Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-factor-based industrial Internet of Things session key negotiation method

An industrial Internet of Things and session key technology, which is applied in the field of multi-factor-based industrial Internet of Things session key negotiation, can solve problems such as unsatisfactory, unable to meet the security of the Internet of Things environment, and the key agreement process is not lightweight enough. To achieve the effect of ensuring anonymity

Pending Publication Date: 2022-02-18
ANHUI UNIVERSITY
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In most key agreement schemes, either the key agreement process is not lightweight enough to meet the needs of more resource-constrained devices or sensor nodes, or it cannot satisfy sufficient security in the IoT environment
In terms of functionality, most solutions cannot meet more ideal functional features, such as revoking users, dynamically adding devices, dynamically changing personal-related key information (including biometrics and passwords), etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-factor-based industrial Internet of Things session key negotiation method
  • Multi-factor-based industrial Internet of Things session key negotiation method
  • Multi-factor-based industrial Internet of Things session key negotiation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0132] The present invention uses hash function, bit operation and fuzzy extraction and recovery function, and the specific implementation calculation steps are as follows:

[0133] Define the execution time of some symbols as follows:

[0134] T h ≈0.0001ms: is the execution time of a one-way hash operation.

[0135] T f ≈0.442ms: is the execution time of a fuzzy extractor recovery function operation.

[0136] In the process of login, two-way authentication and completion of key agreement, the present invention has 3 communication messages: MQ1={RID i , M1, M2, M3, M4, T 1}, MQ2={Mu5, M6, M7, M8, Mu51, T 2}, MQ3={M10, M11, M12, M13, M13, T 3} need (160+160+160+160+160+160+160+32)=832 bits respectively, (160+160+160+160+160+160+32)=832 bits, (160+160+160+ 160+160+160+32)=832 bits.

[0137] Therefore, the total communication cost of this embodiment is 832+832+832=2496 bits.

[0138] After the above analysis, the communication overhead results shown in Table 2 can be ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-factor-based industrial Internet of Things session key negotiation method which comprises the following steps that: a user stores personal information by using a smart card, communicates with intelligent equipment deployed in the industrial Internet of Things and Internet of Things nodes by connecting a mobile phone or other intelligent terminal equipment, acquires equipment state information in real time, and performs remote management and monitoring on the equipment. The method is based on the environment of the semi-trusted management center and more accords with reality, meanwhile, the pseudonym of the user is generated by the user and the server together, and the pseudonym of the user can be updated in real time after each key negotiation process, so that it is ensured that identity information of the user cannot be leaked, anonymity of the user is ensured, the non-linkability and the non-traceability are ensured, and the safety is improved. A key pre-distribution method is adopted, and based on a multi-factor authentication mode, namely biological characteristics, passwords and intelligent cards, main encryption operation is bit operation and a hash function, so that the calculation overhead and the communication overhead of a key negotiation scheme are reduced.

Description

technical field [0001] The invention belongs to the communication technology of the Industrial Internet of Things, and in particular relates to a session key agreement method of the Industrial Internet of Things based on multi-factors. Background technique [0002] The Internet of Things (IoT), or the Internet of Everything, refers to an expanded and expanded network based on the Internet. It consists of many information sensing devices, no matter where they are located, they can be remotely accessed and controlled anytime and anywhere via the Internet to realize the interconnection between users, machines and objects. The Industrial Internet of Things (IIoT) is one of the main applications of IoT. In the IoT environment, most IoT devices or nodes have the ability to process information and communication, and have addressable Internet Protocol addresses (IP addresses), but limited resources. For IoT devices in different IoT environments, users can access and control them t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/30H04L9/40
CPCH04L9/0838H04L9/0891H04L9/3228H04L9/3236H04L9/3066H04L63/067
Inventor 崔杰程方正杨明张庆阳顾成杰仲红
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products