Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain node identity authentication method and system based on channel state information

A channel state information and identity authentication technology, applied in the field of blockchain node identity authentication based on channel state information, can solve problems such as high delay, high key management and distribution mechanism overhead

Pending Publication Date: 2021-02-09
UNIV OF SCI & TECH BEIJING
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a block chain node identity authentication method and system based on channel state information to solve the high overhead of key management and distribution mechanism in the traditional key-based identity authentication technology, which causes excessive delay technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain node identity authentication method and system based on channel state information
  • Block chain node identity authentication method and system based on channel state information
  • Block chain node identity authentication method and system based on channel state information

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0056]Aiming at the information security problem of computing tasks performed by blockchain nodes in a relatively open communication environment, this embodiment provides a blockchain node identity authentication method based on channel state information, which can be applied in such as figure 1 In the block chain system shown; the block chain network consists of service devices and terminal devices. The service equipment is usually a specific high-end server, and these high-end servers have CPU, GPU and large storage space with powerful computing and processing capabilities. Due to the limited cost of terminal equipment, computing and storage capabilities are very limited. Various terminal devices and service devices are distributed in the blockchain scene, and the terminal devices and service devices communicate through wireless links, and the terminal devices are located in specific locations in this scene. When the terminal device communicates with the network, in order t...

no. 2 example

[0111] This embodiment provides a block chain node identity authentication system based on channel state information, and the block chain node identity authentication system based on channel state information includes the following modules:

[0112] The initialization module is used to pre-allocate unique identification information ID for each terminal device in the blockchain network;

[0113] The registration module is used to obtain the channel state information CSI and ID of each terminal device, using CSI as feature data, ID as a label to construct a training data set, and training a preset convolutional neural network model based on the training data set; wherein, The convolutional neural network model takes the CSI of the terminal device as input, and takes the ID of the terminal device as output;

[0114] An authentication module, configured to obtain the CSI and ID of the terminal device to be authenticated, and identify the ID of the terminal device to be authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain node identity authentication method and system based on channel state information. The method comprises the following steps: allocating a unique ID to each terminal device in a block chain network in advance; acquiring CSI and ID of each terminal device, creating a training data set by taking the CSI as feature data and the ID as a label, and training a presetconvolutional neural network model based on the training data set; wherein the convolutional neural network model takes the CSI of the terminal equipment as input and takes the ID of the terminal equipment as output; and acquiring the CSI and ID of the terminal device to be subjected to identity authentication, identifying the ID of the terminal device to be subjected to identity authentication based on the CSI of each terminal device to be subjected to identity authentication by the trained convolutional neural network model, and determining an identity authentication result according to whether the identifier ID is consistent with the acquired ID of each terminal device. According to the invention, high-efficiency and light-weight identity authentication in the block chain network can be realized.

Description

technical field [0001] The invention relates to the technical fields of block chain and machine learning, in particular to a block chain node identity authentication method and system based on channel state information. Background technique [0002] In the future network, the amount of data generated by the blockchain network will grow explosively. The traditional calculation mode has problems of insufficient bandwidth, excessive power consumption, and excessive delay. In order to make up for the shortage of mobile computing, blockchain Computing through distributed nodes has emerged as a new computing paradigm. [0003] However, when computing tasks are deployed on blockchain nodes, in a relatively open communication environment, malicious attackers or unauthorized illegals may eavesdrop, intercept, replay or tamper with the information transmitted in the channel. , resulting in leakage of user privacy. Identity authentication technology is a method to ensure the security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06N3/04
CPCG06F21/6218G06F21/602G06N3/045
Inventor 许海涛叶苏乐李思哲
Owner UNIV OF SCI & TECH BEIJING