Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A two-factor authentication key agreement protocol for multi-gateway wireless sensor networks

A wireless sensor and two-factor authentication technology, applied in the field of user identity authentication and session key agreement agreement, can solve the problems of wireless sensor network and user threats, few authentication and key agreement agreements, wireless sensor network security loopholes, etc., to achieve Effect of untraceability protection, anonymity protection, and high security performance

Active Publication Date: 2022-06-17
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At this stage, the authentication and key agreement protocol of wireless sensor network has been continuously proved to have different degrees of security loopholes.
And there are few authentication and key agreement protocols in the wireless sensor network designed based on the multi-gateway communication model.
Once the attacker exploits the loopholes in the authentication protocol to steal the data of the wireless sensor network nodes and intercept the user's private information, it will pose a huge threat to the wireless sensor network and users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-factor authentication key agreement protocol for multi-gateway wireless sensor networks
  • A two-factor authentication key agreement protocol for multi-gateway wireless sensor networks
  • A two-factor authentication key agreement protocol for multi-gateway wireless sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further described below in conjunction with the accompanying drawings.

[0064] FIG. 1 is a communication model diagram of a multi-gateway wireless sensor network in the present invention. The multi-gateway communication model includes three types of entities, sensor nodes, gateway nodes and users. Gateway nodes are divided into home gateway nodes and external gateway nodes. For users and sensor nodes, the gateway nodes that are relatively close to them are called home gateway nodes, and the rest of the gateway nodes are called external gateway nodes. After the sensors and gateway nodes are placed, they are stationary. In wsn, the cost of sending and receiving messages increases with distance. Sensor nodes have the characteristics of low memory, low battery power, low bandwidth, and limited computing power. The gateway node has strong computing power. So we should reduce the computational load of sensor nodes. Sensor nodes are used fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a two-factor authentication key negotiation protocol suitable for multi-gateway wireless sensor networks. The present invention is divided into five stages: initialization stage, registration stage, login stage, authentication stage and key change stage. In the part of user authentication, fuzzy verification and honeywords are used to effectively resist the combined password identity guessing attack based on stolen smart cards. In this scheme, key agreement is based on discrete elliptic curve encryption, which can resist sensor capture attacks and ensure the forward security of the protocol.

Description

technical field [0001] The invention belongs to the technical field of cryptographic protocols, and relates to a two-factor user identity authentication and session key negotiation protocol suitable for a multi-gateway wireless sensor network environment. Background technique [0002] Wireless Sensor Networks (WSN) cooperatively monitors, perceives and collects information of various environments or monitoring objects in real time through various integrated micro-sensors, and processes the information through random self-organizing wireless communication networks. The skip relay mode transmits the sensed information to the user terminal, so that the user can fully grasp the situation of the monitoring area and make a response. Due to the many types of wireless sensor network sensors, and their economical and real-time characteristics, they have a wide range of applications. It can be used in military, medical, aviation, home, environment and other fields. The security issu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/61H04W12/72H04W12/0431H04W12/06H04W12/069H04W12/122H04W12/00H04W12/03
CPCH04W12/009H04W12/61H04W12/72H04W12/0431H04W12/068H04W12/069H04W12/122
Inventor 郜雅郭华王如思陈晨
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products