PUF-based three-factor anonymous user authentication protocol method in Internet of Things

A user authentication, Internet of Things technology, applied in the field of Internet of Things and Internet of Things security, can solve the problems of inappropriate Internet of Things environment, large amount of calculation, inability to resist offline password guessing attacks, physical cloning attacks, etc.

Active Publication Date: 2020-10-23
XIDIAN UNIV
View PDF9 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such as being unable to resist offline password guessing attacks, physical cloning attacks, etc.
[0010] (2) The existing protocol requires a large amount of calculations, which cannot meet the lightweight requirements, and is not suitable for the Internet of Things environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PUF-based three-factor anonymous user authentication protocol method in Internet of Things
  • PUF-based three-factor anonymous user authentication protocol method in Internet of Things
  • PUF-based three-factor anonymous user authentication protocol method in Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The Internet of Things is based on the Internet of Computers to form a world where everything is connected to help people make better decisions. In the existing IoT environment, the data collected by nodes is often private and sensitive. Users remotely access sensitive data collected by IoT nodes through the Internet, and the Internet is in a public channel, so how to ensure data security during communication is very important. Authentication and key agreement protocol is an important mechanism to ensure the security of communication between users and nodes. Such as figure 1 The communication architecture diagram of the Internet of Things application is shown. The Internet of Things is based on the computer Internet. Various devices use near-field communication technology, wireless data communication and other technologies to form an Internet of Things system covering everything in the world. It has passed the certification With the key agreement protocol, users, gate...

Embodiment 2

[0062] The three-factor anonymous user authentication protocol method based on PUF in the Internet of Things is the same as that in Embodiment 1, and the cryptographically secure Hash function h( ) function described in step (1) of the present invention is either a SHA series algorithm or a national secret SM3 algorithm. The cryptographic security Hash function h( ) function is the SHA series algorithm, and the output length is 256 or 521 bits; when the cryptographic security Hash function h( ) function is the national secret SM3 algorithm, the output length is 256 bits; the SHA series algorithm Released by the American Institute of Standards and Technology, it is the most widely used Hash function with high security. National Secret SM3 is released by the State Cryptography Administration of China. Its security and efficiency are comparable to SHA-256. SHA series algorithms or National Secret SM3 The algorithm is used for the generation and verification of message authenticati...

Embodiment 3

[0064] The three-factor anonymous user authentication protocol method based on PUF in the Internet of Things is the same as embodiment 1-2, and the physical unclonable function PUF described in step (2.1) of the present invention has the following properties: 1) For the same node with PUF that has not been tampered with , input the same challenge C, will output the same response R; 2) For different PUF nodes, input the same challenge C, will output different responses R, PUF makes the node unclonable and tamper-proof, any tampering will make PUF becomes a brand-new PUF', once the node is cloned or tampered with, it will not be successfully authenticated. During the registration process, the gateway saves the authentication credentials of the node equipped with PUF. During the authentication process, the gateway verifies the PUF output of the node according to the saved authentication credentials. Once the node is attacked by physical cloning, the PUF of the node becomes The ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a PUF (Physical Unclonable Function)-based three-factor anonymous user authentication protocol method in the Internet of Things, which solves the security problems such as physical clone attacks and the like, and is implemented by the following steps that: a gateway generates a long-term key for registration and key negotiation of nodes and users; the node sends a PUF-basedchallenge and response to the gateway, and the gateway generates an authentication certificate and sends a node key to the node to complete registration; the user sends the identity identifier to thegateway, the gateway generates a user dynamic identity identifier and a user key and sends the user dynamic identity identifier and the user key to the user, and the user encrypts and stores the userdynamic identity identifier and the user key in the smart card to complete registration; and the user, the gateway and the node perform mutual authentication and key agreement to form a PUF-based three-factor anonymous user authentication protocol method in the Internet of Things. Based on three-factor authentication, smart card loss, password guessing attack and the like can be resisted; the method achieves the anonymity of the user and the node, is small in calculation amount, is high in efficiency, is suitable for IOT nodes with limited resources, and is used for IOT safety communication.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and mainly relates to a security protocol, specifically a PUF-based three-factor anonymous user authentication protocol method, which can be used for authentication and key negotiation between users and nodes in the Internet of Things, and belongs to the Internet of Things security in the field of information security. field. Background technique [0002] The Internet of Things is based on the computer Internet, using RFID, wireless data communication and other technologies to construct an "Internet of Things" covering everything in the world. In this network, various integrated micro-sensors cooperate to monitor, perceive and collect information of various environments or monitoring objects in real time, and users can remotely access the perceived information through the Internet. With the development of various sensing devices and information technology, the coverage of the Inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08H04W12/04H04W12/06
CPCH04L9/0838H04L9/0869H04L63/083H04L63/0853H04L63/0861H04L67/12H04W12/06
Inventor 刘振华郭昌波
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products