Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet-of-Things dynamic NTRU access authentication method based on time information

A technology of time information and access authentication

Active Publication Date: 2021-04-02
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the deficiencies in the prior art, the present invention provides a dynamic NTRU access authentication method based on time information, using dynamically changing time series as MD5 Function secret key, which solves the internal attack security problem generated by the fixed MD5 function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-Things dynamic NTRU access authentication method based on time information
  • Internet-of-Things dynamic NTRU access authentication method based on time information
  • Internet-of-Things dynamic NTRU access authentication method based on time information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be further described below in conjunction with the accompanying drawings. However, it should be noted that these implementations are not limitations to the present invention, and the functions, methods, or structural equivalent transformations or substitutions made by those skilled in the art based on these implementations are all included in the protection scope of the present invention. .

[0069] figure 1 It is the power Internet of things network terminal equipment D i The specific process of secure access. The power Internet of Things is a large-scale industrial Internet of Things, and its architecture includes three typical network structures: the Internet of Things perception extension layer, network transmission layer and platform application layer. NB-IoT and eMTC devices are connected to mobile base stations, and LoRa and Sigfox devices are connected to edge computing MME servers with edge computing functions through dedicated IoT...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of communication, in particular to an Internet-of-Things dynamic NTRU access authentication method based on time information, which comprises the following steps: asystem user HSS server sends initialization information, and power Internet-of-Things terminal equipment encrypts the initialization information by using an NTRU security encryption algorithm with anMD5 function to form authentication information containing the time information, and sends the authentication information to an edge computing MME server; after the edge computing MME server receivesthe authentication information, MD5 functions of three adjacent time points are calculated to achieve system synchronization, the edge computing MME server uses the MD5 functions for calculation to obtain returned authentication information, and the electric power Internet-of-Things terminal device compares and verifies the returned authentication information of the edge computing MME server and local information; and if verification succeeds, an encrypted secure channel is established.

Description

technical field [0001] The invention relates to the communication field, in particular to a time information-based dynamic NTRU access authentication method for the Internet of Things. Background technique [0002] Due to the large number of terminal devices at the perception layer of the electric power Internet of Things and low computing power, the existing security access protocols of the Internet of Things cannot meet the application requirements for secure access to the electric power Internet of Things. Resource constraints make it difficult to implement complex authentication and encryption algorithms. At present, most IoT network authentication schemes use Elliptic Curve Cryptography (ECC), but the ECC algorithm involves point multiplication operations, and the calculation efficiency is low, so it is not suitable for application in IoT network terminals with low-power embedded technology. . At the same time, the security of the ECC algorithm is sensitive to the dis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/041H04W12/06H04W12/122H04L9/06H04L9/30
CPCH04W12/06H04L9/0643H04L9/3093Y02D30/70
Inventor 李兴华李晓龙王峰闫振华段文奇朱东歌
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products