Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain-based 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal

A technology of identity authentication and drones, applied in the field of drones, can solve problems such as sensitive data leakage, single-node identity authentication server service paralysis, failure to meet authentication security requirements, etc., achieve strong flexibility, solve single-node failures and Distributed denial of service attack, low latency effect

Active Publication Date: 2021-07-30
SICHUAN NORMAL UNIVERSITY
View PDF11 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the 5G environment is an open network environment, facing various security threats, and unreliable communication links may lead to sensitive data leakage, so identity authentication is particularly important
In view of the mobility of UAVs and the heterogeneity of UAV networks, traditional authentication methods based on passwords or user names cannot meet the authentication security requirements in a distributed environment.
At the same time, if the single-node identity authentication server fails, the service will be paralyzed
In addition, drone missions may require the cooperation of multiple companies. How to safely and effectively collaborate drones across enterprise domains has become a major problem, and how to establish a security responsibility mechanism needs to be resolved urgently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal
  • Block chain-based 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal
  • Block chain-based 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Embodiment 1: A blockchain-based 5G UAV cross-domain identity authentication method, such as figure 1 As shown in , it is specifically realized by the four steps of system initialization, identity management, session key negotiation, and identity authentication.

[0056] It should be noted that the key generation center and the edge server in this embodiment are both configured as a server, and the key generation center and the edge server cooperate to form a domain administrator, who is responsible for the enterprise manager of the drone and the maintenance of the alliance chain. The role of the operator is responsible for the management of equipment in the domain and the establishment and maintenance of blockchain nodes.

[0057] 1. System initialization

[0058] System initialization includes domain initialization, KGC initialization, private chain construction, alliance chain construction, and deployment of smart contracts.

[0059] 1. Domain initialization, the K...

Embodiment 2

[0119] Example 2: A blockchain-based 5G UAV cross-domain identity authentication system, such as figure 1 As shown, it includes multiple UAV domains and alliance chains formed by deploying smart contracts. Each drone domain is configured with a unique key generation center, an edge server, private chain, and multiple domain devices. Domain devices are connected through D2D link network communication, and domain devices and servers are connected through D2B link network communication. Domain devices include but are not limited to drones, smart terminals, etc.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a 5G unmanned aerial vehicle cross-domain identity authentication method and system based on a block chain, and a terminal, and relates to the technical field of unmanned aerial vehicles, and the key points of the technical scheme are as follows: initiating a transfer transaction with additional information as a communication connection request; sending an identity authentication request to an alliance chain according to the communication connection request; the alliance chain calls a built-in intelligent contract to search access control information and a registration validity period of domain A equipment according to the identity authentication request; performing hash processing on an identity label in the account information to obtain a second hash value, and matching the second hash value with the first hash value; and the domain B equipment performs session key negotiation with the domain A equipment according to the legal identity information and then establishes communication connection. According to the invention, the identity authentication of the cross-domain unmanned aerial vehicle in the distributed environment is realized by using the multi-signature intelligent contract, only one transaction needs to be submitted to the block chain for one-time authentication, and compared with a traditional authentication mode using a digital certificate, the identity authentication is completed with smaller communication overhead.

Description

technical field [0001] The present invention relates to the technical field of unmanned aerial vehicles, and more specifically, it relates to a blockchain-based 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal. Background technique [0002] UAV is an unmanned remote control aircraft controlled by wireless induction remote control equipment or self-contained program control device. According to the application field, it is divided into military and civilian use, and can be used in scientific research, site exploration, military, leisure and entertainment purposes. In recent years, UAVs have grown significantly in the global market and are widely used in construction, oil, gas, energy, agriculture, disaster relief and other fields. [0003] With the development of wireless communication technology, the 5G era has arrived. 5G technology is a new generation of cellular mobile communication technology that can provide low-latency, high-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/0431H04W12/041H04W12/122H04W12/08H04W12/086H04L9/32H04W4/40H04L29/06G06Q40/04G06Q20/38G06F21/64G06F21/46H04L29/08
CPCH04W12/06H04W12/08H04L9/3255H04W4/40H04L63/1458H04L63/101H04L63/108G06Q40/04G06Q20/3829G06F21/64G06F21/46H04L67/1095H04L2209/80H04L2209/84H04L9/50
Inventor 冯朝胜刘彬
Owner SICHUAN NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products