A sensor node identity authentication system and method based on the internet of things
A sensor node, identity authentication technology, applied in transmission systems, electrical components, etc., can solve the problems of inability to plug and play nodes, cost, reduce networking efficiency, etc., to ensure unique validity and legality, and simple authentication. , application prospects and the effect of high market value
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] See figure 1 , figure 1 A module block diagram of an IoT-based sensor node identity authentication system provided by an embodiment of the present invention, including an authentication server, a device management center, a security gateway, and at least one sensor node;
[0041] The sensor node is connected to the security gateway for sending authentication information to the security gateway;
[0042] The security gateway is connected to the authentication server, and is used to send the authentication information together with the gateway number to the authentication server;
[0043] As a security gateway connected to the platform in different scenarios in the common support platform of the Internet of Things, the security gateway is deployed in different scenarios as required. The security gateway has the authority to send and receive data to the sensor node. The sensor node is in The authentication process and the subsequent data interaction process all communica...
Embodiment 2
[0056] For the process of authenticating the identity of the sensor node by the authentication server, please refer to image 3 , image 3 A flow chart of an IoT-based sensor node identity authentication method provided by an embodiment of the present invention, including:
[0057] S1. Initialize the sensor node information list to be authenticated;
[0058] Among them, the system is initialized first, each sensor node to be authenticated and the security gateway used to transmit data are started, the authentication server initializes the sensor node information list, the device management center initializes and the list of security gateways and corresponding nodes, and the sensor node is initialized to ensure The sensor node confirms that the identity information stored in ciphertext is available, and the security gateway confirms that the security gateway number is available; the device management center confirms that the node information list is legally available, and that...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


