Two-factor authentication key agreement protocol suitable for multi-gateway wireless sensor network

A wireless sensor and two-factor authentication technology, which is applied in the field of user identity authentication and session key agreement agreement, can solve the problems of wireless sensor network and user threat, wireless sensor network security loopholes, authentication and key agreement agreement, etc.

Active Publication Date: 2019-09-13
BEIHANG UNIV
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At this stage, the authentication and key agreement protocol of wireless sensor network has been continuously proved to have different degrees of security loopholes.
And there are few authentication and key agreement protocols in the wireless sensor network designed based o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication key agreement protocol suitable for multi-gateway wireless sensor network
  • Two-factor authentication key agreement protocol suitable for multi-gateway wireless sensor network
  • Two-factor authentication key agreement protocol suitable for multi-gateway wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described below in conjunction with the accompanying drawings.

[0063] FIG. 1 is a communication model diagram of a multi-gateway wireless sensor network in the present invention. The multi-gateway communication model includes three types of entities, sensor nodes, gateway nodes and users. Gateway nodes are divided into home gateway nodes and external gateway nodes. For users and sensor nodes, the gateway nodes that are relatively close to them are called home gateway nodes, and the remaining gateway nodes are called external gateway nodes. After the sensor and gateway nodes are placed, they are static. In WSNs, the cost of sending and receiving messages increases with distance. Sensor nodes are characterized by low memory, low battery power, low bandwidth, and limited computing power. Gateway nodes have strong computing power. So we should reduce the computation of sensor nodes. Sensor nodes are used for data monitoring and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a double-factor authentication key agreement protocol suitable for a multi-gateway wireless sensor network. The protocol is divided into five stages: an initialization stage, aregistration stage, a login stage, an authentication stage and a key change stage. Fuzzy verification and honeywords methods are adopted in the user authentication part, so that the united password identity guessing attack based on the stolen intelligent card is effectively resisted. In the scheme, key negotiation is based on discrete elliptic curve encryption and can resist sensor capture attacks, so that the forward security of the protocol is ensured.

Description

technical field [0001] The invention belongs to the technical field of cryptographic protocols, and relates to a two-factor user identity authentication and session key negotiation protocol applicable to a multi-gateway wireless sensor network environment. Background technique [0002] Wireless sensor networks (Wireless Sensor Networks, WSN) monitor, perceive and collect information of various environments or monitoring objects in real time through various integrated micro-sensors collaboratively, and process the information through a random self-organizing wireless communication network to communicate in multiple ways. The jump relay method transmits the perceived information to the user terminal, so that the user can fully grasp the situation in the monitoring area and make a response. Due to the many types of sensors in wireless sensor networks, and the characteristics of economy and real-time, it has a wide range of applications. It can be used in military, medical, avi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/04H04W12/06H04W12/12H04W12/03H04W12/0431H04W12/122
CPCH04W12/009H04W12/61H04W12/72H04W12/0431H04W12/068H04W12/069H04W12/122
Inventor 郜雅郭华王如思陈晨
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products