Heterogeneous Internet of Things authentication method based on edge computing and Internet of Things security platform

A technology of edge computing and authentication method, applied in the direction of public key, electrical components, transmission system, etc. of secure communication, can solve the problems of difficult authentication method, increased authentication delay, increased core network load, etc., to achieve simple and efficient Identity authentication, realize anonymous identity authentication, realize the effect of cross-network security authentication

Active Publication Date: 2019-06-11
XIDIAN UNIV
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing technology 1 uses the design and implementation of the prototype IoT gateway framework, points out that integrating and integrating edge devices can provide authentication and privacy protection services for IoT terminals, but does not propose a specific security authentication scheme based on edge computing
[0008] (2) The identity authentication mechanism in the prior art two heterogeneous wireless sensor networks, this method is based on the ECC elliptic curve cryptosystem, realizes sensor node point-to-point communication, but this method fails to solve the authentication problem of massive Internet of Things terminals
[0010] The computing and storage resources of IoT terminals are limited, making it difficult to perform complex calculations; there are many types of terminals, and various communication technologies coexist, making it difficult to establish a unified authentication method; massive terminal nodes directly authenticate to the cloud, resulting in increased load on the core network, and authentication Latency increased significantly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous Internet of Things authentication method based on edge computing and Internet of Things security platform
  • Heterogeneous Internet of Things authentication method based on edge computing and Internet of Things security platform
  • Heterogeneous Internet of Things authentication method based on edge computing and Internet of Things security platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] Aiming at the deficiencies of the existing schemes, the present invention proposes a heterogeneous IoT authentication method based on edge computing. By deploying edge computing devices locally, the edge devices are used to manage massive IoT terminal node authentication, and generate authentication methods for heterogeneous IoT terminals. Unified virtual IPv6 address, using random numbers and hash values ​​to achieve efficient identity authentication between heterogeneous IoT terminals and gateways.

[0050] The application principle of the present invention will be described in detail below in conjunction with the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network security, and discloses a heterogeneous Internet of Things authentication method based on edge computing and an Internet of Things security platform. By deploying the edge server on the edge side and managing massive Internet of Things terminal authentication information by the edge server, the defects of an existing cloud-end-basedauthentication mechanism are overcome, the core network load is reduced, and the authentication efficiency is improved. The edge equipment generates a unified virtual IPv6 address for the heterogeneous network equipment according to the address information of the heterogeneous network equipment, so that the unified security authentication of the heterogeneous Internet of Things equipment is realized. And the lightweight and high efficiency of the authentication protocol are ensured by using the random number and the hash value. According to the Internet of Things authentication architecture based on edge computing provided by the invention, the authentication information of mass Internet of Things terminals is managed by the edge equipment, so that the core network load can be effectivelyreduced, and the authentication efficiency is improved. The identity authentication of the Internet of Things terminal is simply and efficiently realized by using the random number and the hash value,and the cross-network security authentication of the heterogeneous Internet of Things terminal is realized.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to an edge computing-based heterogeneous Internet of Things authentication method and an Internet of Things security platform. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: the Internet of Things aims to use radio frequency identification technology, wireless data communication technology, etc. to construct a physical Internet of real-time sharing of global item information. With the rapid development of the Internet of Things and the popularization of 4G / 5G wireless networks, the number of IoT devices and the amount of data generated have increased sharply. In the era of centralized big data processing centered on the cloud computing model, its key technologies have been unable to efficiently process the Internet of Things. The data generated by the equipment. For this reason, the edge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30
Inventor 裴庆祺吴卫马立川
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products