Device area provable security verification method against collusion attack

A security verification and anti-collusion technology, applied in the field of network security, can solve problems such as unsatisfactory security, lack of password verification methods, and failure to consider security issues, etc., to achieve high security effects

Active Publication Date: 2019-04-23
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] (1) The positioning technology based on network technology does not consider the security issues of positioning in the environment where the attack exists;
[0014] (2) The protocol scheme given by wireless security positioning and location verification does not satisfy the provable security under collusion attack;
[0015] (3) The safety distance constraint can only verify whether the verified person is within a certain distance, and cannot help verify the specific location of the verified person;
[0016] (4) Location-based cryptography lacks an area-based password verification method that uses the area as credential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device area provable security verification method against collusion attack
  • Device area provable security verification method against collusion attack
  • Device area provable security verification method against collusion attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] With the development of the Internet and mobile communication technologies, location information has become increasingly important, and secure location verification is essential. The current existing research technologies mainly include positioning based on network technology, wireless security positioning and location verification, security distance constraint technology and positioning technology based on location cryptography, but the positioning technology based on network technology does not consider the security of positioning in the environment where attacks exist. Problem; the protocol scheme given by wireless security positioning and location verification does not satisfy the provable security under collusion attack, and can only resist the attack of single or non-collusion two attackers; the safety distance constraint can only verify whether the verified person is Within a certain distance, it cannot help to verify the specific location of the prover; location-...

Embodiment 2

[0066] The device area verifiable security verification method against collusion attack is the same as that of Embodiment 1, wherein the verifier message sending process in step (4), the specific steps are as follows:

[0067] (4a) Let the verifier V 1 , V 2 , V 3 The first message sent arrives at the center of the circle O at time T at the same time, O(x 0 ,y 0 ) represents the coordinates of the center of the circle, and the second message arrives at O ​​simultaneously at time T', where T'=T+Δt, Δt=2r 0 / v,r 0 represents the radius of the circle of the target area, v represents the verifier sending the message at the speed of radio waves;

[0068] (4b) The distance between the verifier and the center of the circle O is different, and the message needs to reach the center of the circle at the same time, so the verifier V i The moment of sending the message is different, let V 1 , V 2 , V 3 The time to send the first message is T respectively 1 , T 2 , T 3 Indicate...

Embodiment 3

[0077] The device area verifiable security verification method against collusion attack is the same as that of Embodiment 1, wherein in step (5), the prover P receives all the verifiers V i The first message M sent i time t i , and the prover P receives all the validators V i The second message M sent i ' time t i ' is calculated as follows:

[0078] t 1 =T 1 +d 1 / v,t 1 '=t 1 +Δt;

[0079] t 2 =T 2 +d 2 / v,t 2 '=t 2 +Δt;

[0080] t 3 =T 3 +d 3 / v,t 3 '=t 3 +Δt;

[0081] d 1 , d 2 , d 3 represents the validator V 1 (x 1 ,y 1 ), V 2 (x 2 ,y 2 ), V 3 (x 3 ,y 3 ) is the distance from the prover P(x,y).

[0082] The first message and the second message sent by the verifier are sent in the form of broadcast. Because the prover is in the circular area, the prover can receive all the messages sent by each verifier. The time when the prover in the area receives each message is equal to the time when the verifier sends the message plus the time it take...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment area provable security verification method with resistance to collusion attack and mainly solves the problem of absence of a security verification method with areas as credential information in existing position-based cryptography technologies. The implementation scheme of the method comprises steps as follows: a provable security verification model is built, and a prover is located in a target area; verifiers select information sources and random series and share information with one another, and the verifiers replay information in a broadcasting manner; a metric value is generated by the prover, and a verification value is calculated, and position information of the prover is broadcasted; the verifiers verify correctness of the verification value, whether the position information of the prover is accepted is judged, if the verification value passes the verification, the position information of the prover is broadcasted, otherwise, the verification value does not pass the verification, that is, the position claimed by the prover is not in the area, and the verification is finished. According to the method, any prover in the target area can effectively resist the collusion attack of multiple opponents after verification, and the security verification of the position of the prover is realized. The method can be used for verifying whether the equipment, namely, the prover, is located in the target area.

Description

technical field [0001] The invention belongs to the technical field of network security, and mainly relates to area password verification, in particular to a device area verifiable security verification method against collusion attack, which can be used to verify whether a prover is in a designated area. Background technique [0002] With the development of mobile communication technology, network technology and surveying and mapping technology, location-related information value-added services have become an important part of modern geographic information, and gradually become one of the biggest growth points. Location information is increasingly showing its importance. There have been many services based on location information. With the development of GPS and wireless Internet access technology, the demand for location information services has shown a substantial growth trend. Therefore, many system designs now use participant location information. However, when the righ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/1441
Inventor 杜方琼张俊伟马建峰陈治平张元轶阙梦菲龙奔李晨
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products