An Authenticated Communication Method in Smart Homes Based on HLC and Hash Collision Puzzles

A communication method and smart home technology, applied in the field of authentication communication, can solve problems such as insufficient computing power of home smart devices, and achieve the effect of satisfying high efficiency

Active Publication Date: 2021-10-15
EAST CHINA NORMAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally speaking, servers and home gateways have sufficient capabilities to use complex secure communication protocols to protect the security of control commands sent by users, but the computing power of home smart devices is insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Authenticated Communication Method in Smart Homes Based on HLC and Hash Collision Puzzles
  • An Authenticated Communication Method in Smart Homes Based on HLC and Hash Collision Puzzles
  • An Authenticated Communication Method in Smart Homes Based on HLC and Hash Collision Puzzles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The authentication communication method in a smart home of the present invention includes the following entities: a user, a server, a home gateway, and a home smart device. Including the following steps:

[0057] (1) System settings

[0058] In the system setting stage, the trusted entity (TA) generates system parameters params, and sends them to the home gateway and home smart devices offline. The generated system parameters are used for subsequent mutual authentication between the home gateway and the home smart device. We assume that the home gateway is trusted, so we let the home gateway play the role of TA. The specific steps are as follows:

[0059] • Choose ε as the difficulty of the puzzle.

[0060] • Choose ΔT as an upper bound on the message round-trip time.

[0061] • Choose H(*) as the hash function, and the output of this function is k bits.

[0062] · Select m as the number of elements in the Nonce.

[0063] TA distributes params=(∈,ΔT,H(*),m) to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication protocol in a smart home based on HLC and hash collision puzzles. The protocol includes: system setting, command message initialization, and mutual authentication. Aiming at the problem that devices in smart homes may be tampered with and attacked by other malicious devices, this protocol proposes a smart home authentication protocol, which constructs a low-computational-cost protocol to resist attackers or malicious home smart devices. The invention satisfies the characteristics of high efficiency, robustness and the like.

Description

technical field [0001] The invention belongs to the fields of smart home and information security, and in particular relates to an authentication communication method in a smart home based on HLC and hash collision puzzles. Background technique [0002] A smart home is a home that incorporates advanced automation systems to provide residents with sophisticated monitoring and control over building functions. A smart home can control lighting, temperature, multimedia, windows and doors, and many other functions. Smart homes use home automation technology to provide homeowners with intelligent feedback and information by monitoring many aspects of the home. Due to the superiority of smart homes, the commercial market for smart homes is also growing. With the further advancement of the interconnection and interoperability of home smart products, more explosive products are expected to appear in the future, which will promote the stable development of the overall smart home mar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3297H04L63/0869H04L63/0876H04L63/0884H04L63/1441
Inventor 张磊黄志刚孟欣宇赵奕鸥
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products