Method and device for device identity authentication in machine-to-machine environment

A technology of device identity and machine environment, applied in the field of information security, to achieve good application prospects, ensure anti-attack, and improve the effect of information security

Active Publication Date: 2022-04-05
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the present invention provides a method and device for device identity authentication in a machine-to-machine environment, which can resist security issues such as test attacks on smart cards, pre-shared key leak attacks, session key leak attacks, and man-in-the-middle attacks. Improve the security of IoT data interaction process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for device identity authentication in machine-to-machine environment
  • Method and device for device identity authentication in machine-to-machine environment
  • Method and device for device identity authentication in machine-to-machine environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0028] For the situation that traditional identity authentication and key agreement protocols are not suitable for the Internet of Things environment, and traditional encryption methods and protocols are subject to specific constraints in the environment of the perception layer, the embodiments of the present invention, see figure 1 As shown, a method for device identity authentication in a machine-to-machine environment is provided, including the following content:

[0029] S101) In the initialization stage, the smart sensor device in the Internet of Things determines its own identity information, the authentication server and the router negotiate a pre-shared key, and at the same time, the smart card performs read an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and in particular relates to a device identity authentication method and device in a machine-to-machine environment. at the same time, the smart card performs read and write operations and opens up storage space; the smart sensor device completes the registration request to the authentication server through the smart card and uses its own identity information; the smart sensor device connected to the machine-to-machine communication environment reads the device through the smart card, And through the pre-shared key and mutual authentication and key negotiation between routers in the Internet of Things, in order to realize data interaction with other sensor devices in the Internet of Things. The invention can resist the test attack on the smart card, the pre-shared key disclosure attack, the session key disclosure attack and the man-in-the-middle attack, etc., effectively improves the security in the data interaction process of the Internet of Things, and has good application prospects.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a device identity authentication method and device in a machine-to-machine environment. Background technique [0002] Machine-to-machine (M2M) communication is a key technology for realizing the Industrial Internet of Things (IIoT). In M2M technology, all devices and machines can communicate with each other through a wireless network. M2M technology can generally provide data exchange between resource-constrained devices without human intervention. An important role of M2M is to enable real-time data communication between devices equipped with smart sensors and central management applications to collect important data transmitted from remote devices for its users. M2M technology has become more mobile and intelligent than ever since it is located within embedded cells via 3GPP technologies such as GSM / GPRS, UMTS / HSPA(+) and LTE networks. However, simil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/0431H04L9/32H04L9/40H04W12/069H04W12/122
CPCH04W4/70H04W60/00H04W12/48H04W12/69H04W12/122H04W12/069
Inventor 程庆丰孟良霖刘文芬丁文博李钰汀胡学先张军琪
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products