Authentication and key negotiation method, gateway, sensor and electronic equipment
A key agreement, sensor technology, applied in key distribution, can solve the problem of important data leakage, and achieve the effect of ensuring security and realizing anonymity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0066] Example 1
[0067] The authentication and key agreement method for a wireless sensor network in this embodiment is applied to a wireless sensor network. The wireless sensor network includes a sensor, a gateway, a smart card, and a user equipment. The user logs in to the target sensor through the user equipment and the smart card, and the user equipment can It is a terminal device such as a mobile phone, tablet, computer, etc., which is not limited here; there can be one or more sensors and gateways. Each sensor is connected to the gateway through a wireless network. The sensor is used to collect data and send the collected data to the gateway. The gateway processes the data and sends the processed data results to the user device; before the user logs in, he needs to register with the gateway first, and then perform security authentication and key negotiation through the gateway and the sensor.
[0068] figure 1 A schematic flowchart of an authentication and key agreeme...
Example Embodiment
[0111] Embodiment 2
[0112] In this embodiment, on the basis of Embodiment 1, the specific implementation process of the method proposed in the application is described in detail. The method includes four execution subjects: a user, a smart card, a sensor node and a gateway node, where the user refers to a device used by the user side, and the steps of the method include:
[0113] S1. Device initialization, including:
[0114] Step a1, the gateway node selects two random integers as the gateway node identity ID G and the gateway node master key K, and store it in the gateway node's memory;
[0115] Step a2, the gateway node selects the sensor node identification ID for the sensor node S , and store it in the memory of the sensor node;
[0116] Step a3, the gateway node pre-initializes all smart cards, and selects a smart card identity ID for each smart card SC and store it on the smart card.
[0117] S2, user registration and sensor node registration.
[0118] When a n...
Example Embodiment
[0243] Embodiment 3
[0244] A second aspect of the present application provides a sensor through Embodiment 3, Image 6 A schematic diagram of the sensor structure in the third embodiment of the present application, such as Image 6 shown, the sensor includes:
[0245] The first verification module 11 is used to verify the access request information;
[0246] The parameter updating module 12 is used to update the sensor preset parameters after the verification is passed, and the sensor preset parameters include a pseudo-random sensor identification, a shared key between the sensor node and the gateway node;
[0247] The key generation module 13 is used to generate a session key, and sends request pass information to the gateway based on the session key and the updated sensor preset parameters;
[0248] The first communication module 14 is configured to perform secure communication with the user equipment by using the session key.
[0249] The sensor provided in this embod...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap