Check patentability & draft patents in minutes with Patsnap Eureka AI!

Identity authentication method for IoT devices based on physical unclonable functions

An Internet of Things device and identity authentication technology, which is applied in the field of Internet of Things device identity authentication, can solve complex Internet of Things security issues and other issues

Active Publication Date: 2021-03-30
BEIHANG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Security issues in the Internet of Things will be more complex than traditional Internet network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for IoT devices based on physical unclonable functions
  • Identity authentication method for IoT devices based on physical unclonable functions
  • Identity authentication method for IoT devices based on physical unclonable functions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0046] 1. PUF model

[0047] (1) PUF prediction and response game

[0048] As in previous PUF literature, we made a standard assumption that without a physical device, the behavior of PUFs is unpredictable. Order U κ means from {0,1} κ A randomly selected set of strings. Let PUF be a function at length κ 1 Generates a length κ on the input 2 of skewers. Before giving the definition, let us first define the following PUF prediction response game (as figure 2 ):

[0049] Phase 1: Adversary c for any choice i , where challenge set is all challenge spaces A proper subset of , the request gets the PUF response r i .

[0050] Phase 2: PUF device will respond return to

[0051] Phase Three - Challenges: Choose a challenge c that has not been queried so far, i.e. Devices not allowed The PUF submits a query to challeng...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an IoT device identity authentication method based on a physical unclonable function. In combination with the property characteristic of the physical unclonable function and zero-knowledge proof contents, the method can be used for identity authentication of multiple devices and users themselves in an IoT network, and belongs to the field of IoT security in information security. In the authentication method, four entities, namely a server, a user, an access device and an accessed device, are included; the authentication method has the main contents as follows: in a registration stage, the server needs to store a response value and a user password for a special challenge in the power form of a discrete logarithmic group generator, so that device registration is carried out; in an authentication stage, the server sends the registered challenge to perform secondary response; at this time, the access device and the device as the whole perform zero-knowledge proof with the user and the server; simultaneously, the access device, the device and the server perform another zero-knowledge proof; and identity authentication of the user, and initial authentication andfinal authentication of the validity of the access device and the device are completed to the server.

Description

technical field [0001] The invention relates to an identity authentication method for an Internet of Things device based on a physically unclonable function, which can be used for identity authentication of multiple devices and users in an Internet of Things network, and belongs to the Internet of Things security field in information security. Background technique [0002] In the era of the convergence of big data and the Internet of Things, the Internet of Things (IoT), as the expansion and extension of the Internet, establishes communication between things. The Internet of Things is a network with "things" as its data source. With the development of various sensing devices and information technologies, the coverage of the Internet of Things is becoming wider and wider. The sensing layer of the Internet of Things contributes more and more information sources and destinations to the entire information network. The amount of data is also expanding, and it is surpassing the I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/00H04L29/06
CPCH04L9/002H04L9/3213H04L9/3221H04L9/3278H04L63/0876H04L63/101
Inventor 关振宇秦煜瑶刘建伟李云浩赵莹
Owner BEIHANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More