Internet of things equipment identity authentication method and system based on PUF and CPK algorithms, and storage medium

An IoT device and identity authentication technology, applied in the field of IoT device identity authentication, can solve the problems of insufficient identity authentication security and limited resources, and achieve the effect of improving security and reducing resource consumption.

Active Publication Date: 2021-01-26
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER +2
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems of insufficient security and limited resources of IoT device identity authentication in the prior art, the present invention proposes a method, system and storage medium for IoT device ident

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things equipment identity authentication method and system based on PUF and CPK algorithms, and storage medium
  • Internet of things equipment identity authentication method and system based on PUF and CPK algorithms, and storage medium
  • Internet of things equipment identity authentication method and system based on PUF and CPK algorithms, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0055]The technical scheme of the present invention will be further explained below in conjunction with the drawings:

[0056]The present invention proposes an identity authentication method for Internet of Things equipment based on PUF and CPK algorithms, such asfigure 1 As shown, it specifically includes the following steps:

[0057]Step 1. Obtain the challenge and response of the IoT device based on PUF, and use the challenge, response of the IoT device and the pre-generated device identification ID to construct a device fingerprint library.

[0058]Before performing the identity authentication of the Internet of Things device, it is necessary to register the device first. The device registration includes generating a device identification ID and obtaining a challenge-response pair of the Internet of Things device.

[0059]The device identification ID is generated based on the multiple features of the device. The specific generation method includes the following steps:

[0060]Obtain basic attr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things equipment identity authentication method and system based on PUF and CPK algorithms, and a storage medium, and aims to solve technical problems of insufficient security and resource limitation of Internet of Things equipment identity authentication in the prior art. The method comprises the following steps of acquiring challenges and responses of Internet of Things equipment based on PUF, and constructing an equipment fingerprint library by utilizing the challenges and responses of the Internet of Things equipment and a pre-generated equipment identifier ID; generating public and private keys of the Internet of Things device based on a CPK encryption algorithm and the device identifier ID; and performing dual identity authentication of the Internet of Things device based on the device fingerprint library and the public and private keys to obtain an identity authentication result. According to the method, resource consumption of the Internetof Things equipment can be reduced while the identity authentication security of the Internet of Things equipment is improved, and the identity authentication result is more accurate and reliable.

Description

technical field [0001] The invention relates to an authentication method, system and storage medium for an Internet of Things device identity based on PUF and CPK algorithms, and belongs to the technical field of Internet of Things device security authentication. Background technique [0002] With the development of the Internet of Things technology, the security of the Internet of Things has received more and more attention, and it is very important to authenticate the devices in the Internet of Things. Traditional identity authentication is generally implemented by user name and password authentication or PKI / CA technology. The user name and password authentication method is difficult to support a large number of users, and it is difficult to implement in some low-end smart devices, so it cannot be implemented in the physical It is widely used in network security; the PKI / CA system needs to issue digital certificates for each device and smart terminal, and also needs to ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G16Y30/10
CPCG16Y30/10H04L9/3263H04L9/3278H04L63/0442H04L63/0861
Inventor 张明明夏元轶冒佳明赵俊峰夏飞范磊许良杰胡俊邵志鹏陈牧
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products