Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A wireless security authentication method based on block chain technology

A wireless security and authentication method technology, applied in the field of information security, can solve the problems of large amount of Hash calculation, inability to resist replay attacks, and inability to resist internal attacks, etc., to achieve the effect of reducing overhead

Active Publication Date: 2021-10-15
NANTONG UNIVERSITY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In 1981, Lamport first proposed a password authentication scheme, which solved the security problem of communication in an insecure channel. However, this scheme has some disadvantages: (1) It cannot resist replay attacks; (2) The calculation amount of Hash is relatively large. Big
In 2011, Khan et al. analyzed the scheme of Wang et al., and found that users cannot choose passwords freely, smart cards cannot be logged out after being stolen or lost, and cannot resist internal attacks.
[0006] Aiming at the security problems existing in traditional identity authentication, the present invention proposes a wireless security authentication method based on block chain technology. Since block chain has the advantages of decentralization, point-to-point transmission, consensus mechanism and cryptography technology, it can ensure user information storage In the blockchain distributed ledger, it will not be tampered with or lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless security authentication method based on block chain technology
  • A wireless security authentication method based on block chain technology
  • A wireless security authentication method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Table 1 Scheme symbol meaning

[0030]

[0031] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0032] A wireless security authentication method based on blockchain technology, including a registration stage and a login authentication stage.

[0033] Such as figure 1 As shown, the specific steps of the user in the registration phase are as follows:

[0034] Step1: User U i Enter your username ID i , password PW iThe registration operation R is performed with the random number n (when the user performs the registration operation, the random number is automatically assigned), and is transmitted to the blockchain server S through a secure channel.

[0035]

[0036] Step2: The blockchain server S receives the information sent by the user, uses the random private key generation function Gen() to process the input random number, and generates the private key K s , use the private key to generate the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a wireless security authentication method based on blockchain technology, which utilizes a consensus mechanism combining proof of work and extending the longest chain to record user information generation transactions in a non-tamperable and decentralized blockchain In the account book, the user registration phase and the user login and authentication phase protocols are designed respectively. It can effectively avoid common attack methods such as Distributed Denial of Service (DDoS) attacks, so that users can safely identify network devices in a wireless network environment, and will not be attacked by malicious users. In addition, less computation is used, which can effectively reduce the overhead of computation cost.

Description

technical field [0001] The present invention relates to information security technology, in particular to a wireless security authentication method based on block chain technology. Background technique [0002] With the rapid development of information security technology and wireless network equipment, users can freely access the network through wireless network equipment. However, with the openness of wireless networks, the network environment is full of uncertainties, and insecure factors such as various network attacks and camouflage methods also follow. Network security issues are getting more and more attention. The first line of defense to ensure network communication and data security is to be able to accurately identify users among many wireless network devices. Identity authentication is the basis of information security in network systems. [0003] In 1981, Lamport first proposed a password authentication scheme, which solved the security problem of communicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F21/64G06Q40/04
CPCG06F21/45G06F21/64G06Q40/04
Inventor 王杰华胡兆鹏朱晓辉高瞻邵浩然
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products