Heterogeneous IoT Authentication Method and IoT Security Platform Based on Edge Computing
An edge computing and authentication method technology, applied in the direction of public keys, transmission systems, electrical components, etc. of secure communication, can solve problems such as increased authentication delay, difficult authentication methods, and increased core network load to achieve anonymity Identity authentication, simple and efficient identity authentication, and the effect of cross-network security authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0049] Aiming at the deficiencies of the existing schemes, the present invention proposes a heterogeneous IoT authentication method based on edge computing. By deploying edge computing devices locally, the edge devices are used to manage massive IoT terminal node authentication, and generate authentication methods for heterogeneous IoT terminals. Unified virtual IPv6 address, using random numbers and hash values to achieve efficient identity authentication between heterogeneous IoT terminals and gateways.
[0050] The application principle of the present invention will be described in detail below in conjunction with the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


