Unlock instant, AI-driven research and patent intelligence for your innovation.

A Lightweight Proof Method for Scalable IoT Devices

An IoT device, lightweight technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problems of high memory occupation and power consumption, low-end embedded devices and expensive public key encryption, etc., to achieve overhead The effect of low and good application value

Active Publication Date: 2021-06-01
HANGZHOU VOCATIONAL & TECHN COLLEGE
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But DARPA is not suitable for low-end embedded devices and public key encryption is expensive; and SCAPI must rely on some hard assumptions (such as requiring half of the devices in the network to be uncompromising), and the memory usage and power consumption are extremely high due to the discovery and exchange of many channel keys.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lightweight Proof Method for Scalable IoT Devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail in conjunction with the accompanying drawings and specific embodiments.

[0022] A scalable lightweight proof method for IoT devices such as figure 1 shown, including the following specific steps:

[0023] 1) Verifier settings, including: the verifier V first randomly selects the last key K j to generate a one-way keystring of length j, and use K 0 Initialize the device as the commitment key and use K 0 Execute F recursively to verify all other keys in the keychain. Press K for the rest of the keys 1 to K j The sequence of is used as a session key to authenticate packets exchanged during the attestation phase. The validator V then divides time into discrete time intervals, one of which has a maximum duration T a Should not last longer than the overall physical attack time T t. Each time interval is divided into a number of unequal discrete time subintervals. The present invention assumes four non-overla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A scalable lightweight proof method for IoT devices, including the following specific steps: validator setup, using K 0 Initialize the device as a commitment key and perform recursive verification of other keys; prover initialization, each prover P is initialized with public and private values, and each verifier V is related by two devices for authentication and software integrity Key initialization; start remote attestation, verifier V generates a new random value Nnew and creates attestation request (Attest req ); key leak, verifier V broadcasts the verification key to all nearby provers P; authentication report, each verifier V checks whether its cluster ID is included in the second list in the attestation request (A calc ); physical and remote attack detection to detect remotely compromised devices through the aggregation of failure-to-participate attestation reports. The invention reduces runtime overhead and memory footprint, and can be used in both static and dynamic networks consisting of thousands of heterogeneous IoT devices.

Description

technical field [0001] The invention relates to a scalable lightweight certification method for IoT devices. [0002] technical background [0003] Contemporary IoT applications are distributed in nature, embedded in widely deployed heterogeneous computing devices forming large mesh networks or swarm physics. Modern IoT devices create a huge new attack surface as they routinely deal with privacy-sensitive issues and perform security-critical tasks. Remote attestation detects cyber threats by remotely verifying the internal state of network-embedded devices by trusted entities, and is used to reveal the misbehavior of network protocols and IoT devices. At present, the popular DARPA and SCAPI proof methods all consider long-range physical attacks. But DARPA is not suitable for low-end embedded devices and public key encryption is expensive; and SCAPI must rely on some hard assumptions (such as requiring half of the devices in the network to be uncompromising), and the memory ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0861H04L9/0869H04L63/0435H04L63/1441H04L67/12
Inventor 袁江军王杰车菊燕邵睿智
Owner HANGZHOU VOCATIONAL & TECHN COLLEGE