Unlock instant, AI-driven research and patent intelligence for your innovation.

A sensor node identity authentication system and method based on the internet of things

A sensor node, identity authentication technology, applied in transmission systems, electrical components, etc., can solve the problems of inability to plug and play nodes, cost, reduce networking efficiency, etc., to ensure unique validity and legality, and simple authentication. , application prospects and the effect of high market value

Active Publication Date: 2020-12-15
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing sensor node authentication methods cannot provide a large number of nodes for plug-and-play without additional allocation of identity authentication methods, which fail to provide identity authentication based on the characteristics of the nodes themselves. , requires manual operation and intervention, and takes a lot of networking time, which greatly reduces the working efficiency of the networking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A sensor node identity authentication system and method based on the internet of things
  • A sensor node identity authentication system and method based on the internet of things
  • A sensor node identity authentication system and method based on the internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] See figure 1 , figure 1 A module block diagram of an IoT-based sensor node identity authentication system provided by an embodiment of the present invention, including an authentication server, a device management center, a security gateway, and at least one sensor node;

[0041] The sensor node is connected to the security gateway for sending authentication information to the security gateway;

[0042] The security gateway is connected to the authentication server, and is used to send the authentication information together with the gateway number to the authentication server;

[0043] As a security gateway connected to the platform in different scenarios in the common support platform of the Internet of Things, the security gateway is deployed in different scenarios as required. The security gateway has the authority to send and receive data to the sensor node. The sensor node is in The authentication process and the subsequent data interaction process all communica...

Embodiment 2

[0056] For the process of authenticating the identity of the sensor node by the authentication server, please refer to image 3 , image 3 A flow chart of an IoT-based sensor node identity authentication method provided by an embodiment of the present invention, including:

[0057] S1. Initialize the sensor node information list to be authenticated;

[0058] Among them, the system is initialized first, each sensor node to be authenticated and the security gateway used to transmit data are started, the authentication server initializes the sensor node information list, the device management center initializes and the list of security gateways and corresponding nodes, and the sensor node is initialized to ensure The sensor node confirms that the identity information stored in ciphertext is available, and the security gateway confirms that the security gateway number is available; the device management center confirms that the node information list is legally available, and that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensor node identity authentication system based on the Internet of things, which comprises an authentication server, an equipment management center, a security gateway and at least one sensor node, wherein the sensor node is connected to the security gateway and used for transmitting authentication information to the security gateway; the security gateway is connected tothe authentication server and used for transmitting the authentication information and the gateway number to the authentication server; and the authentication server is connected to the equipment management center and used for performing authentication on the authentication information, generating an identity token after completing the authentication, returning the identity token back to the sensor node and storing the authenticated sensor node into the equipment management center. Furthermore, the invention further discloses a sensor node identity authentication method based on the Internetof things so as to ensure bidirectional authentication between the sensor node and the Internet of things common support platform. In addition, the authentication efficiency of the sensor node is improved, and the networking time of the Internet of things is reduced.

Description

technical field [0001] The invention belongs to the field of the Internet of Things and information security, and specifically relates to a sensor node identity authentication system and method based on the Internet of Things. Under the common support platform of the Internet of Things, for the authentication of the legality of a newly connected sensor node identity, the sensor node is guaranteed Node data and state security. Background technique [0002] In the Internet of Things environment, things are interconnected and information is exchanged, and sensor nodes also have the ability to receive, transmit, and process data and commands. However, due to the high security requirements of the data transmitted in the Internet of Things, the identity of sensor nodes, one of the most important components of the Internet of Things, needs to be effectively authenticated when accessing the common supporting platform of the Internet of Things. Without secure identity authentication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0478H04L63/0807H04L63/108H04L67/12
Inventor 沈玉龙刘佳邬俊杰郝飞扬潘超杰常二慧张立
Owner XIDIAN UNIV