A wireless security authentication method based on a block chain technology

A wireless security and authentication method technology, applied in the field of information security, can solve the problems of large amount of hash calculation, inability to resist internal attacks, users can not freely choose passwords, etc., to achieve the effect of reducing overhead

Active Publication Date: 2019-02-19
NANTONG UNIVERSITY
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In 1981, Lamport first proposed a password authentication scheme, which solved the security problem of communication in an insecure channel. However, this scheme has some disadvantages: (1) It cannot resist replay attacks; (2) The calculation amount of Hash is relatively large. Big
In 2011, Khan et al. analyzed the scheme of Wang et al., and found that users cannot choose passwords freely, smart cards cannot be logged out after being stolen or lost, and cannot resist internal attacks.
[0006] Aiming at the security problems existing in traditional identity authentication, the present invention proposes a wireless security authentication method based on block chain technology. Since block chain has the advantages of decentralization, point-to-point transmission, consensus mechanism and cryptography technology, it can ensure user information storage In the blockchain distributed ledger, it will not be tampered with or lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless security authentication method based on a block chain technology
  • A wireless security authentication method based on a block chain technology
  • A wireless security authentication method based on a block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Table 1 Scheme symbol meaning

[0030]

[0031] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0032] A wireless security authentication method based on blockchain technology, including a registration stage and a login authentication stage.

[0033] Such as figure 1 As shown, the specific steps of the user in the registration phase are as follows:

[0034] Step1: User U i Enter your username ID i , password PW iThe registration operation R is performed with the random number n (when the user performs the registration operation, the random number is automatically assigned), and is transmitted to the blockchain server S through a secure channel.

[0035]

[0036] Step2: The blockchain server S receives the information sent by the user, uses the random private key generation function Gen() to process the input random number, and generates the private key K s , use the private key to generate the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless security authentication method based on a block chain technology, which utilizes a consensus mechanism combining workload proof and longest chain extension to recorduser information generation transactions in a non-tamper and decentralized block chain account book, and designs user registration phase and user login and authentication phase protocols respectively. Distributed Denial of Service (DDoS) attacks and other common attacks can be effectively avoided, so that users can safely identify network equipment in the wireless network environment, and not beattacked by malicious users. And use less computation, can effectively reduce the cost of computing overhead.

Description

technical field [0001] The present invention relates to information security technology, in particular to a wireless security authentication method based on block chain technology. Background technique [0002] With the rapid development of information security technology and wireless network equipment, users can freely access the network through wireless network equipment. However, with the openness of wireless networks, the network environment is full of uncertainties, and insecure factors such as various network attacks and camouflage methods also follow. Network security issues are getting more and more attention. The first line of defense to ensure network communication and data security is to be able to accurately identify users among many wireless network devices. Identity authentication is the basis of information security in network systems. [0003] In 1981, Lamport first proposed a password authentication scheme, which solved the security problem of communicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/64G06Q40/04
CPCG06F21/45G06F21/64G06Q40/04
Inventor 王杰华胡兆鹏朱晓辉高瞻邵浩然
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products