Anti-traceability-attack wireless sensor network lightweight access authentication method and system

A wireless sensor, access authentication technology, applied in wireless communication, instruments, security devices, etc., can solve the problems of security threats to the entity to be authenticated, leakage of communication content, inability to implement authentication schemes, etc., to achieve anonymity and non-traceability performance, low computational overhead, good user anonymity, and untraceability

Active Publication Date: 2021-06-11
XIDIAN UNIV
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically: in the above scenario, if an attacker monitors, intercepts, and tampers with the communication information of the open link, thereby stealing the identity information or other authentication information of the entity to be authenticated, this will pose a threat to the security of the entity to be authenticated. and divulge the content of the communication
Second, if a lightweight authentication scheme cannot be implemented, resource-constrained wireless sensor devices cannot perform complex calculations, resulting in the inability to implement the authentication scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-traceability-attack wireless sensor network lightweight access authentication method and system
  • Anti-traceability-attack wireless sensor network lightweight access authentication method and system
  • Anti-traceability-attack wireless sensor network lightweight access authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057] Aiming at the problems existing in the prior art, the present invention provides a retroactive attack-resistant wireless sensor network lightweight access authentication method and system, specifically, such as in the Industrial Internet of Things, in scenarios with high real-time requirements Under the circumstances, when professional technicians (users) cannot bear the delayed data obtained through a third-party server and need to directly establish a connection with an industrial IoT device (such as a sensor device) to obtain real-time data or directly control the industrial Internet of Things, through the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication network security, and discloses an anti-traceability-attack wireless sensor network lightweight access authentication method and system, and the method comprises the steps: a user interacts with a gateway node to complete registration; the sensor device interacts with the gateway node to complete registration; after the user and the sensor equipment are registered, authentication and key negotiation are carried out with the help of the gateway node; and after the user node completes authentication by using the old password, the user node autonomously selects an updated password. The method can be better applied to resource-limited Internet of Things access equipment, has relatively low calculation overhead, resists common attacks, has good user anonymity and non-traceability, ensures that mutual authentication of a user and sensor equipment and session key negotiation can be effectively realized in an access authentication process, and improves the user experience. The method can have lower calculation overhead, and is more suitable for being applied to the scene of Internet-of-Things resource limited equipment.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a lightweight access authentication method and system for a wireless sensor network resistant to retroactive attacks. Background technique [0002] At present, the concept of the Internet of Things (IoT) first appeared in 1999, which refers to the real-time collection of information required for applications through information collection devices and technologies, and the interconnection of things and things, things and people through network connections. . The Internet of Things is based on the traditional Internet, but it is different from the Internet in that its access devices have expanded from PCs, mobile phones and other devices that need to interact with people to all ordinary physical objects that can be independently addressed, thereby realizing the Internet of Everything. With the proposal of Industry 4.0 and the rapid development of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/00H04W12/0431G16Y30/10G16Y40/50
CPCH04W12/009G16Y30/10G16Y40/50Y02D30/70
Inventor 赵兴文付溪李晖曹进关键
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products