Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for security authentication of Internet of things node group identity

A security authentication and node group technology, which is applied to user identity/authority authentication, secure communication devices, and key distribution, can solve the problems of group aggregation authentication applications and server reply information with a huge amount of computation, and achieve the effect of ensuring security

Active Publication Date: 2021-06-08
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the aforementioned invention can only alleviate the problem of signaling overhead to a certain extent, but in fact, when there are too many devices involved, the amount of calculation for group aggregation authentication application and server reply information is still very large, and the amount of data communication is still huge. The operating efficiency of the system puts forward higher requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for security authentication of Internet of things node group identity
  • A method for security authentication of Internet of things node group identity
  • A method for security authentication of Internet of things node group identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The invention will now be described in further detail with reference to the drawings.

[0045] It should be noted that the use of "upper", "", "," left "," left "," right "," front "," ",", ",", ",", "," The scope of the present invention can be embodied, and the relative relationship is changed or adjusted, and it is also considered to be the scope of the embodiments of the present invention without substantial change.

[0046] Combine figure 1 The present invention proposes an identity safety authentication method of an Internet of-connected node group, which includes the following steps:

[0047] S1, initialization phase: The server is generated by the various parameters required when the authentication is generated according to the selection security level, and its own key.

[0048] S2, registration phase: Group members register, get key, and group related information to the server.

[0049] S3, Group Aggregation Certification Request: All groups All groups use Schnorr ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method for an Internet of Things node group identity, comprising: a server generates various parameters required for authentication and its own key according to a selected security level; group members register with the server to obtain the key And the relevant information of the group they belong to; all members of the group use the Schnorr aggregation signature to sign the current timestamp, and the group leader aggregates and sends the request to the server; after the server verifies the validity of the group authentication request, according to the Chinese remainder theorem Encrypted distribution is used to generate random numbers for subsequent session keys and sign them; after group members authenticate the server signature, they use their private keys to decrypt the encrypted random numbers and generate session keys. The invention can reduce the data traffic when a large-scale group applies for identity authentication, and the size of group aggregation authentication application and server reply information is constant and does not change with the number of group members.

Description

Technical field [0001] The present invention relates to the field of safety certification techniques, and in particular, an identity safety authentication method of an Internet of-connected node group is mainly used to solve the problem of low efficiency and occupancy of large-scale bandwidth resources. Background technique [0002] With the rapid development of the Internet of Things technology, the Internet of Things equipment has been widely used in various fields in various fields, and the number of Internet of Things is also explosive growth. At the same time, the security issues of the Internet of Things equipment are also highlighted, especially those used to collect and transmit user-sensitive data. Internet of Things equipment usually calculates limited capacity, and cannot use highly complexity safety technology, which is easy to attack. Once these devices have been attacked, the user-sensitive data will be leaked, which will cause irreparable losses. Therefore, in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0838H04L9/0869H04L9/3255H04L9/3297H04L63/0876H04L63/104H04L63/105
Inventor 常相茂王杜毅
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS