Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous identity authentication and key agreement protocol in wsn

A technology of identity authentication and key agreement, applied in network topology, electrical components, security devices, etc., can solve problems such as difficult calculations and unsolvable polynomial time, and achieve the effect of low calculation

Active Publication Date: 2022-03-25
杭州后量子密码科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) One-way: Given x, it is easy to solve h(x); but given h(x), it is computationally difficult to solve x, that is, it cannot be solved in polynomial time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous identity authentication and key agreement protocol in wsn
  • Anonymous identity authentication and key agreement protocol in wsn
  • Anonymous identity authentication and key agreement protocol in wsn

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] (1) Network initialization stage: Before the wireless sensor network is deployed to the monitoring area, the gateway GWN, sensor node N j and the smart card SC need to perform the following initialization operations, and the symbols and meanings in the protocol are shown in Table 1:

[0028]Table 1 Symbol description

[0029]

[0030] (1.1) The administrator is on the smart card SC, the gateway GWN and the sensor node N j One-way hash function, XOR operation function, connection operation function, random number generator and other basic operation functions are stored in the internal memory; the identity ID selected by the administrator for the smart card SC SC and a random number R SC , and put {ID SC , R SC} stored in the user authentication table UT of the gateway GWN (as shown in Table 2, the initial user identity information XT and serial number TS are empty) and the memory of the smart card SC to make it a legal smart card; The smart card SC is distributed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous identity authentication and key agreement protocol (Anonymous Authentication and Key Agreement protocol, AAKA protocol) in a WSN. The protocol completes two-way authentication between users, gateways, and sensor nodes, and generates session keys among the three types of entities, aiming to realize secure access to wireless sensor networks by legitimate users and prevent unauthorized users from entering the network to obtain sensitive information. Data, to ensure the confidential transmission of later data on open channels. Its technical points are: through the pre-authentication function of the smart card to realize the local authentication of user identity legitimacy, based on the dynamic serial number, shared secret value and dynamic random number to realize the two-way identity authentication between the user and the gateway, between the gateway and the sensor node and Key negotiation reduces communication and computing costs during authentication and key negotiation, effectively prevents attackers from impersonating users, gateways or sensor nodes, and provides security for legitimate users to access wireless sensor networks. The performance analysis shows that the AAKA protocol has low calculation, storage and communication overhead under the premise of satisfying security, and is suitable for secure data access and transmission in wireless sensor networks.

Description

technical field [0001] The invention belongs to the field of wireless sensor network information security, relates to technologies such as one-way hash function, XOR encryption algorithm and BAN logic security analysis method, and aims at the identity legality problem existing when a user accesses a sensor node in a wireless sensor network, and sensitive In view of the potential security risks in data transmission over open channels, a lightweight anonymous identity authentication and key agreement protocol suitable for wireless sensor networks is proposed. Users, gateways and sensor nodes in the protocol complete two-way identity authentication and generate session keys based on dynamic serial numbers and shared secret values, aiming to realize secure access to wireless sensor networks by legitimate users and ensure confidential transmission of later data on open channels. Background technique [0002] Hash function is an irreversible operation that maps arbitrary-length bi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/0431H04W84/18
CPCH04W84/18
Inventor 李凤银于新颖王伊蕾王颖崔洋于思琦
Owner 杭州后量子密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products