A lightweight certificateless industrial internet of things access control method and system

An industrial Internet of Things and access control technology, which is applied in the field of certificateless industrial Internet of Things access control, can solve problems such as limited computing resources of equipment, and achieve the effect of reducing the amount of calculation, ensuring security, and reducing the number of interaction rounds

Active Publication Date: 2021-12-21
HANGZHOU DIANZI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to propose a lightweight access control method for the Industrial Internet of Things without a certificate, aiming at the problem of limited computing resources of the equipment in the security protection of the Industrial Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight certificateless industrial internet of things access control method and system
  • A lightweight certificateless industrial internet of things access control method and system
  • A lightweight certificateless industrial internet of things access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The specific embodiments of the present invention will be further described and explained in detail below in conjunction with the drawings and specific embodiments.

[0074] Such as figure 1 As shown, a lightweight certificateless industrial Internet of Things access control method uses the local server as a trusted third party, using public key-based challenge responses, tokens and passwords to achieve mutual authentication between users and resource servers, and The communication key negotiation is integrated into the authentication process, which effectively reduces the number of interaction rounds in the authentication process while ensuring the security of user authentication and key negotiation.

[0075] The method is based on the following settings: the resource server RS ​​and the local central server LCS responsible for its authentication have preset the public key information of the other party, the resource server RS ​​presets the address information of the l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight access control method and system for the industrial internet of things without a certificate. According to the idea of ​​OAuth, the local central server responsible for authorization authenticates both parties. Unlike ACE‑OAuth, which requires traditional (such as certificate-based) communication key negotiation before authentication, this method uses the local server as a trusted first Three parties, use public key-based challenge responses, tokens and passwords to realize two-way authentication between users and resource servers, and integrate communication key negotiation into the authentication process, while ensuring security, resource servers do not need to distribute and receive certificates and verification, which can effectively reduce the number of interactive rounds in the authentication process, thereby effectively reducing the amount of communication data transmission and key negotiation calculation consumption, including CPU occupation, disk occupation, memory occupation, etc., which is more advantageous in terms of security and practicability , more suitable for resource-constrained environments such as the Industrial Internet of Things.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a lightweight certificateless industrial Internet of Things access control method and system. Background technique [0002] The "Internet of Everything" feature of the Internet of Things allows IoT devices that were originally isolated from the external network to be seamlessly integrated into the Internet infrastructure, which makes IoT devices vulnerable to attacks and abuse. How to optimize the security authentication and Access control of resource devices has become an urgent problem in the current security protection of the Internet of Things. However, traditional solutions, such as Radius authentication protocol, NAC authentication scheme, OpenID, etc., do not take into account the limited computing resources of IoT devices, making it difficult for them to meet the scalability, interoperability and portability of IoT systems. internal needs. [0003] In this...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L63/0807H04L63/083H04L9/0838H04L9/3213
Inventor 陈庆南吴铤郑秋华董铃胡程楠夏帅凡陈安邦潘莉莉崔婷婷高梦州张旭丁文倩翟亮李潇原
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products