Unlock instant, AI-driven research and patent intelligence for your innovation.

Three-factor anonymous user authentication protocol method based on puf in the Internet of Things

A user authentication and Internet of Things technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problem of being unable to resist offline password guessing attacks, physical cloning attacks, failing to meet lightweight requirements, and not applicable to the Internet of Things environment and other problems, to achieve the effect of saving communication overhead, small memory, and saving storage space

Active Publication Date: 2021-07-20
XIDIAN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such as being unable to resist offline password guessing attacks, physical cloning attacks, etc.
[0010] (2) The existing protocol requires a large amount of calculations, which cannot meet the lightweight requirements, and is not suitable for the Internet of Things environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-factor anonymous user authentication protocol method based on puf in the Internet of Things
  • Three-factor anonymous user authentication protocol method based on puf in the Internet of Things
  • Three-factor anonymous user authentication protocol method based on puf in the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The Internet of Things is based on the Internet of Computers to form a world where everything is connected to help people make better decisions. In the existing IoT environment, the data collected by nodes is often private and sensitive. Users remotely access sensitive data collected by IoT nodes through the Internet, and the Internet is in a public channel, so how to ensure data security during communication is very important. Authentication and key agreement protocol is an important mechanism to ensure the security of communication between users and nodes. Such as figure 1 The communication architecture diagram of the Internet of Things application is shown. The Internet of Things is based on the computer Internet. Various devices use near-field communication technology, wireless data communication and other technologies to form an Internet of Things system covering everything in the world. It has passed the certification With the key agreement protocol, users, gate...

Embodiment 2

[0062] The three-factor anonymous user authentication protocol method based on PUF in the Internet of Things is the same as that in Embodiment 1, and the cryptographically secure Hash function h( ) function described in step (1) of the present invention is either a SHA series algorithm or a national secret SM3 algorithm. The cryptographic security Hash function h( ) function is the SHA series algorithm, and the output length is 256 or 521 bits; when the cryptographic security Hash function h( ) function is the national secret SM3 algorithm, the output length is 256 bits; the SHA series algorithm Released by the American Institute of Standards and Technology, it is the most widely used Hash function with high security. National Secret SM3 is released by the State Cryptography Administration of China. Its security and efficiency are comparable to SHA-256. SHA series algorithms or National Secret SM3 The algorithm is used for the generation and verification of message authenticati...

Embodiment 3

[0064] The three-factor anonymous user authentication protocol method based on PUF in the Internet of Things is the same as embodiment 1-2, and the physical unclonable function PUF described in step (2.1) of the present invention has the following properties: 1) For the same node with PUF that has not been tampered with , input the same challenge C, will output the same response R; 2) For different PUF nodes, input the same challenge C, will output different responses R, PUF makes the node unclonable and tamper-proof, any tampering will make PUF becomes a brand-new PUF', once the node is cloned or tampered with, it will not be successfully authenticated. During the registration process, the gateway saves the authentication credentials of the node equipped with PUF. During the authentication process, the gateway verifies the PUF output of the node according to the saved authentication credentials. Once the node is attacked by physical cloning, the PUF of the node becomes The ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a three-factor anonymous user authentication protocol method based on PUF in the Internet of Things, which solves security problems such as physical cloning attacks. The implementation includes: the gateway generates a long-term key for node and user registration and key negotiation; the node gives The gateway sends a PUF-based challenge and response, the gateway generates authentication credentials and sends the node key to the node, and completes the registration; the user sends its identity identifier to the gateway, and the gateway generates the user's dynamic identity identifier and user key and sends them to the user. The user encrypts and saves it in the smart card to complete the registration; the user, the gateway and the node authenticate each other and negotiate the key to form a three-factor anonymous user authentication protocol method based on PUF in the Internet of Things. The invention is based on three-factor authentication, can resist loss of smart card, password guessing attack, etc.; realizes anonymity between users and nodes, has small calculation amount and high efficiency, is suitable for Internet of Things nodes with limited resources, and is used for secure communication of Internet of Things.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and mainly relates to a security protocol, specifically a PUF-based three-factor anonymous user authentication protocol method, which can be used for authentication and key negotiation between users and nodes in the Internet of Things, and belongs to the Internet of Things security in the field of information security. field. Background technique [0002] The Internet of Things is based on the computer Internet, using RFID, wireless data communication and other technologies to construct an "Internet of Things" covering everything in the world. In this network, various integrated micro-sensors cooperate to monitor, perceive and collect information of various environments or monitoring objects in real time, and users can remotely access the perceived information through the Internet. With the development of various sensing devices and information technology, the coverage of the Inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08H04W12/0431H04W12/06
CPCH04L9/0838H04L9/0869H04L63/083H04L63/0853H04L63/0861H04L67/12H04W12/06
Inventor 刘振华郭昌波
Owner XIDIAN UNIV