Massive IoT device authentication method, storage medium, and information data processing terminal

A technology of IoT devices and authentication methods, which is applied in the field of storage media, massive IoT device authentication methods, and information data processing terminals. It can solve problems such as incomplete application of certification schemes, attacks on insecure communication channels for remote identity verification, and reliance on certificates, etc. , to achieve the effect of reducing network pressure and communication overhead, ensuring security and efficiency, and enhancing authentication security

Active Publication Date: 2022-04-12
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the huge number of IOT devices and numerous categories, there is still a lack of a unified security identification and identity authentication management mechanism
[0003] Identity authentication mechanism is an important tool to ensure the effectiveness of communication, but remote authentication of IOT devices with limited computing resources is vulnerable to insecure communication channels
Since the construction of smart cities needs to consider the remote authentication of massive IOT devices, the traditional certification scheme cannot be fully applied
In the traditional proof scheme, the user provides a set of credentials with proofs such as passwords or digital certificates. There are problems of relying on certificates and not being able to bind access requests to their sources, and most of them can only prove one-to-one or one verifier proves all Authenticators, so new solutions need to be put forward
[0004] Through the above analysis, the existing problems and defects of the existing technology are as follows: in the traditional certification scheme, the user provides a set of credentials with password or digital certificate and other proofs, and there are problems of relying on the certificate and not being able to bind the access request to its source. And most of them can only prove one-to-one or one verifier can prove all authenticators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Massive IoT device authentication method, storage medium, and information data processing terminal
  • Massive IoT device authentication method, storage medium, and information data processing terminal
  • Massive IoT device authentication method, storage medium, and information data processing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0055] Aiming at the problems existing in the prior art, the present invention provides a massive Internet of Things device authentication method, a storage medium, and an information data processing terminal. The present invention is applicable to the scene of unified authentication of massive IOT devices in smart cities. By selecting IOT devices with high credit value and successful authentication to become AG, it assists IOC in authenticating massive IOT devices, reduces the network pressure of IOC, and uses reputation mechanism to The behavior of each IOT device is monitored, which can effectively defend against DOS att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of Internet of Things security, and discloses a massive Internet of Things device authentication method, a storage medium, and an information data processing terminal. The massive Internet of Things device authentication method interacts between an IOT device and a smart city operation center IOC, and completes the device through a secure channel. Initialization; after the device initialization phase is completed, the aggregator AG is selected through the IOC for aggregator authentication; after the aggregator authentication is completed, the IOT device completes the group authentication with the assistance of the AG; after the group authentication is completed, the devices in the group complete the session encryption with the assistance of the AG key negotiation. The invention selects a device with a high trust value as an aggregator, assists the IOC to perform group certification for other devices, and makes the remote certification of a large number of IOT devices more reliable and efficient. At the same time, the present invention uses a reputation mechanism to monitor the trust value of the device, preventing devices that have successfully authenticated from being instigated by attackers to affect the entire system network.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to a massive Internet of Things device authentication method, a storage medium, and an information data processing terminal. Background technique [0002] At present, with the popularization of 5G, the Internet of Things will also be fully developed and applied due to the increase in network communication speed. IOT devices have been widely used in the construction of smart cities. The "smartness" of smart cities is mainly reflected in intelligent perception, comprehensive interconnection, resource sharing, and collaborative cooperation. The identity verification of IOT devices is a major challenge to the security of smart cities. The attacker can maliciously place counterfeit devices, forge their identities and pretend to be legitimate devices to access the network, thereby illegally receiving and sending information. Attackers can also take advanta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08
CPCH04L63/08H04L63/06H04L9/3278H04L9/3297H04L9/0838
Inventor 曹进韩雨溪李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products