Authentication and key negotiation method, gateway, sensor and electronic equipment

A key agreement, sensor technology, applied in key distribution, can solve the problem of important data leakage, and achieve the effect of ensuring security and realizing anonymity

Pending Publication Date: 2022-04-08
HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the attacker may analyze the sensitive information of the target user through the identity information of the sensor node, and analyze th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and key negotiation method, gateway, sensor and electronic equipment
  • Authentication and key negotiation method, gateway, sensor and electronic equipment
  • Authentication and key negotiation method, gateway, sensor and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0066] Example 1

[0067] The authentication and key agreement method for a wireless sensor network in this embodiment is applied to a wireless sensor network. The wireless sensor network includes a sensor, a gateway, a smart card, and a user equipment. The user logs in to the target sensor through the user equipment and the smart card, and the user equipment can It is a terminal device such as a mobile phone, tablet, computer, etc., which is not limited here; there can be one or more sensors and gateways. Each sensor is connected to the gateway through a wireless network. The sensor is used to collect data and send the collected data to the gateway. The gateway processes the data and sends the processed data results to the user device; before the user logs in, he needs to register with the gateway first, and then perform security authentication and key negotiation through the gateway and the sensor.

[0068] figure 1 A schematic flowchart of an authentication and key agreeme...

Example Embodiment

[0111] Embodiment 2

[0112] In this embodiment, on the basis of Embodiment 1, the specific implementation process of the method proposed in the application is described in detail. The method includes four execution subjects: a user, a smart card, a sensor node and a gateway node, where the user refers to a device used by the user side, and the steps of the method include:

[0113] S1. Device initialization, including:

[0114] Step a1, the gateway node selects two random integers as the gateway node identity ID G and the gateway node master key K, and store it in the gateway node's memory;

[0115] Step a2, the gateway node selects the sensor node identification ID for the sensor node S , and store it in the memory of the sensor node;

[0116] Step a3, the gateway node pre-initializes all smart cards, and selects a smart card identity ID for each smart card SC and store it on the smart card.

[0117] S2, user registration and sensor node registration.

[0118] When a n...

Example Embodiment

[0243] Embodiment 3

[0244] A second aspect of the present application provides a sensor through Embodiment 3, Image 6 A schematic diagram of the sensor structure in the third embodiment of the present application, such as Image 6 shown, the sensor includes:

[0245] The first verification module 11 is used to verify the access request information;

[0246] The parameter updating module 12 is used to update the sensor preset parameters after the verification is passed, and the sensor preset parameters include a pseudo-random sensor identification, a shared key between the sensor node and the gateway node;

[0247] The key generation module 13 is used to generate a session key, and sends request pass information to the gateway based on the session key and the updated sensor preset parameters;

[0248] The first communication module 14 is configured to perform secure communication with the user equipment by using the session key.

[0249] The sensor provided in this embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication and key negotiation method for a wireless sensor network, and the method comprises the steps: user equipment verifies the identity of a user through an intelligent card according to the identity information inputted by the user, and transmits login information to a gateway; the gateway verifies the identity of the user, generates access request information of the target sensor based on the first preset parameter of the gateway, and updates the first preset parameter of the gateway; the target sensor verifies the access request information, updates sensor preset parameters after verification is passed, generates a session key, and sends request passing information to the gateway; the gateway calculates the session key and verifies the request passing information, generates access confirmation information and updates a second preset parameter of the gateway; the user equipment calculates a session key, verifies the access confirmation information, and updates preset parameters of the smart card; the user equipment and the sensor communicate secretly using the session key. According to the method, anonymity and non-traceability of the nodes and confidentiality of communication are realized.

Description

technical field [0001] The application belongs to the technical field of wireless communication, and in particular relates to an authentication and key agreement method. Background technique [0002] Wireless Sensor Networks (WSNs) is one of the core technologies of the Internet of Things (IoT), which consists of heterogeneous sensors widely distributed in space and is mainly used to monitor physical or environmental variables. Wireless sensor network is mainly composed of three participants: sensor node (Sensor Node, SN), gateway node (Gateway Node, GWN) and user (User). Normally, SN collects different types of information and communicates with GWN; users can access real-time data of SN through GWN, and decide whether to take measures according to the application requirements in specific environments. Since the data collected by sensors is transmitted through wireless public channels, it is easy to be intercepted or even tampered by attackers, so the security issue of WSNs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/0431H04W12/041H04W12/0433H04W12/69H04W12/06H04W12/069H04W12/02H04W12/03H04W88/16H04L9/08H04L9/06
CPCH04W12/0433H04W12/0431H04W12/00H04W12/069H04W12/02H04W12/03H04W12/69H04W12/06H04L9/08H04L9/06H04W12/041H04W88/16
Inventor 张磊谷双吴铤齐永兴刘建伟关振宇
Owner HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products