Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication key protocol of block chain applied to edge of wireless sensor network

A wireless sensor, authentication key technology, applied in network topology, wireless communication, transmission system, etc., can solve problems such as threats that are not suitable for network edge quality information management applications, lightweight solution attacks, etc.

Pending Publication Date: 2022-05-13
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, many existing identity authentication security solutions are not suitable for quality information management applications at the edge of the network, and existing lightweight solutions are vulnerable to various attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication key protocol of block chain applied to edge of wireless sensor network
  • Authentication key protocol of block chain applied to edge of wireless sensor network
  • Authentication key protocol of block chain applied to edge of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] It should be noted that, in the following examples, these documents will be cited:

[0087] [1] Li D, Peng W, Deng W, et al. A blockchain-based authentication and security mechanism for IoT [C]. 2018, 27th International Conference on Computer Communication and Networks (ICCCN), 2018: 1-6.

[0088] [2] Qiongqiong D, Dinghua X, Hongzhou S. Scheme Design of Intelligent Object Authentication Technology Based on Blockchain [J]. Information Network Security, 2018, 18(9):95-101.

[0089] [3] Zhang L, Li H, Sun L, et al. Poster: towards fully distributed user authentication with blockchain [C]. 2017, IEEE Symposium on Privacy-Aware Computing (PAC), 2017: 202-203.

[0090] [4] Li F, Han Y, Jin C. Practical access control for sensor networks in the context of the Internet of Things [J]. Computer Communications, 2016, 89: 154-164.

[0091] [5] Tewari A, Gupta B. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags [J]. The Jour...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication key protocol of a block chain applied to the edge of a wireless sensor network, a wireless sensor is accessed to the network through a gateway node, the gateway node transmits data to an edge server, and the edge server is responsible for storing and calculating data generated by a large amount of Internet of Things equipment at an edge end; before entering an Internet of Things environment and starting to work, a trusted registration mechanism firstly registers a specific gateway node, an edge server, all wireless sensors subordinate to the specific gateway node and a user node closest to the specific gateway node; the registration comprises registration of a wireless sensor and a gateway node, registration of an edge server Leader node and registration of a client node, and then authentication and key negotiation are carried out. The requirement of lightweight application can be met; and an access control scheme suitable for the scene is designed by utilizing the characteristics of the distributed block chain and a network edge structure, so that a new thought is provided for cross-domain key negotiation based on the block chain.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things equipment, and in particular relates to an authentication key agreement applied by a block chain at the edge of a wireless sensor network. Background technique [0002] Informatization equipment will use the rapid development of artificial intelligence technology to become intelligent, and in this process, edge computing can enable IoT equipment to solve problems such as resource constraints. In the harsh environment at the edge of the network, various IoT devices are vulnerable to multiple security threats. And due to the limited equipment hardware resources in the network edge environment, the security solution based on the alliance chain framework must be both secure and lightweight in terms of processing and storage. However, many existing identity authentication security solutions are not suitable for quality information management applications at the edge of the network, and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/0431H04W12/0433H04W12/06H04W12/00H04W84/18H04L67/1097
CPCH04W12/0431H04W12/0433H04W12/06H04W12/009H04W84/18H04L67/1097Y02D30/70
Inventor 吴启武甘波姜灵芝周阳
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products