Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication and key agreement protocol method for Internet of Things equipment in distributed cloud computing architecture

A distributed cloud computing and IoT device technology, applied in the field of information security, can solve the problems of limited computing resources and storage resources, vulnerable to forgery attacks, difficult to meet needs, etc., to resist offline password guessing attacks, increase costs, The effect of protecting identity information

Pending Publication Date: 2021-12-07
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, Kang et al. (Document 2: Kang B, Han Y, Qian K, et al. Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment [J]. Mathematical Problems in Engineering, 2020, 2020( 2): 1-6) found that the Amin et al. protocol is vulnerable to forgery attacks, and improved the protocol
However, by studying a large number of authentication protocols, the inventor further discovered an offline password guessing attack on Kang et al.’s protocol, that is, malicious users can easily obtain the master key of the master server, which is a key parameter of the entire system. All information of the entire system may be leaked
[0005] In addition, because these protocols are designed for communication between IoT devices, and as we all know, such devices are based on embedded development, generally computing resources and storage resources are very limited, and in actual use, the real-time nature of communication The requirements are very high, and the data operation efficiency must be fast. If the mainstream encryption algorithm is used, it is difficult to meet the needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and key agreement protocol method for Internet of Things equipment in distributed cloud computing architecture
  • Authentication and key agreement protocol method for Internet of Things equipment in distributed cloud computing architecture
  • Authentication and key agreement protocol method for Internet of Things equipment in distributed cloud computing architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0099] In order to meet the requirements of mutual authentication and encrypted communication among application devices under the distributed cloud architecture based on the Internet of Things in smart cities, the present invention designs a security authentication and key agreement scheme using smart cards based on lightweight dynamic anonymous identities , the scheme is proven ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication and key agreement protocol method for Internet of Things equipment in a distributed cloud computing architecture. The method comprises a registration stage, a login stage and an authentication and key negotiation stage. The authentication and key negotiation stage comprises the following steps: a first handshake process: a user Ui sends a login message to a cloud server Sm through Internet of Things equipment, and after receiving the login message, the Sm calculates an identity verification condition of the Sm, and sends the identity verification condition and the login message to a control server CS; a second handshake process: after receiving the message from the Sm, the CS verifies the legality of the Ui and the Sm, and if the Ui and the Sm are legal, the CS generates own identity verification conditions for the Ui and the Sm respectively and sends the conditions to the Sm; a third handshake process: the Sm selects an identity verification condition related to the Sm to verify the CS, and sends another identity verification condition to the Internet of Things equipment of the Ui; and a fourth handshake process: the Internet of Things equipment of the Ui verifies the legality of the CS according to an identity verification condition, and if the CS passes the verification, the Ui, the Sm and the CS finally negotiate to obtain a shared key SK = h(NmNCSNi).

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for designing an efficient authentication and key agreement protocol between multiple Internet of Things devices in a distributed cloud computing architecture. Background technique [0002] In recent years, Internet of Things (IoT) devices, such as sensor devices, RFID tags, actuators, and smart terminals, have been increasingly used in daily life to provide people with convenient life. In the process of smart city construction, the main functions of IoT devices are interconnected in a heterogeneous wireless environment. The devices can continuously monitor and analyze various application data from the city to realize real-time automation of smart city intelligent decision-making process. However, as we all know, IoT device resources are limited, and the amount of data in smart cities is huge, which generally increases exponentially with data and devices. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0838H04L9/3226H04L9/3236H04L63/0421H04L63/083H04L63/0876H04L63/1441
Inventor 黄辉辉武泽慧王红敏李泽村刘厚志
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More