Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for anonymous user authentication in the Internet of Things based on crowd sensing based on chaotic maps

A technology of crowd sensing and user authentication, which is applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve the problems of high computing overhead or communication overhead, difficulty in resisting various typical attacks, etc., and reduce communication Comparing with computational overhead, the effect of good forward security

Active Publication Date: 2022-03-01
HEILONGJIANG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the problem that the existing user authentication method is difficult to resist a variety of typical attacks, and the calculation overhead or communication overhead is relatively large, and proposes an anonymous user authentication based on chaotic mapping based on crowd sensing Internet of Things method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for anonymous user authentication in the Internet of Things based on crowd sensing based on chaotic maps
  • A method for anonymous user authentication in the Internet of Things based on crowd sensing based on chaotic maps
  • A method for anonymous user authentication in the Internet of Things based on crowd sensing based on chaotic maps

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0024] Specific implementation mode 1: In this implementation mode, a method for anonymous user authentication of the Internet of Things based on crowd intelligence sensing based on chaotic mapping. The specific process is as follows:

[0025] 1 Mathematical model

[0026] The present invention establishes corresponding mathematical models for the one-way hash function, Chebyshev chaotic map and fuzzy extraction to be adopted in the proposed user authentication scheme.

[0027] 1.1 One-way hash function with anti-collision

[0028] One-way cryptographic hash function h:{0,1} * →{0,1} n , also known as one-way Hash function, hash function, is to input binary string q∈{0,1} of any length * Change into a fixed-length binary string, and the output string is called the hash value of the character. The anti-collision performance of the one-way hash function h( ) is as follows:

[0029] Definition 1 Collision resistance: The advantage probability that any attacker A has a collis...

specific Embodiment approach 2

[0070] Specific embodiment two: the difference between this embodiment and specific embodiment one is that the user is registered in the step one; the specific process is:

[0071] CMAUS first needs to be registered, and legal users can obtain their smart cards SC from the server S. u i Communication with S is carried out on a secure channel, the specific process is as follows figure 1 Shown:

[0072] Step 11. Any user U i Select user U i ID i , login password PW i , personal biometric B i and a 128-bit random number b;

[0073] Steps 1 and 2, using the probability generation process in fuzzy extraction, the user U i generating function (α i ,β i ) = Gen(B i ), for user U i ID i , login password PW i , personal biometric B i Encrypt with 128-bit random number b to obtain masked login password RPWi=h(h(ID i ||PW i )||α i ) and user U i The identity certificate C=h(h(ID i ||PW i ||b)||α i );

[0074] Among them, α i for user U i biometric private key, β ...

specific Embodiment approach 3

[0087] Specific embodiment three: the difference between this embodiment and specific embodiment one or two is that after the user registers in the step two, the user logs in; the specific process is:

[0088] User U i You need to log in to the system to access server S, the process is as follows:

[0089] Step 21. User U i Insert the smart card SC into the mobile client (such as mobile phone, computer, etc.), and enter the user U i ID i , login password PW i and personal biometric B' i ;

[0090] The user's smart card SC utilizes the stored β i , calculate α′ through deterministic recovery process i =Rep(B' i ,β i ), RPW′ i =h(h(ID i ||PW i )||α′ i ) and generate

[0091] In the formula, α' i is the personal biometric B' i private key, b' is the registration parameter to be verified; RPW' i is the masked login password;

[0092] Step 22. Based on step 1, the user's smart card SC calculates f' i =h(RPW' i ||b′), and verify f′ i = f i whether it is estab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authenticating anonymous users of the Internet of Things based on group intelligence sensing based on chaotic mapping. The invention relates to an authentication method for anonymous users of the Internet of Things based on group intelligence sensing. The purpose of the present invention is to solve the problem that the existing user authentication method is difficult to resist various typical attacks, and the calculation cost or communication cost is relatively large. The process is: 1. Register the user; 2. After the user registers, the user logs in; when the user logs in, if there is a smart card stealing attack in the network, then perform five; when the user logs in, if no For smart card attacks, execute step 3; step 3. After the user logs in, the user and the server perform two-way authentication, and establish a key between the user and the server. After the key is established, if the user needs to change the password, execute step 4; if the user does not need to change the password, end ; 4. The user changes the password; 5. Revokes the stolen smart card. The invention is used in the field of anonymous user authentication of the Internet of Things with crowd sensing.

Description

technical field [0001] The invention relates to a method for authenticating anonymous users of the Internet of Things through crowd sensing. Background technique [0002] Crowdsensing refers to the use of mobile phones, tablet computers, GPS and other mobile devices of ordinary users as the basic perception unit, through the mobile Internet to carry out conscious or unconscious collaboration, realize the distribution of perception tasks and the collection of perception data, and complete the large-scale and complex society. perception task. Crowdsensing gives full play to the characteristics of "many people are powerful", twisting a large number of ordinary users into one rope to form a perception system that is pervasive and closely related to people's lives anytime, anywhere. In crowd sensing, participants who complete complex sensing tasks do not need to have professional skills. A large number of ordinary users can become the backbone, and through reasonable cooperation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/0431H04W12/06H04W12/069H04L9/32H04L9/00H04W12/122
Inventor 秦丹阳马静雅郭若琳马宏斌王英丽
Owner HEILONGJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products