Wireless Mesh network identity authentication method based on blockchain

An authentication method and network identity technology, applied in the field of wireless Mesh network identity authentication based on blockchain, can solve the problem of low security of identity authentication, and achieve the effect of ensuring uniqueness, not easy to be tampered with, and reducing interaction

Active Publication Date: 2018-11-13
XIDIAN UNIV
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to overcome the defects in the above-mentioned prior art, and propose a blockchain-based wireless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless Mesh network identity authentication method based on blockchain
  • Wireless Mesh network identity authentication method based on blockchain
  • Wireless Mesh network identity authentication method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0035] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the drawings and specific embodiments.

[0036] Reference figure 1 The wireless Mesh network to which the present invention is applicable includes user nodes and verification nodes. In this embodiment, there is 1 trusted third-party authentication node, 5 user nodes and 3 verification nodes. All user nodes are mobile and can dynamically maintain contact with other user nodes. User nodes join the network after being confirmed by a trusted third-party certification center. Distributed verification nodes are all user nodes that pass the block. The POW consensus mechanism of the chain determines that all user node digital certificates are stored on the verification node to verify data transactions between user nodes. After the transaction is over, the HASH value and timestamp of all transaction da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a wireless Mesh network identity authentication method based on blockchain. The method comprises the following steps: registering with a trusted third party certification authority by a user and obtaining a digital certificate; adding a registered user to a wireless Mesh network as a user node, selecting a certain number of distributed verification nodes, broadcasting the digital certificate to the verification nodes and storing the digital certificate on the blockchain of the verification nodes; broadcasting information stored on the own blockchain of each verificationnode to all user nodes; encrypting and transmitting information between the user nodes through a public key system; after the transaction is completed, broadcasting HASH values of transaction data tothe distributed verification nodes by the user nodes; adding timestamps to the HASH values by each distributed verification node, obtaining transaction information, and saving the transaction information on the blockchain of each distributed verification node. According to the wireless Mesh network identity authentication method based on the blockchain provided by the invention, the digital certificate and the transaction information are stored on the blockchain, so that information leakage and Internet fraud are effectively solved, and the data security is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and relates to a wireless Mesh network identity authentication method, in particular to a block chain-based wireless Mesh network identity authentication method, which can be used to optimize the security performance of identity authentication in the wireless Mesh network. Background technique [0002] Identity authentication, also known as "identity verification" or "identity authentication", refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, and then make the computer And network system access policies can be implemented reliably and effectively, preventing attackers from posing as legitimate users to gain access to resources, ensuring the security of systems and data, and the legitimate interests of authorized visitors. [0003] The wire...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L29/06H04L9/32H04W12/02H04W12/069
CPCH04L9/3263H04L63/0823H04W12/06H04L63/0442H04L9/3236H04L9/3239H04L9/3249H04L9/3247H04W12/02
Inventor 刘乃安周坤谢江涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products