Privacy-preserving access control methods in ip-supported wireless sensor networks

A wireless sensor network and access control technology, applied in the field of Internet of Things security, can solve the problems of unusable security mechanism, privacy security threat of user data access, limited sensor resources, etc., to achieve flexible user revocation process and ensure unlinkability , the effect of ensuring anonymity

Active Publication Date: 2022-07-26
SOUTH CHINA UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The authentication and authorization process means that users need to provide identity-related information to the target service, which brings new security issues: user data access privacy
[0003] There are two main problems in the implementation of traditional access control schemes in wireless sensor networks: 1) Sensor resources are limited: sensors are subject to strict resource constraints in terms of computing power, storage capacity, and transport overhead. Complex security mechanisms cannot be used
2) Privacy leakage: The user's access behavior to sensor services may be closely related to the user's social work, preferences and other private information
However, this method completely entrusts the privacy and security of users to a third party. Once the third party is attacked and causes data leakage, the privacy and security of data access of all users will be threatened.
Blindly trusting third parties may lead to more serious consequences, such as third parties selling users' data access records privately, or handing them over to government agencies, and users' access trends and privacy preferences will be monitored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-preserving access control methods in ip-supported wireless sensor networks
  • Privacy-preserving access control methods in ip-supported wireless sensor networks
  • Privacy-preserving access control methods in ip-supported wireless sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific implementation of the present invention will be further described below in conjunction with the accompanying drawings and embodiments, but the implementation and protection of the present invention are not limited to this. It can be realized or understood with reference to the prior art.

[0026] like figure 1 , a privacy protection access control method in a wireless sensor network supported by IP, the specific implementation steps are as follows.

[0027] Symbol Description:

[0028] U: A registered user of the wireless sensor network, with access to a specific sensor node in the network

[0029] IK: Issuing key, which is used by the access control server to issue group membership certificates to registered users

[0030] OK: Open the key, it contains two parts {ξ 1 , ξ 2 }, these two parts are generated by the access control server and the legal authority respectively.

[0031] e X : Elliptic curve Diffie-Hellman private key of entity X (access co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection access control method in a wireless sensor network supported by IP. The method applies group signature technology to divide system users into different user groups according to different access rights, and group users use group signatures for anonymous access to protect user data access privacy and prevent leakage of user behavior patterns. This method uses group signature technology to divide users into different user groups according to different access rights, and group users generate group signatures for identity authentication. Anyone in the network can verify the correctness of the group signature, but cannot know the identity of the signer; The fake ticket mechanism and the self-renewing ticket mechanism improve the identity authentication and authorization process of the Hidra protocol to ensure the unlinkability of the protocol messages; the use of blockchain technology to manage the group public key makes the key management and user revocation process of the Hidra protocol more efficient. Flexible; use blockchain technology to improve the accountability mechanism, make the accountability process open and transparent, and resolve possible accountability disputes.

Description

technical field [0001] The invention belongs to the security field of the Internet of Things, and in particular relates to a privacy protection access control method in a wireless sensor network supported by IP. Background technique [0002] In recent years, thanks to the development of the 6LoWPAN standard, the problem that hinders the native integration of sensors and the Internet has been solved, the end-to-end communication between Internet users and nodes has been truly realized, and the application of sensor networks has been promoted. But at the same time, it also introduces a new security crisis. Attackers on the Internet can more easily access sensor nodes through global addressing. Due to the high vulnerability of the wireless sensor network itself, such as limited equipment resources and complex deployment environment, it is easy to become the target of many security attacks or a tool for hackers to launch security attacks (for example: Mira is composed of IoT dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/04H04W84/18H04W12/041H04W12/08
CPCH04W12/06H04W12/04H04W84/18
Inventor 刘发贵唐阳雨
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products