Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-gateway authentication method and system, storage medium, computer equipment and terminal

An authentication method and multi-gateway technology, applied in the fields of systems, multi-gateway authentication methods, terminals, storage media, and computer equipment, can solve problems such as high cost of receiving and sending messages, leakage of communication content, security threats to entities to be authenticated, etc. , to achieve good forward security, protect user privacy, good user privacy and forward security

Active Publication Date: 2021-06-11
XIDIAN UNIV
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005](1) The security mechanism of the Internet of Things is usually embedded security, its terminal resources are limited and usually deployed in an open unattended environment, WSN is the core of the Internet of Things technology, the computing power and resources of its sensor nodes are limited, and how to ensure its security authentication needs to be solved urgently
[0006](2) In the case of a single gateway, high-speed data streams may collide, and the distance between the edge sensor and the gateway node in the single-gateway model is too far to cause reception The cost of sending and sending messages becomes higher, the communication overhead increases, and the network performance decreases, etc.
[0007](3) At present, there are few researches on multi-gateway authentication protocols. Existing multi-gateway authentication protocols are based on lightweight operations such as hash and XOR or symmetric Encryption algorithm, however public key algorithm is an essential tool to achieve forward security
[0010](2) wireless sensor network, the computing resources and storage resources of most devices are limited, the traditional public key infrastructure (Public Key Infrastructure, PKI) and based on The authentication protocol of public key cryptographic primitives cannot be directly transplanted, so it is necessary to design a lightweight authentication protocol to ensure the legitimacy of the identity of the communication entity and reduce the computing overhead of sensor nodes as much as possible
[0011](3) In a wireless sensor network, in a single gateway scenario, there may be high-speed data flow conflicts. Far will lead to higher cost of receiving and sending messages, increased communication overhead, and reduced network performance
Specifically: in the above scenario, if an attacker monitors, intercepts, and tampers with the communication information of the open link, thereby stealing the identity information or other authentication information of the entity to be authenticated, this will pose a threat to the security of the entity to be authenticated. and divulge the content of the communication
Second, if a lightweight authentication scheme cannot be implemented, resource-constrained wireless sensor devices cannot perform complex calculations, resulting in the inability to implement the authentication scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-gateway authentication method and system, storage medium, computer equipment and terminal
  • Multi-gateway authentication method and system, storage medium, computer equipment and terminal
  • Multi-gateway authentication method and system, storage medium, computer equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0081] Aiming at the problems existing in the prior art, the present invention provides a multi-gateway authentication method, system, device and application. Specifically, in smart medical scenarios, in some scenarios that require emergency rescue, in order not to delay the final Doctors need to collect data in real time through the medical sensors deployed on the patient's body in order to obtain the patient's health status in a timely manner and formulate an appropriate treatment plan. At the same time, there are cross-domain access requirements in some special cases, such as a medical professional in a certain domain Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication network security, and discloses a multi-gateway authentication method and system, a storage medium, computer equipment and a terminal. The multi-gateway authentication method comprises the steps of: performing offline initialization; performing user registration; registering sensor nodes; logging in by a user; and carrying out authentication and key negotiation. According to the invention, a public key mechanism is introduced into a multi-gateway authentication scheme of the wireless sensor network through a rabin mechanism, mutual authentication and session key negotiation between a user and sensor equipment can be realized, and the privacy of the user is protected; as a public key mechanism is introduced, anonymity and non-traceability can be realized on the premise of ensuring bidirectional authentication, and the method has good forward security. Meanwhile, multiple attack modes such as replay attacks, simulation attacks and man-in-the-middle attacks can be resisted, and technical support can be provided for multi-gateway scenes needing real-time data access and cross-regional access such as industrial Internet of Things and smart medical treatment.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a multi-gateway authentication method, system, storage medium, computer equipment and terminal. Background technique [0002] At present, the authentication protocol is an important measure to ensure the security of the Internet of Things. Traditional network devices can use classic public key encryption algorithms to design authentication schemes, but due to the limited computing and storage resources of IoT devices, they can only use lightweight encryption algorithms. Most of the existing protocols are single-gateway authentication protocols, which can only ensure that users and devices within the coverage area of ​​a single gateway can establish secure sessions. In a wireless sensor network, when there is only a single gateway, high-speed data streams may conflict, and because the distance between the edge sensor and the gateway node in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/041H04W12/06H04L29/06
CPCH04W12/06H04L63/0861H04L63/083H04L63/0869
Inventor 赵兴文付溪李晖曹进关键
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products