Lightweight blockchain communication authentication device and method for detecting data tamper-proofing

A technology for detecting data and authentication methods, applied in secure communication devices, digital data protection, data processing applications, etc., can solve the problems that the encryption process is easy to be cracked and consumes a lot of money, so as to speed up transaction processing and dissemination, and prevent tampering , to ensure the effect of credibility

Active Publication Date: 2021-08-13
CHANGZHOU ARCHITECTUAL RES INST GRP CO LTD +1
View PDF14 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: in order to solve the technical problem that the authentication method of the block chain in the prior art needs to consume a large amount of resources to resist the tampering of the data by the attacker, and the encryption process is easy to be cracked, the present invention provides a method for detecting The data tamper-proof lightweight block chain communication authentication device and method, through the direct communication connection between the full node and the lightweight node, configure the PUF chip in the lightweight node, and use the query response parameter pair generated by the PUF chip as The authentication method makes the node authentication information unpredictable, can effectively resist replay attacks and machine learning attacks, prevent attackers from tampering with data, improve the security of stored data, and can significantly reduce the security level without affecting the security level. Reduce resource consumption and improve the conflict between low communication efficiency and high energy consumption after lightweight nodes access the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight blockchain communication authentication device and method for detecting data tamper-proofing
  • Lightweight blockchain communication authentication device and method for detecting data tamper-proofing
  • Lightweight blockchain communication authentication device and method for detecting data tamper-proofing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] like figure 1 As shown, a lightweight blockchain communication authentication device for detecting data tampering, including: full node 1 and lightweight node 2, full node 1 is the genesis block and derived from the genesis block Each full node 1 communicates directly with at least one lightweight node 2, and each lightweight node 2 is equipped with a PUF chip 21, and each PUF chip 21 is unique. In this embodiment, a block is a full node 1, and a full node 1 can be connected to one lightweight node 2, or multiple lightweight nodes 2, and the lightweight node 2 can be an IoT device , such as monitoring equipment. The PUF chip 21 is set inside the lightweight node, and each PUF chip has an unpredictable, unique, and unclonable "electronic fingerprint", that is to say, the PUF chip on each lightweight node is unique of.

[0038] In this embodiment, full node 1 is a node with a complete blockchain account book. The full node needs to occupy memory to synchronize all bloc...

Embodiment 2

[0040] like figure 2 As shown, a light-weight blockchain communication authentication method for detecting data tamper-proof, using the device of Embodiment 1, taking the authentication process between a full node and a light-weight node as an example, specifically includes the following step:

[0041] S1: Starting from the genesis block, generate at least one first new block, use the first new block as the parent block to generate at least one second new block, and use the second new block as the parent block to generate at least one third new block , and so on to form a directed acyclic graph structure, the creation block, the first new block, the second new block and the third new block are all full nodes.

[0042] It should be noted that if a directed graph cannot start from a certain vertex and return to the point through several edges, then this graph is a directed acyclic graph (DAG graph). For example, if figure 2 As shown, starting from the genesis block, a new b...

Embodiment 3

[0064] like Image 6 As shown, an application system of a lightweight block chain communication authentication method for detecting data tampering, including a smart bracelet 101, a microprocessor 102, an FPGA development board 103 and a computer 104, the smart bracelet 101 and a micro The processors 102 are connected by wireless communication, the FPGA development board 103 is connected to the microprocessor 102 through a serial port, the FPGA development board 103 is provided with a PUF chip, and the microprocessor 102 is connected to the computer 104 by communication. The smart bracelet 101, the microprocessor 102, and the FPGA development board 103 together form a lightweight node, and the computer 104 simulates the full node. The smart bracelet 101 is equipped with hardware such as a temperature sensor, a heart rate sensor, and GPS. The health data such as the temperature, heart rate, and location of the user detected by the smart bracelet are transmitted to the microproc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight blockchain communication authentication device and method for detecting data tamper-proofing, and the device comprises full nodes and lightweight nodes; the full nodes are a creation block and sub-blocks derived from the creation block, each full node is in direct communication connection with at least one lightweight node, a PUF chip is arranged in each lightweight node, and each PUF chip is unique. Through direct communication between the full nodes and the lightweight nodes, the lightweight nodes directly store data in the full nodes, the link of an intermediate memory is omitted, attackable objects are reduced, each lightweight node is internally provided with a PUF chip, and the credibility of the nodes is verified by using inquiry response pairs generated by the PUF chips, so the node authentication information is unpredictable, replay attacks and machine learning attacks can be effectively resisted, and the security of stored data is improved.

Description

technical field [0001] The invention relates to the technical field of block chain authentication, in particular to a lightweight block chain communication authentication device and method for detecting tamper-proof data. Background technique [0002] The blockchain was first proposed by Satoshi Nakamoto to implement Bitcoin. It is a data structure similar to a linked list, with a series of blocks, and each block usually contains the hash value of the previous block, a timestamp and some kind of form of transaction data. It is a data structure that can only append data, and once a block is added, it cannot be modified. A blockchain is a peer-to-peer distributed ledger where anyone can independently verify the authenticity of recorded transactions. Compared with the data maintenance method of the central server, the blockchain does not have records that can be leaked to the outside world. In the case of a public blockchain, anyone can create a public / private key pair and p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/60G06F21/77G06Q20/40G06Q40/04
CPCH04L9/3278G06F21/602G06F21/77G06Q20/401G06Q40/04H04L9/50
Inventor 黄彬曹元王胜沈杰石国杰毛剑笪静
Owner CHANGZHOU ARCHITECTUAL RES INST GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products