Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Expandable lightweight proving method for Internet of Things equipment

A lightweight technology for Internet of Things devices, applied in key distribution, can solve the problems of low-end embedded devices and expensive public key encryption, high memory usage and power consumption, and achieve good application value, low overhead, and attack resistance

Active Publication Date: 2019-07-16
HANGZHOU VOCATIONAL & TECHN COLLEGE
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But DARPA is not suitable for low-end embedded devices and public key encryption is expensive; and SCAPI must rely on some hard assumptions (such as requiring half of the devices in the network to be uncompromising), and the memory usage and power consumption are extremely high due to the discovery and exchange of many channel keys.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Expandable lightweight proving method for Internet of Things equipment
  • Expandable lightweight proving method for Internet of Things equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail in conjunction with the accompanying drawings and specific embodiments.

[0022] A scalable lightweight proof method for IoT devices such as figure 1 shown, including the following specific steps:

[0023] 1) Verifier settings, including: the verifier V first randomly selects the last key K j to generate a one-way keystring of length j, and use K 0 Initialize the device as the commitment key and use K 0 Execute F recursively to verify all other keys in the keychain. Press K for the rest of the keys 1 to K j The sequence of is used as a session key to authenticate packets exchanged during the attestation phase. The validator V then divides time into discrete time intervals, one of which has a maximum duration T a Should not last longer than the overall physical attack time T t. Each time interval is divided into a number of unequal discrete time subintervals. The present invention assumes four non-overla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An expandable lightweight proof method for Internet of Things equipment comprises the following specific steps: verifier setting: K0 is used as committed key initialization equipment, and recursion inspection of other keys is executed; prover initialization: each prover P is initialized by using public and private values, and each verifier V is initialized by using two equipment related keys for authentication and software integrity; starting of a remote proof: the verifier V generates a new random value Nnew and creates a proof request (Attest<req>); secret key leak: the verifier V broadcaststhe verification secret key to all nearby testers P; authentication report implementation: each verifier V checking whether its cluster ID is included in a second list (A<calc>) of attestation requests; physical and remote attack detection: remotely damaged devices are detected by aggregation incapable of participating in proof reports. According to the method, the running overhead and memory occupation are reduced, and the method can be used for static and dynamic networks consisting of thousands of heterogeneous Internet of Things devices.

Description

technical field [0001] The invention relates to a scalable lightweight certification method for IoT devices. [0002] technical background [0003] Contemporary IoT applications are distributed in nature, embedded in widely deployed heterogeneous computing devices forming large mesh networks or swarm physics. Modern IoT devices create a huge new attack surface as they routinely deal with privacy-sensitive issues and perform security-critical tasks. Remote attestation detects cyber threats by remotely verifying the internal state of network-embedded devices by trusted entities, and is used to reveal the misbehavior of network protocols and IoT devices. At present, the popular DARPA and SCAPI proof methods all consider long-range physical attacks. But DARPA is not suitable for low-end embedded devices and public key encryption is expensive; and SCAPI must rely on some hard assumptions (such as requiring half of the devices in the network to be uncompromising), and the memory ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0861H04L9/0869H04L63/0435H04L63/1441H04L67/12
Inventor 袁江军王杰车菊燕邵睿智
Owner HANGZHOU VOCATIONAL & TECHN COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products