Internet of Things client privacy protection authentication method based on edge computing

An edge computing and authentication method technology, applied in the field of information security, can solve problems affecting system security, unaffordable, and no longer able to obtain specific identity information of signers, so as to ensure key application and management, and improve efficiency.

Pending Publication Date: 2022-04-12
中科水研(江西)科技股份有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] These pseudonym mechanisms based on symmetric ciphers, asymmetric ciphers, and identity ciphers are static in nature and cannot meet the needs of dynamic or frequently updated IoT systems. The development of attribute encryption technology provides a new solution to this problem. direction
In the attribute signature system, the signer constructs a legal signature according to the predicate strategy of the commitment, and after the verifier successfully verifies the signature, he can obtain that the signed message has not been tampered with and the signer does have the attribute set that satisfies the predicate strategy, but cannot Get more specific identity information of the signer
[0004] However, in the traditional attribute signature mechanism, a single authorization center can forge the signature of any client by generating a client key, or when the authorization center is attacked, the entire system will be threatened
Although multiple authorization attribute signature schemes have been constructed, they have not changed the fact that the central authorization center determines the system master key, so they have not fundamentally solved the key escrow problem
At the same time, as the client moves and its location changes, the revocation of the client is also a big challenge. The only credible authorization center may issue private keys for illegal clients for the sake of reputation or fail to update the private key for revocation clients in time. These will affect the security of the system; in the final signature generation process, a large number of power operations and bilinear operations with high computational complexity are unaffordable for mobile devices with limited computing power and storage resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things client privacy protection authentication method based on edge computing
  • Internet of Things client privacy protection authentication method based on edge computing
  • Internet of Things client privacy protection authentication method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Below in conjunction with the drawings, preferred embodiments of the present invention are given and described in detail.

[0065] The entities involved in the embodiments of the present invention include:

[0066] Central base station (BS): as the global trusted certificate center of the system, it initializes the system and accepts the registration of legal clients and edge servers;

[0067] Edge Server (ES): Multiple Edge Servers manage the same set of system attributes and issue attribute key components for each IoT client;

[0068] Internet of Things client: only a client with a legal attribute key can construct a signature that satisfies the corresponding predicate policy, and signature verification does not require any additional information, and any client entity can complete signature verification.

[0069] Such asfigure 1 As shown, the embodiment of the present invention provides a privacy protection authentication method for the Internet of Things client bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet of Things client privacy protection authentication method based on edge computing, which comprises the following steps: S1, a central base station establishes public parameters of a system, completes registration of all clients and n edge servers, and constructs a binary tree according to the upper limit of the number of the clients, each edge server generates a group of public and private key pairs, a public key is safely shared to any entity in the system, and the central base station generates a public key of the system according to the public key of the edge server; s2, issuing an attribute key to the client; s3, the cloud server calculates a cloud server token according to the attribute key, and the client generates a signature message according to the cloud server token; s4, any other client judges whether the signature message is legal or not according to a predicate strategy, if yes, 1 is output, and if not, 0 is output; and S5, realizing revocation of the client by using a binary tree structure.

Description

technical field [0001] The present invention relates to the technical field of information security, and more particularly to an authentication method for privacy protection of an Internet of Things client based on edge computing. Background technique [0002] In the process of message transmission, IoT devices ensure the integrity of transmitted messages by introducing various signature mechanisms. However, in traditional digital signature mechanisms, verification is performed against a specific public key, which completely exposes the associated identity information to any verification entity. In other words, such a signature mechanism does not provide any privacy or anonymity requirements. In order to balance message integrity verification and identity privacy protection, various schemes have been proposed to solve these two security problems at the same time. In particular, pseudonym technology is widely used in the aspect of realizing anonymous communication and prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/041H04L9/08H04L9/06H04L41/042H04L41/18H04L67/10
CPCY02D30/70
Inventor 不公告发明人
Owner 中科水研(江西)科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products