Privacy protection access control method in wireless sensor network supported by IP

A wireless sensor network and access control technology, applied in the field of Internet of Things security, can solve the problems of unusable security mechanism, privacy security threat of user data access, limited sensor resources, etc., to achieve flexible user revocation process and ensure unlinkability , the effect of ensuring anonymity

Active Publication Date: 2019-07-02
SOUTH CHINA UNIV OF TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The authentication and authorization process means that users need to provide identity-related information to the target service, which brings new security issues: user data access privacy
[0003] There are two main problems in the implementation of traditional access control schemes in wireless sensor networks: 1) Sensor resources are limited: sensors are subject to strict resource constraints in terms of computing power, storage capacity, and transport overhead. Complex security mechanisms cannot be used
2) Privacy leakage: The user's access behavior to sensor services may be closely related to the user's social work, preferences and other private information
However, this method completely entrusts the privacy and security of users to a third party. Once the third party is attacked and causes data leakage, the privacy and security of data access of all users will be threatened.
Blindly trusting third parties may lead to more serious consequences, such as third parties selling users' data access records privately, or handing them over to government agencies, and users' access trends and privacy preferences will be monitored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection access control method in wireless sensor network supported by IP
  • Privacy protection access control method in wireless sensor network supported by IP
  • Privacy protection access control method in wireless sensor network supported by IP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific implementation of the present invention will be further described below in conjunction with the accompanying drawings and examples, but the implementation and protection of the present invention are not limited thereto. It can be realized or understood with reference to the prior art.

[0026] Such as figure 1 , a privacy-preserving access control method in an IP-supported wireless sensor network, and its specific implementation steps are as follows.

[0027] Symbol Description:

[0028] U: Registered user of the wireless sensor network, has the right to access specific sensor nodes in the network

[0029] IK: Issuing key, which is used by the access control server to issue group membership certificates to registered users

[0030] OK: Open the key, which consists of two parts {ξ 1 , ξ 2}, which are generated by the access control server and the legal authority, respectively.

[0031] e X : the elliptic curve Diffie-Hellman private key of entity X (a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection access control method in a wireless sensor network supported by an IP. According to the method, a group signature technology is applied, system users are divided into different user groups according to different access authorities, the group users use group signatures for anonymous access to guarantee user data access privacy, and leakage of user behavior modes is prevented. According to the method, users are divided into different user groups according to different access authorities by utilizing a group signature technology, the group users generate group signatures for identity authentication, and anyone in a network can verify the correctness of the group signatures but cannot know the identities of the signers; the identity authentication and authorization process of the Hidra protocol is improved by utilizing a false ticket mechanism and a self-updating ticket mechanism, so that the unlinkability of a protocol message is ensured; the block chain technology is used for managing the group public key, so that the secret key management and Hidra protocol user revocation process is more flexible; a responsibility investigation mechanismis improved by utilizing a block chain technology, so that the responsibility investigation process is public and transparent, and possible responsibility investigation disputes are solved.

Description

technical field [0001] The invention belongs to the security field of the Internet of Things, and in particular relates to a privacy protection access control method in an IP-supported wireless sensor network. Background technique [0002] In recent years, thanks to the development of the 6LoWPAN standard, it has solved the problems that hinder the original combination of sensors and the Internet, truly realized the end-to-end communication between Internet users and nodes, and promoted the application of sensor networks. But at the same time, it also introduces a new security crisis. Attackers on the Internet can access sensor nodes more easily through global addressing. Due to the high vulnerability of the wireless sensor network itself, such as limited device resources and complex deployment environment, etc., it is easy to become the target of many security attacks or become a tool for hackers to launch security attacks (for example: Mira is composed of IoT devices. Bot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/04H04W84/18H04W12/041H04W12/08
CPCH04W12/06H04W12/04H04W84/18
Inventor 刘发贵唐阳雨
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products