for verifying whether the equipment, namely, the prover, is located in the target area.

Description

technical field [0001] The invention belongs to the technical field of network security, and mainly relates to area password verification, in particular to an anti-collusion attack device area provable security verification method, which can be used to verify whether a certifier is in a designated area. Background technique [0002] With the development of mobile communication technology, network technology and surveying and mapping technology, location-related information value-added services have become an important part of modern geographic information, and gradually become one of the biggest growth points. Location information is increasingly showing its importance. Many services based on location information have emerged. With the development of GPS and wireless Internet technology, the demand for location information services has shown a trend of substantial growth. Therefore, many system designs now use the location information of the participants. However, when the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/1441
Inventor 杜方琼张俊伟马建峰陈治平张元轶阙梦菲龙奔李晨
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products