Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical layer authentication method and system, equipment and computer readable storage medium

An authentication method and physical layer technology, applied in the field of physical layer security, can solve problems such as potential safety hazards, shared key leakage, easy to steal NVM shared keys, etc., to avoid security risks, resist various active and passive attacks, and ensure The effect of authentication accuracy

Pending Publication Date: 2022-02-11
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of method has certain security risks, because the NVM may be compromised to cause the leakage of the shared key, or once the attacker establishes a physical connection with the wireless device, it is easy to steal the shared key in the NVM

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical layer authentication method and system, equipment and computer readable storage medium
  • Physical layer authentication method and system, equipment and computer readable storage medium
  • Physical layer authentication method and system, equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0096] see figure 1 , figure 1 It is the first flowchart of a physical layer authentication method provided by the embodiment of this application.

[0097] A physical layer authentication method provided in an embodiment of the present application is applied to a wireless terminal device and may include the following steps:

[0098] Step S101: Send your own identity to the wireless access point to initiate a network access request.

[0099] In practical applications, the wireless...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical layer authentication method and system, equipment and a computer readable storage medium. The method is applied to wireless terminal equipment. The method comprises the following steps that: identity identifier of the wireless terminal equipment is sent to a wireless access point so as to initiate a network access request; an authentication signal generated by the wireless access point based on a target challenge is received, wherein the target challenge comprises a generated PUF challenge corresponding to the identity identifier; the identity legality of the wireless access node is authenticated based on a self-stored target challenge copy and the authentication signal, if the authentication is passed, a response signal corresponding to the authentication signal is generated based on the target challenge copy; and the response signal is sent to the wireless access point to allow the wireless terminal equipment to access the network after the wireless access point authenticates that the identity of the wireless terminal equipment is legal based on the response signal. According to the method, the PUF is used for physical layer authentication, a shared key in an existing active authentication method is replaced, the security risk of key leakage is avoided, the authentication accuracy is improved, and various active and passive attacks can be effectively resisted.

Description

technical field [0001] The present application relates to the technical field of physical layer security, and more specifically, to a physical layer authentication method, system, device and computer-readable storage medium. Background technique [0002] With the rapid popularization of the Internet of Things technology, the number of wirelessly connected devices is increasing day by day, which brings convenience to people's life and aggravates the security problems of wireless networks. However, the inherent broadcast characteristics of wireless communication make it vulnerable to various malicious attacks. In order to prevent malicious devices from accessing the wireless network, the wireless access point needs to authenticate the device requesting to access the network. Traditional authentication mechanisms based on cryptographic algorithms are deployed on the upper layer of the network protocol stack, so they can only authenticate access devices at the data level, but c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04W12/06
CPCH04L9/3278H04L9/3236H04W12/06
Inventor 熊俊魏急波郭登科张晓瀛马东堂高玉威曹阔赵海涛黄圣春
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products