Double-factor anonymous authentication and key agreement method oriented to mining production scene

An anonymous authentication and key agreement technology, applied in key distribution, can solve mining operation security and data privacy threats, data theft and traffic analysis attacks, etc., to protect security and privacy, reduce computational complexity, and ensure security Effect

Pending Publication Date: 2022-03-04
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limitations of terminal equipment and environment, these data are not absolutely safe during network transmission
The sensor nodes used to collect various data are not physically isolated, so they are vulnerable to data theft and traffic analysis attacks by attackers. Once the attacker obtains the security status of its mining equipment or modifies its corresponding parameters, it will be harmful to the The security and data privacy of its mining operations pose a great threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-factor anonymous authentication and key agreement method oriented to mining production scene
  • Double-factor anonymous authentication and key agreement method oriented to mining production scene
  • Double-factor anonymous authentication and key agreement method oriented to mining production scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] specific implementation plan

[0054] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific examples described here are only used to explain the present application, not to limit the present application.

[0055] A two-factor anonymous authentication and key agreement method for mining scenarios, characterized in that it includes the following steps:

[0056] (1) System initialization phase:

[0057] First of all, the system initialization should be carried out. The system gateway GWN selects the appropriate cryptographically secure Hash function h(*) and the asymmetric encryption algorithm E according to the system security requirements. k (*) and decryption algorithm D k (*), and make it public; at the same time, the gateway GWN randomly selects a pair ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a two-factor anonymous authentication and key negotiation method applied to a mining production scene. The method comprises five stages of system initialization, user and sensor node registration, anonymous authentication and key negotiation and user password change. The method is based on two-factor authentication of user passwords and voiceprint features, and can resist potential safety hazards such as password guessing, replay attacks and insider attacks; according to the method, the anonymity of the user and the sensor node is realized, the calculated amount is small, the efficiency is high, the method is suitable for the complex mining production environment and the sensor node with limited resources, and the secure communication among the wireless sensor network nodes in the mining production is ensured.

Description

technical field [0001] The patent of the present invention belongs to the field of Internet communication, specifically for mining production, a two-factor anonymous authentication and key agreement method for establishing secure communication between users and sensor nodes. Background technique [0002] Existing network device authentication factors mainly include user-defined passwords, smart cards, and human biometric features. Among them, low-entropy passwords are vulnerable to offline guessing attacks, and high-entropy passwords are likely to bring difficulties in memorization and management for users. The smart card is easy to be stolen, and the information stored on the smart card is easy to be attacked by side channel technology and leaked inadvertently. However, based on human biological information (such as fingerprints, iris, and human voice recognition), it is not easy to be copied and lost. Compared with smart cards and passwords, it is a relatively stable auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L9/32H04W12/02H04W12/041H04W12/0431H04W12/06H04W12/122H04W84/18
CPCH04L9/0838H04L9/0643H04L9/0861H04L9/3231H04L9/008H04W12/041H04W12/0431H04W12/02H04W12/06H04W12/122H04W84/18H04L2209/42
Inventor 罗文俊牟覃宇陈自刚陈龙邵鑫
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products