Unlock instant, AI-driven research and patent intelligence for your innovation.

A blockchain-based multi-source cross-composite authentication method for the Internet of Things

An authentication method and block chain technology, applied in the field of multi-source cross-composite authentication of the Internet of Things based on block chain, can solve problems such as easy to cause confusion, data permanence and security cannot be guaranteed, high cost, etc., and achieve reliable Identification and authentication, protection of integrity and availability, effects of easy integration

Active Publication Date: 2021-07-16
ZHEJIANG GONGSHANG UNIVERSITY
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the limitations and heterogeneity of device resources, existing security solutions are not fully adapted to the IoT ecosystem
Existing technologies have the following problems: (1) usually require a security solution composed of multiple security technologies and solutions, which requires extremely high cost; (2) effective security solutions are usually centralized, such as public key infrastructure (PKI), which can cause huge scalability issues in environments consisting of thousands of nodes; (3) each use case applies different security solutions, architectures and deployments, and integration of new services and solutions During the process, it is easy to cause confusion
The invention application uses the Internet of Things management center for data encryption, data permanence and security cannot be guaranteed, and the problems of scalability and confusion caused by the above-mentioned multiple nodes cannot be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based multi-source cross-composite authentication method for the Internet of Things
  • A blockchain-based multi-source cross-composite authentication method for the Internet of Things
  • A blockchain-based multi-source cross-composite authentication method for the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following are specific embodiments of the present invention and in conjunction with the accompanying drawings, the technical solutions of the present invention are further described, but the present invention is not limited to these embodiments.

[0037] Each device can only communicate with devices in the same area, and treats other devices outside the area as malicious devices. In these zones, all members can trust each other, while it is protected and inaccessible to non-member devices. In order to realize such a method, the present invention innovatively proposes to use the "bubble" analogy to build a safe virtual area based on the blockchain, relying on the public blockchain rather than the private blockchain that implements the smart contract, so that the IoT ecosystem is open to any User is open. Communications in IoT are considered transactions and must be verified by this blockchain to be considered. For example, if device A sends a message to device B, (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain-based multi-source cross-composite authentication method for the Internet of Things, which belongs to the technical field of gateway security authentication. The method includes: object initialization step: initialize each device object and generate a private key / public key pair; bubble creation step: the master server sends a bubble request; the blockchain checks that the bubble request is unique and the transaction is valid, and creates a bubble; the bubble is created by the master Follower association steps: the block chain verifies that the following relationship of the device object is uniquely valid according to the smart contract, and associates the follower with the bubble; access control step: the block chain performs access control on the device object and transaction, and implementation cannot A control that creates the same bubble, allows device objects within the same bubble to exchange data, and does not allow device objects between different bubbles to exchange data. The invention ensures reliable identification and authentication of equipment, and protects data integrity and availability. It is suitable for most IoT scenarios, ensuring easy integration of new devices, services and use cases.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security authentication, in particular to a block chain-based multi-source cross-composite authentication method for the Internet of Things. Background technique [0002] The Internet of Things (IOT) touches almost all areas of our daily life and is widely adopted in various fields such as medical care, military, agriculture, and smart cities. But the Internet of Things is extremely vulnerable, and security issues are a major obstacle to the mass adoption and deployment of the Internet of Things. Therefore, it becomes even more important to ensure that only authenticated and authorized users can access the massive amounts of data generated by a large number of devices. [0003] However, due to the limitations and heterogeneity of device resources, existing security solutions are not fully adapted to the IoT ecosystem. Existing technologies have the following problems: (1) usually requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06Q40/04H04L29/08
CPCG06Q40/04H04L9/321H04L9/3252H04L9/3263H04L63/0876H04L63/10H04L63/123H04L67/12
Inventor 胡笑梅琚春华鲍福光
Owner ZHEJIANG GONGSHANG UNIVERSITY