Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things equipment identity security authentication method based on block chain and fog computing

A security authentication technology for IoT devices, which is applied in the field of IoT device identity security authentication based on blockchain and fog computing, can solve problems such as not considering device authentication, limited device resources, increasing difficulty, etc., and achieves a good algorithm Safety, ensure safe communication, ensure real effect

Active Publication Date: 2021-08-24
成都极略科技有限公司
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the concepts and applications of the Internet of Things are no longer new, many security issues and research on the Internet of Things are still in their infancy
The Internet of Things world has a huge number of devices, which increases the difficulty of data exchange between things-things and people-things. It also increases the security issues between information collection, transmission and exchange, and is also vulnerable to various attacks:( 1) Most devices are wireless, and due to various reasons, they are subject to security issues such as identity deception, message theft, and information tampering
(2) Many types of devices are resource constrained in terms of memory and processing power
However, most of the proposed solutions focus on solving data privacy, trust management, and security protection. Some scholars also study blockchain-based IoT device authentication, but most of them propose a framework or idea that is not suitable for deployment. In most resource-constrained IoT devices
Especially with the rise of fog computing, deploying fog nodes near edge devices can help solve the problem of limited device resources, but it does not consider the authentication between devices. However, there are still many aspects of device identity authentication based on blockchain. Work to be done and places to think

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things equipment identity security authentication method based on block chain and fog computing
  • Internet of Things equipment identity security authentication method based on block chain and fog computing
  • Internet of Things equipment identity security authentication method based on block chain and fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0057] The present invention is based on block chain and fog computing IoT device identity security authentication method, such as figure 1 As shown, the specific steps are as follows:

[0058] Step 1, use the elliptic curve algorithm ECC to generate the key pairs required by the device manager Admin, the IoT device Device and the fog node FogNode; specifically:

[0059] Choose an elliptic curve y 2 ≡x 3 +ax+b(modp), p is a prime number, construct an elliptic curve Abel group E p (a,b), at E p In (a,b), select generator point G=(x 0 ,y 0 ), G is an n-order subgroup generating element basis point, satisfying nG=O, O is an infinite point, a and b are y 2 ≡x 3 Coefficient of +ax+b, 4a 3 +27b 2 ≠0. Let the private key be a random number d, the range of d is [1,n-1], n is the order of the subgroup, the public key generated by the random...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things equipment identity security authentication method based on a block chain and fog computing, and the method specifically comprises the steps that: an equipment manager generates a random key, writes the key into Internet of Things equipment, and transmits the key to a fog node close to the equipment; the fog node encrypts the random key and then sends the encrypted random key to the equipment manager; the equipment manager writes related information of the Internet of Things equipment into the block chain; the fog node queries the block chain through the serial number of the Internet of Things equipment to obtain related information of the Internet of Things equipment; the fog node verifies whether the serial number of the equipment stored in the block chain is the same as the serial number of the equipment itself through an equipment identity security protocol DSCP, the fog node authentication stage is completed, and then the fog node adds a mapping and equipment access validity period for the Internet of Things equipment; after the Internet of Things equipment completes registration and authentication, mutual authentication can be carried out between the equipment. According to the method, the blockchain and fog computing are utilized to help the Internet of Things to ensure the security of the equipment and realize mutual authentication between the equipment.

Description

technical field [0001] The invention belongs to the technical field of cryptography and information security, and relates to a security authentication method for IoT device identity based on blockchain and fog computing. Background technique [0002] In recent years, with the rapid development of physical networking technology, the Internet of Things technology and its innovative applications have brought great convenience to people's lives, making people and equipment, equipment and equipment connected together. Although the concepts and applications of the Internet of Things are no longer new, many security issues and research on the Internet of Things are in their infancy. The Internet of Things world has a huge number of devices, which increases the difficulty of data exchange between things-things and people-things. It also increases the security issues between information collection, transmission and exchange, and is also vulnerable to various attacks:( 1) Most device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30H04L9/08G16Y40/50G16Y30/10G16Y20/20G06F21/64G06F9/50
CPCH04L63/10H04L63/0807H04L9/3247H04L63/08H04L9/3213H04L9/0861H04L9/0869H04L9/3073H04L67/12G06F21/64G06F9/5072G16Y20/20G16Y30/10G16Y40/50H04L9/50
Inventor 王尚平左碧露张亚玲
Owner 成都极略科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products