Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things (IoT) cross-domain authentication system and method based on block chain

An authentication system and authentication method technology, which is applied in the field of Internet of Things security authentication, can solve problems such as unreadable authentication information, low authentication policy security, and tampered authentication strategy, so as to promote security and fully share and avoid single point Attack, Guaranteed non-tamperable effect

Active Publication Date: 2018-11-02
XIDIAN UNIV
View PDF8 Cites 59 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This centralized architecture of the authentication strategy has the following problems: (1) It is easy to cause a single point of failure, that is, if the central node fails or goes down, the authentication information will not be read
(2) The security of the authentication policy stored in the central node is low, that is, the authentication policy may be tampered with before the user authenticates
[0005] (2) The existing cross-domain authentication strategy centralized architecture is prone to single point of failure, that is, if the central node fails or goes down, the authentication information will not be read
[0006] (2) The existing cross-domain authentication strategy centralized architecture has the problem of low security of the authentication strategy stored in the central node, that is, the authentication strategy may be tampered with before the user authenticates

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things (IoT) cross-domain authentication system and method based on block chain
  • Internet of Things (IoT) cross-domain authentication system and method based on block chain
  • Internet of Things (IoT) cross-domain authentication system and method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] The invention aims to solve the technical problem that the existing cross-domain authentication system uses a centralized deployment method, which makes the system vulnerable to attacks and data tampering. By combining blockchain technology and using the confidentiality, integrity, and non-tampering characteristics of cryptography, a distributed cross-domain authentication system is realized, which promotes security authentication when accessing between domains of the Internet of Things.

[0039] Such as figure 1 As shown, the blockchain-based IoT cross-domain authentication system includes:

[0040] Network layer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of the Internet of Things (IoT) security authentication, and discloses an IoT cross-domain authentication system and an IoT cross-domain authentication method based on a block chain. The system comprises a network layer, a service layer and a user layer. The network layer is a block chain network, and is an allied block chain formed by each domain separately serving as a network node; the service layer is a distributed application intelligent contract developed based on a block chain network, and can execute a complex machine language; and the userlayer is based on a user interaction interface developed based on the node of each domain, for implementing binding of the authenticated domain and distribution of an authentication key. According tothe system and method provided by the invention, the cross-domain authentication system based on security of the block chain can be implemented, the distributed storage of authentication schemes is implemented, and the authentication schemes are recorded on the block chain in the form of an account book, so as to be unable to tamper.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security authentication, and in particular relates to a block chain-based Internet of Things cross-domain authentication system and method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the wide application of the Internet of Things in smart home, smart medical care, Internet of Vehicles and other industries, a large amount of Internet of Things data is generated. However, most of the data of the Internet of Things is currently concentrated in a central domain environment, and the data between various domains has no Interaction, the Internet of Things data has problems such as simplicity, isolation, dispersal, fragmentation, etc., and the data sharing between IoT domains has received more and more attention, and the demand for data security sharing between IoT domains is increasing . The traditional cross-domain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0807H04L67/1097H04L67/12
Inventor 沈玉龙郑佳伟邬俊杰郝飞扬胡晓康陈俊峰张立潘超杰常二慧马飞昊马冬洁
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products