anonymous user authentication method for a crowd sensing Internet of Things based on chaotic mapping

A technology of crowd sensing and user authentication, which is applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve the problems of high computing or communication overhead, difficulty in resisting various typical attacks, etc., and achieve the goal of resisting theft Take the effect of the attack

Active Publication Date: 2019-05-14
HEILONGJIANG UNIV
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the problem that the existing user authentication method is difficult to resist a variety of typical attacks, and the calcula

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • anonymous user authentication method for a crowd sensing Internet of Things based on chaotic mapping
  • anonymous user authentication method for a crowd sensing Internet of Things based on chaotic mapping
  • anonymous user authentication method for a crowd sensing Internet of Things based on chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0024] Specific implementation mode 1: In this implementation mode, a method for anonymous user authentication of the Internet of Things based on crowd intelligence sensing based on chaotic mapping. The specific process is as follows:

[0025] 1 Mathematical model

[0026] The present invention establishes corresponding mathematical models for the one-way hash function, Chebyshev chaotic map and fuzzy extraction to be adopted in the proposed user authentication scheme.

[0027] 1.1 One-way hash function with anti-collision

[0028] One-way cryptographic hash function h:{0,1} * →{0,1} n , also known as one-way Hash function, hash function, is to input binary string q∈{0,1} of any length * Change into a fixed-length binary string, and the output string is called the hash value of the character. The anti-collision performance of the one-way hash function h( ) is as follows:

[0029] Definition 1 Collision resistance: The advantage probability that any attacker A has a collis...

specific Embodiment approach 2

[0070] Specific embodiment two: the difference between this embodiment and specific embodiment one is that the user is registered in the step one; the specific process is:

[0071] CMAUS first needs to be registered, and legal users can obtain their smart cards SC from the server S. u i Communication with S is carried out on a secure channel, the specific process is as follows figure 1 Shown:

[0072] Step 11. Any user U i Select user U i ID i , login password PW i , personal biometric B i and a 128-bit random number b;

[0073] Steps 1 and 2, using the probability generation process in fuzzy extraction, the user U i generating function (α i ,β i ) = Gen(B i ), for user U i ID i , login password PW i , personal biometric B i Encrypt with 128-bit random number b to obtain masked login password RPWi=h(h(ID i ||PW i )||α i ) and user U i The identity certificate C=h(h(ID i ||PW i ||b)||α i );

[0074] Among them, α i for user U i biometric private key, β ...

specific Embodiment approach 3

[0087] Specific embodiment three: the difference between this embodiment and specific embodiment one or two is that after the user registers in the step two, the user logs in; the specific process is:

[0088] User U i You need to log in to the system to access server S, the process is as follows:

[0089] Step 21. User U i Insert the smart card SC into the mobile client (such as mobile phone, computer, etc.), and enter the user U i ID i , login password PW i and personal biometric B' i ;

[0090] The user's smart card SC utilizes the stored β i , calculate α′ through deterministic recovery process i =Rep(B' i ,β i ), RPW′ i =h(h(ID i ||PW i )||α′ i ) and generate

[0091] In the formula, α' i is the personal biometric B' i private key, b' is the registration parameter to be verified; RPW' i is the masked login password;

[0092] Step 22. Based on step 1, the user's smart card SC calculates f' i =h(RPW' i ||b′), and verify f′ i =f i whether it is establ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous user authentication method for a crowd sensing Internet of Things based on chaotic mapping, and relates to an anonymous user authentication method for the crowd sensing Internet of Things. The invention aims to solve the problems that the existing user authentication method is difficult to realize the resistance of various typical attacks and the calculation cost or the communication cost is relatively high. The method comprises the following steps: 1, a user is registered; 2, after the user is registered, the user logs in; When the user logs in, if the network is found to have an attack of stealing the smart card, the step 5 is executed; When the user logs in, if the network is not found to have the attack of stealing the smart card, executing the step3; 3, after the user logs in, the user and the server carry out bidirectional authentication, a secret key between the user and the server is established, and after the secret key is established, ifthe user needs to change the password, the step 4 is executed; If the user does not need to change the password, ending; 4, the user changes the password; And 5, the stolen smart card is removed. Themethod is applied to the field of crowd sensing internet of things anonymous user authentication.

Description

technical field [0001] The invention relates to a method for authenticating anonymous users of the Internet of Things through crowd sensing. Background technique [0002] Crowdsensing refers to the use of mobile phones, tablet computers, GPS and other mobile devices of ordinary users as the basic perception unit, through the mobile Internet to carry out conscious or unconscious collaboration, realize the distribution of perception tasks and the collection of perception data, and complete the large-scale and complex society. perception task. Crowdsensing gives full play to the characteristics of "many people are powerful", twisting a large number of ordinary users into one rope to form a perception system that is pervasive and closely related to people's lives anytime, anywhere. In crowd sensing, participants who complete complex sensing tasks do not need to have professional skills. A large number of ordinary users can become the backbone, and through reasonable cooperation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L9/32H04L9/00H04W12/122
Inventor 秦丹阳马静雅郭若琳马宏斌王英丽
Owner HEILONGJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products