Safe and reliable communication method based on group authentication in smart home environment

A smart home and communication method technology, applied to secure communication devices and key distribution, can solve problems such as high computing overhead, sensitive data easily leaked, and weak confidentiality of communication data

Active Publication Date: 2020-05-01
NANJING UNIV OF INFORMATION SCI & TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Each smart device needs to be authenticated one-to-one with the home gateway. When a large number of smart devices request authentication from the home gateway at the same time in a short period of time, authentication delays will occur
[0008]2) The calculation overhead and communication overhead of the scheme are relatively large
Most of the existing schemes use public key encryption operations, dot multiplication or exponential calculation in the addition group, and the calculation cost is relatively large
[0009]3) The confidentiality of communication data is weak
In a smart home system, user data (such as electricity consumption records, behavior information, etc.) is collected by smart devices and sent to the home gateway. Due to the openness of wireless communication channels, these sensitive data are easily leaked
[0010]4) Leakage of identity and privacy of smart devices
If the identity information of the smart device is transmitted in an unencrypted form in an insecure communication channel, malicious attackers in the channel may eavesdrop, intercept or tamper with the identity information, further perform simulated attacks, and obtain the gateway's private information and user's private data, thereby compromising the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and reliable communication method based on group authentication in smart home environment
  • Safe and reliable communication method based on group authentication in smart home environment
  • Safe and reliable communication method based on group authentication in smart home environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to better understand the technical content of the present invention, specific embodiments are given together with the attached drawings for description as follows.

[0075] Aspects of the invention are described in this disclosure with reference to the accompanying drawings, which show a number of illustrated embodiments. Embodiments of the present disclosure are not necessarily defined to include all aspects of the present invention. It should be appreciated that the various concepts and embodiments described above, as well as those described in more detail below, can be implemented in any of numerous ways, since the concepts and embodiments disclosed herein are not limited to any implementation. In addition, some aspects of the present disclosure may be used alone or in any suitable combination with other aspects of the present disclosure.

[0076] combine figure 1 , the present invention refers to a safe and reliable communication method based on group a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and reliable communication method based on group authentication in a smart home environment. An authentication process is divided into three stages, in the equipment initialization and registration stage, newly added gateway equipment initialization work and registration work of a group of smart home equipment are completed, in the authentication and key negotiationstage, mutual identity authentication of the gateway and the same group of smart equipment is completed, and a session key is generated between each piece of smart equipment and the gateway and used for encrypting and decrypting transmission data. According to the method provided by the invention, simultaneous identity authentication of a group of intelligent equipment can be realized, and the overhead of computing resources is reduced by utilizing operations with relatively low overhead, such as hash operation, linear polynomial calculation, number addition calculation and exclusive-OR operation.

Description

technical field [0001] The present invention relates to the technical field of computer software, in particular to a safe and reliable communication method based on group authentication in a smart home environment. Background technique [0002] The Internet of Things connects devices to the Internet to communicate with RFID, infrared sensors, and global positioning systems for intelligent identification and positioning. Among them, the smart home system is an important application environment of the Internet of Things. A smart home is a technological environment that combines various subsystems with information sensing devices to connect to a network to monitor and control home appliances. Smart home combines construction equipment, network communication technology and information equipment to provide individuals with an efficient, comfortable, safe and convenient living environment. Smart home can realize all-round information exchange and optimize personal lifestyle and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L29/06H04L12/66
CPCH04L9/0643H04L9/0847H04L9/3273H04L63/0869H04L63/0876H04L63/0421H04L63/0428H04L63/06H04L63/1441H04L12/66
Inventor 冯孟沈剑苗田田董昳晖戚荣鑫蒋玲红刘帅
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products