Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication and key negotiation method, gateway, sensor and electronic equipment

A key agreement, sensor technology, applied in key distribution, can solve the problem of important data leakage, and achieve the effect of ensuring security and realizing anonymity

Pending Publication Date: 2022-04-08
HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the attacker may analyze the sensitive information of the target user through the identity information of the sensor node, and analyze the target range of the information collected by the user through the location information of the sensor node, resulting in the leakage of important data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and key negotiation method, gateway, sensor and electronic equipment
  • Authentication and key negotiation method, gateway, sensor and electronic equipment
  • Authentication and key negotiation method, gateway, sensor and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] The authentication and key negotiation method for a wireless sensor network in this embodiment is applied to a wireless sensor network. The wireless sensor network includes a sensor, a gateway, a smart card, and a user device. Wherein, the user logs in and accesses the target sensor through the user device and the smart card, and the user device can Terminal devices such as mobile phones, tablets, and computers are not limited here; there can be one or more sensors and gateways, and each sensor is connected to the gateway through a wireless network. The sensor is used to collect data and send the collected data to the gateway. The gateway processes the data and sends the processed data results to the user device; the user needs to register with the gateway before logging in, and then perform security authentication and key negotiation through the gateway and the sensor.

[0068] figure 1 It is a schematic flow diagram of the authentication and key agreement method of th...

Embodiment 2

[0112] In this embodiment, on the basis of the first embodiment, the specific implementation process of the method proposed in the application is described in detail. The method includes four execution subjects: user, smart card, sensor node and gateway node. The user here refers to the device used on the user side. The steps of the method include:

[0113] S1. Device initialization, including:

[0114] Step a1, the gateway node selects two random integers as the gateway node identity ID G and the master key K of the gateway node, and store it in the memory of the gateway node;

[0115] Step a2, the gateway node selects the sensor node identity ID for the sensor node S , and store it in the memory of the sensor node;

[0116] Step a3, the gateway node pre-initializes all smart cards, and selects a smart card ID for each smart card SC and store it on the smart card.

[0117] S2. User registration and sensor node registration.

[0118] When new users want to access the dat...

Embodiment 3

[0244] The second aspect of the present application provides a sensor through Embodiment 3, Figure 6 It is a schematic diagram of the sensor structure in Embodiment 3 of the present application, such as Figure 6 As shown, the sensor includes:

[0245] The first verification module 11 is configured to verify the access request information;

[0246] The parameter update module 12 is used to update the sensor preset parameters after the verification is passed, and the sensor preset parameters include a pseudo-random sensor identification, a shared key between sensor nodes and gateway nodes;

[0247] The key generation module 13 is used to generate a session key, and sends request passing information to the gateway based on the session key and the updated sensor preset parameters;

[0248] The first communication module 14 is configured to use the session key to perform secure communication with the user equipment.

[0249] The sensor provided in this embodiment can be used t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication and key negotiation method for a wireless sensor network, and the method comprises the steps: user equipment verifies the identity of a user through an intelligent card according to the identity information inputted by the user, and transmits login information to a gateway; the gateway verifies the identity of the user, generates access request information of the target sensor based on the first preset parameter of the gateway, and updates the first preset parameter of the gateway; the target sensor verifies the access request information, updates sensor preset parameters after verification is passed, generates a session key, and sends request passing information to the gateway; the gateway calculates the session key and verifies the request passing information, generates access confirmation information and updates a second preset parameter of the gateway; the user equipment calculates a session key, verifies the access confirmation information, and updates preset parameters of the smart card; the user equipment and the sensor communicate secretly using the session key. According to the method, anonymity and non-traceability of the nodes and confidentiality of communication are realized.

Description

technical field [0001] The application belongs to the technical field of wireless communication, and in particular relates to an authentication and key agreement method. Background technique [0002] Wireless Sensor Networks (WSNs) is one of the core technologies of the Internet of Things (IoT), which consists of heterogeneous sensors widely distributed in space and is mainly used to monitor physical or environmental variables. Wireless sensor network is mainly composed of three participants: sensor node (Sensor Node, SN), gateway node (Gateway Node, GWN) and user (User). Normally, SN collects different types of information and communicates with GWN; users can access real-time data of SN through GWN, and decide whether to take measures according to the application requirements in specific environments. Since the data collected by sensors is transmitted through wireless public channels, it is easy to be intercepted or even tampered by attackers, so the security issue of WSNs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W12/0431H04W12/041H04W12/0433H04W12/69H04W12/06H04W12/069H04W12/02H04W12/03H04W88/16H04L9/08H04L9/06
CPCH04W12/0433H04W12/0431H04W12/00H04W12/069H04W12/02H04W12/03H04W12/69H04W12/06H04L9/08H04L9/06H04W12/041H04W88/16Y02D30/70
Inventor 张磊谷双吴铤齐永兴刘建伟关振宇
Owner HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products