Secure mutual authentication and key agreement protocol under Internet of Things environment

A technology of key negotiation and two-party authentication, applied to the public key of secure communication, secure communication device, and key distribution, it can solve problems such as low efficiency and dictionary attack, and achieve high performance and efficiency, high security The effect of reducing security risks

Inactive Publication Date: 2017-12-15
HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
View PDF7 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] So far, a large number of ECC-based authentication and key agreement protocols are based on passwords. Although these protocols protect information security, th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure mutual authentication and key agreement protocol under Internet of Things environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0025] Such as figure 1 As shown, a three-party password authentication and key agreement protocol based on a highly reliable smart card includes the following steps:

[0026] A. Registration stage: user to the server submit your own Information, registered as a legal user.

[0027] A1: User own sent to the server via a secure channel .

[0028] A2: server received by user After sending the message, choose a random number and key expiration time , and then use the private key calculate: , , , , . server storage to the database, and will send to user .

[0029] A3: User store received and own to the database.

[0030...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure mutual authentication and key agreement protocol under the Internet of Things environment. The secure mutual authentication and key agreement protocol comprises the following steps: step A, a registration phase: submitting own ID information to a server S by a user Ui, and registering to become a legal user; and step B, a login and authentication phase: performing two-way identity authentication and key agreement by the registered user Ui and the server S, and establishing a session key for the communication. The secure mutual authentication and key agreement protocol under the Internet of Things environment provided by the invention solves the unsafe problems of information leakage and stealing of the two communication parties in the Internet of Things communication, and has higher performance and efficiency in the similar security protocols. The invention adopts an elliptic curve cryptography algorithm, and realizes key negotiation and establishment with low consumption and high security on devices such as embedded devices and so on with limited computing power and storage resources.

Description

technical field [0001] The invention relates to a two-way authentication and key agreement agreement between a communication device and a server under the Internet of Things environment. Background technique [0002] With the vigorous development of the Internet of Things, more and more communication devices are connected to the network through wired or wireless methods to realize information exchange and resource sharing. However, these transmitted data are easily hijacked and tampered with by attackers. Once a security leak occurs, sensitive information such as user privacy cannot be guaranteed, which will cause great or even immeasurable losses to users. Therefore, information security in the Internet of Things environment has become an urgent need for people, and it is also a guarantee for the normal operation of almost all communications. [0003] Currently, embedded devices, wearable sensors, and RFID devices are widely used in fields such as healthcare, smart home, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L9/30H04L29/06
CPCH04L9/0847H04L9/0869H04L9/3066H04L9/3273H04L63/0869
Inventor 陈建铭吴祖扬项斌王景行
Owner HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products