Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain-based IoT device identity authentication method

An Internet of Things device and identity authentication technology, which is applied in the field of blockchain-based Internet of Things device identity authentication, can solve problems such as large computing overhead, key distribution, and key leakage, and achieve low overhead requirements, small computing overhead, and The effect of low storage overhead

Active Publication Date: 2021-11-23
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Symmetric key-based authentication needs to preset a shared symmetric key, and there are problems such as key distribution and key leakage; authentication based on public key infrastructure has a cumbersome certificate exchange process, and it also faces the possibility that the certificate authority may appear. In the case of a single point of failure; authentication based on identity codes requires complex calculations such as two-wire pairs, and the calculation overhead is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based IoT device identity authentication method
  • A blockchain-based IoT device identity authentication method
  • A blockchain-based IoT device identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments:

[0044] An identity authentication method based on the block chain based on the block chain, including:

[0045] Initialization phase: Select multiple block chain networks to build a block chain network;

[0046] Registration Stage: Store the identity and public key pair of the Internet of Things devices in the block chain to complete the Internet device registration;

[0047] Authentication phase: The block link node is authenticated according to the stored public key Pk.

[0048] figure 1 A schematic diagram of the system model in the present invention. The block chain node in the system model can be actually acting as a host, server, etc., which is considered to be powerful, and is always secure, the block chain in the present invention is a league chain. The system model running process is: generates information such as the Internet of Things d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for authenticating the identity of an Internet of Things device based on a block chain, belonging to the field of the Internet of Things. This method adopts emerging blockchain technology to build an identity authentication alliance blockchain suitable for IoT devices, and stores the IoT device identification and public key pair (ID, PK) in the form of blockchain transactions in the registration phase. In the block chain, the public key PK at the time of registration is used to authenticate the IoT device identification ID in the authentication phase. The present invention can not only reduce the authentication process, improve the authentication efficiency, and has lower overhead requirements for IoT devices, but also does not depend on a specific third-party organization, ensuring the identity and public key pair (ID, PK). Tampering, traceability.

Description

Technical field [0001] The present invention relates to the field of Internet of Things, in particular, to a block-based network-based network-based identity authentication method. Background technique [0002] The block chain is a combination of data blocks into a specific data structure in a chain in order, and uses cryptographic methods to ensure that data is not tamper and unable to detritionally-depth share, it is possible to securely store simple. There is a relationship, the data information that can be verified. Block chain technology utilizes the encrypted chain block structure to verify and store data, and utilize distributed node consensus algorithms to generate and update data. [0003] IoT device identity authentication refers to identification of the identification of these devices to identify identification of these devices to confirm its legitimacy. Equipment certification is the first step in the safety of the Internet. For legal equipment, the identity authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/1097H04L67/12
Inventor 王浩王桥骆迪王平
Owner CHONGQING UNIV OF POSTS & TELECOMM
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More