Block chain node identity authentication method and system based on channel state information
A channel state information and identity authentication technology, applied in the field of blockchain node identity authentication based on channel state information, can solve problems such as high delay, high key management and distribution mechanism overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0056]Aiming at the information security problem of computing tasks performed by blockchain nodes in a relatively open communication environment, this embodiment provides a blockchain node identity authentication method based on channel state information, which can be applied in such as figure 1 In the block chain system shown; the block chain network consists of service devices and terminal devices. The service equipment is usually a specific high-end server, and these high-end servers have CPU, GPU and large storage space with powerful computing and processing capabilities. Due to the limited cost of terminal equipment, computing and storage capabilities are very limited. Various terminal devices and service devices are distributed in the blockchain scene, and the terminal devices and service devices communicate through wireless links, and the terminal devices are located in specific locations in this scene. When the terminal device communicates with the network, in order t...
no. 2 example
[0111] This embodiment provides a block chain node identity authentication system based on channel state information, and the block chain node identity authentication system based on channel state information includes the following modules:
[0112] The initialization module is used to pre-allocate unique identification information ID for each terminal device in the blockchain network;
[0113] The registration module is used to obtain the channel state information CSI and ID of each terminal device, using CSI as feature data, ID as a label to construct a training data set, and training a preset convolutional neural network model based on the training data set; wherein, The convolutional neural network model takes the CSI of the terminal device as input, and takes the ID of the terminal device as output;
[0114] An authentication module, configured to obtain the CSI and ID of the terminal device to be authenticated, and identify the ID of the terminal device to be authenticat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


