Universal authentication method for terminal equipment without identity in Internet-of-things

A terminal device, general authentication technology, applied in the field of information security, can solve the problems of privacy information leakage, low computational cost of symmetric encryption algorithm, protocol attack, etc., to achieve the effect of protecting identity information

Active Publication Date: 2019-01-08
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first type of authentication protocols use symmetric encryption algorithms because of the low computational cost of symmetric encryption algorithms. However, these protocols may be subject to man-in-the-middle attacks, and private information will inevitably be leaked; another disadvantage of these protocols is the inherent reliability of privacy protection. Scalability issues, this type of protocol is undoubtedly impractical
The second type of authentication protocol regularly updates the credentials of the terminal device, however, the strong identity of the terminal device can still be tracked during the validity period of the certificate; in addition, such protocols require each terminal device to store a large number of authentications and pseudonyms, which means that it is difficult to Remove compromised endpoints
The third type of authentication protocol uses a delegation-based mechanism. The advantage of this protocol is that it has low computational cost, but the disadvantage is that it cannot easily achieve the performance of private storage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal authentication method for terminal equipment without identity in Internet-of-things
  • Universal authentication method for terminal equipment without identity in Internet-of-things
  • Universal authentication method for terminal equipment without identity in Internet-of-things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings.

[0035] figure 1 It is a three-layer structural diagram of the Internet of Things in the present invention. Such as figure 1 As shown, the Internet of Things includes a three-layer structure, namely the physical layer, the edge layer and the cloud layer.

[0036] The first layer is the physical layer (Things Layer), used to collect data and control the physical world. Taking the smart home system as an example, assuming it is a physical layer, there are some terminal devices, such as heat detectors, cameras and smoke detectors, which have the ability to perceive the physical world and send key control commands. Most end devices in the physical layer are resource constrained, having as little as 64 bytes of memory and 2048 bytes of storage. Therefore, many conventional security mechanisms using asymmetric encryption algorithms are not suitable because they require hi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a universal authentication method for terminal equipment without identity in Internet-of-things, which is used for assisting the terminal equipment by introducing edge equipment, and delegates the authentication task to the edge equipment. The method includes a registration period, a session key generation phase, an instruction generation phase and an instruction verification and execution phase. The invention only according to the random identity of the terminal equipment, does not disclose any basic attribute thereof, protects the identity information of the equipmentwell, and realizes the function of privacy protection. Considering the limitation of computing power of Internet of Things devices, a lightweight authentication protocol based on hash chain technology is proposed for non-identifiable terminals.

Description

technical field [0001] The present invention is designed for an identity-less universal authentication method for terminal devices in the Internet of Things environment. The present invention is efficient and safe, can resist most traditional attacks, and can make up for the hardware limitations of terminal devices, and belongs to the field of information security. technical background [0002] The Internet of Things is constantly changing the way we live, work and learn. It can collect valuable data anytime and anywhere, and extract knowledge from the collected data to create a smarter world. However, while the Internet of Things brings many conveniences, it also brings many security problems. For example, the Internet of Things system collects a large amount of user information, which may lead to the leakage of user information. Personal information is sensitive information and user privacy. Protecting user privacy is an important issue nowadays. [0003] After research,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0866H04L9/0869H04L9/0877H04L9/3236H04L9/3247H04L9/3297H04L63/0407H04L63/08
Inventor 朱成亮谢豪王志伟许玉民
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products