Unlock instant, AI-driven research and patent intelligence for your innovation.

IoT device identity security authentication method based on blockchain and fog computing

A security authentication technology for IoT devices, which is applied in the field of IoT device identity security authentication based on blockchain and fog computing, can solve problems such as not considering device authentication, limited device resources, increasing difficulty, etc., and achieves a good algorithm Safety, ensure safe communication, ensure real effect

Active Publication Date: 2022-08-09
成都极略科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the concepts and applications of the Internet of Things are no longer new, many security issues and research on the Internet of Things are in their infancy
The Internet of Things world has a huge number of devices, which increases the difficulty of data exchange between things-things and people-things. It also increases the security issues between information collection, transmission and exchange, and is also vulnerable to various attacks:( 1) Most devices are wireless, and due to various reasons, they are subject to security issues such as identity deception, message theft, and information tampering
(2) Many types of devices are resource constrained in terms of memory and processing power
However, most of the proposed solutions focus on solving data privacy, trust management, and security protection. Some scholars also study blockchain-based IoT device authentication, but most of them propose a framework or idea that is not suitable for deployment. In most resource-constrained IoT devices
Especially with the rise of fog computing, deploying fog nodes near edge devices can help solve the problem of limited device resources, but it does not consider the authentication between devices. However, there are still many aspects of device identity authentication based on blockchain. Work to be done and places to think

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT device identity security authentication method based on blockchain and fog computing
  • IoT device identity security authentication method based on blockchain and fog computing
  • IoT device identity security authentication method based on blockchain and fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0057] The present invention is based on the block chain and fog computing of the Internet of Things device identity security authentication method, such as figure 1 shown, the specific steps are as follows:

[0058] Step 1, use the elliptic curve algorithm ECC to generate the key pair required by the device manager Admin, the IoT device Device and the fog node FogNode; specifically:

[0059] select an elliptic curve y 2 ≡x 3 +ax+b(modp), p is a prime number, construct an elliptic curve Abel group E p (a,b), in E p (a,b), select the generator point G=(x 0 ,y 0 ), G is a subgroup generator base point of order n, satisfying nG=O, O is an infinity point, a and b are y 2 ≡x 3 Coefficient of +ax+b, 4a 3 +27b 2 ≠0. Let the private key be a random number d, the range of d is [1,n-1], n is the order of the subgroup, and the public key genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity security authentication method for IoT devices based on blockchain and fog computing. The fog node closes; the fog node encrypts the random key and sends it to the device manager; the device manager writes the relevant information of the IoT device into the blockchain; the fog node queries the blockchain through the number of the IoT device, and obtains Information about IoT devices; the fog node verifies whether the serial number of the device stored in the blockchain is the same as the serial number of the device itself through the device identity security protocol DSCP, the fog node authentication phase is completed, and then the fog node adds a mapping to the IoT device and device access validity period; after IoT devices complete registration and authentication, mutual authentication can be performed between devices. The present invention utilizes block chain and fog computing to help the Internet of Things to ensure the security of devices and realize mutual authentication between devices.

Description

technical field [0001] The invention belongs to the technical field of cryptography and information security, and relates to an identity security authentication method for IoT devices based on blockchain and fog computing. Background technique [0002] In recent years, with the rapid development of physical networking technology, the Internet of Things technology and its innovative applications have brought great convenience to people's lives, making people and equipment, equipment and equipment connected together. Although the concept and application of the Internet of Things are no longer novel, many security issues and researches of the Internet of Things are in their infancy. The Internet of Things world has a huge number of devices, which increases the difficulty of data exchange between the Internet of Things and the Internet of Things and the Internet of Things. It also increases the security issues between information collection, transmission, and exchange, and is al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L9/30H04L67/12G16Y40/50G16Y30/10G16Y20/20G06F21/64G06F9/50
CPCH04L63/10H04L63/0807H04L9/3247H04L63/08H04L9/3213H04L9/0861H04L9/0869H04L9/3073H04L67/12G06F21/64G06F9/5072G16Y20/20G16Y30/10G16Y40/50H04L9/50
Inventor 王尚平左碧露张亚玲
Owner 成都极略科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More