Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things multi-source cross composite authentication method based on block chain

An authentication method and blockchain technology, applied in the field of multi-source cross-composite authentication of the Internet of Things based on blockchain, can solve problems such as confusion, high cost, data permanence and security cannot be guaranteed, and achieve easy Effects of integration, reliable identification and authentication, protection of integrity and availability

Active Publication Date: 2019-07-05
ZHEJIANG GONGSHANG UNIVERSITY
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the limitations and heterogeneity of device resources, existing security solutions are not fully adapted to the IoT ecosystem
Existing technologies have the following problems: (1) usually require a security solution composed of multiple security technologies and solutions, which requires extremely high cost; (2) effective security solutions are usually centralized, such as public key infrastructure (PKI), which can cause huge scalability issues in environments consisting of thousands of nodes; (3) each use case applies different security solutions, architectures and deployments, and integration of new services and solutions During the process, it is easy to cause confusion
The invention application uses the Internet of Things management center for data encryption, data permanence and security cannot be guaranteed, and the problems of scalability and confusion caused by the above-mentioned multiple nodes cannot be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things multi-source cross composite authentication method based on block chain
  • Internet of Things multi-source cross composite authentication method based on block chain
  • Internet of Things multi-source cross composite authentication method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following are specific embodiments of the present invention and in conjunction with the accompanying drawings, the technical solutions of the present invention are further described, but the present invention is not limited to these embodiments.

[0037] Each device can only communicate with devices in the same area, and treats other devices outside the area as malicious devices. In these zones, all members can trust each other, while it is protected and inaccessible to non-member devices. In order to realize such a method, the present invention innovatively proposes to use the "bubble" analogy to build a safe virtual area based on the blockchain, relying on the public blockchain rather than the private blockchain that implements the smart contract, so that the IoT ecosystem is open to any User is open. Communications in IoT are considered transactions and must be verified by this blockchain to be considered. For example, if device A sends a message to device B, (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things multi-source cross composite authentication method based on a block chain, and belongs to the technical field of gateway security authentication. The method comprises the following steps: object initialization: initializing each equipment object and generating a private key / public key pair; a bubble creating step: the main server sends a bubble request; the block chain checks the uniqueness of the bubble request and the transaction is valid to create a bubble; the bubble is composed of a master controller and a follower. A follower association step: the blockchain verifies that the device object following relationship is unique and effective according to the smart contract, and associates the follower with the bubble. An access control step: carrying out access control on the equipment object and the transaction by the block chain, and carrying out control that the same bubble cannot be created, allowing the equipment object in the same bubble to exchange data, and not allowing the equipment object between different bubbles to exchange data. Reliable identification and authentication of equipment are ensured, and the integrity and availability of data are protected. The method is suitable for most Internet of Things scenes, and easy integration of new equipment, services and use cases is ensured.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security authentication, in particular to a block chain-based multi-source cross-composite authentication method for the Internet of Things. Background technique [0002] The Internet of Things (IOT) touches almost all areas of our daily life and is widely adopted in various fields such as medical care, military, agriculture, and smart cities. But the Internet of Things is extremely vulnerable, and security issues are a major obstacle to the mass adoption and deployment of the Internet of Things. Therefore, it becomes even more important to ensure that only authenticated and authorized users can access the massive amounts of data generated by a large number of devices. [0003] However, due to the limitations and heterogeneity of device resources, existing security solutions are not fully adapted to the IoT ecosystem. Existing technologies have the following problems: (1) usually requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06Q40/04H04L29/08
CPCG06Q40/04H04L9/321H04L9/3252H04L9/3263H04L63/0876H04L63/10H04L63/123H04L67/12
Inventor 胡笑梅琚春华鲍福光
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products