A two-factor authentication method for smart home scenarios

A smart home and identity authentication technology, applied in the field of information security, to achieve the effect of resisting node capture attacks and solving forward security problems

Active Publication Date: 2021-10-26
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the ubiquitous security and storage problems of two-factor identity authentication in the current smart home environment, the present invention proposes a two-factor identity authentication method for smart home scenarios to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-factor authentication method for smart home scenarios
  • A two-factor authentication method for smart home scenarios
  • A two-factor authentication method for smart home scenarios

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.

[0031] In the smart home scenario, the limited computing power of device nodes and various security issues emerge in an endless stream are the main problems that the two-factor authentication method needs to solve. In order to design a technical solution capable of solving the above six security issues and a storage issue, the present invention considers the following implementation techniques:

[0032] 1) When a legal user registers at the gateway, he only needs to use the user's own identity and password for the modulo calculation, and store the result in the smart card. The periodicity of the modulo calculation directly prevents the attacker from effectively guessing the user's password, thereby avoiding offline password guessing attacks based on smart cards or mobile devices; legitimate users are equivalent to home users;

[0033] 2) When the leg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a two-factor identity authentication method oriented to a smart home scenario, and belongs to the technical field of information security. The invention includes: in the registration stage, the user uses the national secret algorithm to calculate the random hash value, and the gateway calculates the secret value according to the hash value for the user; in the authentication and negotiation stage, the user transmits the request information including the device identification to the gateway, After the gateway and the device pass the verification, the device performs two elliptic curve multiplication operations to generate the session key, and the authentication information generated at the same time includes the parameters generated by binding its own secret value to random parameters through XOR operation; the device converts the ciphertext and authentication information It is sent to the user through the gateway. After the verification is passed, the user obtains the session key and establishes a session with the device. The invention avoids the internal user attack to obtain the user's plaintext identity, can effectively resist the node capture attack and the user counterfeiting attack, ensures the correctness of the session key negotiated between each legitimate user and the device, and greatly reduces the consumption of storage space.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to an identity information authentication method, in particular to a two-factor identity authentication method under a single-gateway-oriented wireless sensor network. Background technique [0002] Smart Home (Smart Home) connects various devices in the home, such as audio and video equipment, lighting systems, curtain control, air conditioning control, security systems, digital theater systems, audio and video servers, video cabinet systems, network appliances, etc. Together, it provides various functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, burglar alarm, environmental monitoring, HVAC control, infrared forwarding, and programmable timing control. Compared with ordinary homes, smart homes not only have traditional residential functions, but also include construction, network communication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/041H04W12/0431H04W12/40H04W12/69H04W12/06H04L9/30
CPCH04L9/3066H04W12/06
Inventor 邹仕洪曹强徐国爱王晨宇徐国胜
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products