A device authentication and key distribution system and method based on a physical unclonable function

A technology of key distribution and device authentication, which is applied in the field of lightweight cryptographic protocols and information security of the Internet of Things

Active Publication Date: 2019-05-21
南京浩天科技有限公司
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the industry's research on PUF mainly focuses on the physical construction method of PUF, error correction function optimization, etc., and most of the protocol design is aimed at simple two-party communication, but there are few research results on applying PUF to hierarchical and complex network topologies.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device authentication and key distribution system and method based on a physical unclonable function
  • A device authentication and key distribution system and method based on a physical unclonable function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0049] A device authentication and key distribution system based on a physical unclonable function of the present invention includes a server, a HUB, and a terminal device; the server is an authentication center and a key distribution center, and sends ciphertext instructions to the HUB and the terminal device, There is only one server in the network; the HUB is responsible for the networking and management of terminal devices. The HUB is installed with a PUF chip to perform two-way authentication and key distribution with the server and terminal devices. There are several HUBs in the network, and each HUB manages several terminal devices. The terminal device is installed with a PUF chip, and carries out two-way authentication and key distribution with the HUB and the server, can decrypt the ciphertext control instructions of the server and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment authentication and key distribution system and method based on a physical unclonable function. The system comprises a server, an HUB and terminal equipment, The method comprises the steps that before network deployment, manually registering all HUBs and terminal equipment on a server; Deploying network equipment according to the three-layer tree topology structure; carrying out identity authentication and key distribution between the devices, including authentication and key distribution between the server and the HUB and authentication and key distributionbetween the HUB and the terminal device. Based on the PUF, bidirectional authentication and key distribution among the server, the HUB and the terminal equipment can be realized. Different from a traditional secret key pre-storage mode and a public key mode, the method has the advantages that the PUF serves as an authentication factor and a secret key generator, secret key leakage can be prevented, the calculation amount can be reduced, and the method can be widely applied to low-energy-consumption Internet of Things equipment with limited resources.

Description

technical field [0001] The invention belongs to the technical field of lightweight cryptographic protocols and Internet of Things information security, and in particular relates to a device authentication and key distribution system and method based on physical unclonable functions. Background technique [0002] For resource-constrained devices, how to achieve safe and efficient authentication and key distribution, and how to propose a lightweight cryptographic protocol are key technical issues that need to be solved urgently, and are the key to personal privacy protection in the Internet of Things and big data era. important means of implementation. The traditional key distribution system based on public key infrastructure (Public Key Infrastructure, PKI) or digital certificate technology is not suitable for resource-constrained devices such as sensors, radio frequency identification, RFID (Radio Frequency Identification, RFID), and wearable devices. [0003] The emergence...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 柳亚男郭雨晨夏雨欣戴泽坤李晓蓉
Owner 南京浩天科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products