Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mass Internet of Things equipment authentication method, storage medium and information data processing terminal

A technology of IoT devices and authentication methods, applied in information data processing terminals, authentication methods for massive IoT devices, and storage media fields, can solve the problem of inability to bind access requests to their sources, dependencies, lack of security identification and identity authentication management mechanisms And other issues

Active Publication Date: 2021-07-06
XIDIAN UNIV
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the huge number of IOT devices and numerous categories, there is still a lack of a unified security identification and identity authentication management mechanism
[0003] Identity authentication mechanism is an important tool to ensure the effectiveness of communication, but remote authentication of IOT devices with limited computing resources is vulnerable to insecure communication channels
Since the construction of smart cities needs to consider the remote authentication of massive IOT devices, the traditional certification scheme cannot be fully applied
In the traditional proof scheme, the user provides a set of credentials with proofs such as passwords or digital certificates. There are problems of relying on certificates and not being able to bind access requests to their sources, and most of them can only prove one-to-one or one verifier proves all Authenticators, so new solutions need to be put forward
[0004] Through the above analysis, the existing problems and defects of the existing technology are as follows: in the traditional certification scheme, the user provides a set of credentials with password or digital certificate and other proofs, and there are problems of relying on the certificate and not being able to bind the access request to its source. And most of them can only prove one-to-one or one verifier can prove all authenticators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mass Internet of Things equipment authentication method, storage medium and information data processing terminal
  • Mass Internet of Things equipment authentication method, storage medium and information data processing terminal
  • Mass Internet of Things equipment authentication method, storage medium and information data processing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0055] Aiming at the problems existing in the prior art, the present invention provides a massive Internet of Things device authentication method, a storage medium, and an information data processing terminal. The present invention is applicable to the scene of unified authentication of massive IOT devices in smart cities. By selecting IOT devices with high credit value and successful authentication to become AG, it assists IOC in authenticating massive IOT devices, reduces the network pressure of IOC, and uses reputation mechanism to The behavior of each IOT device is monitored, which can effectively defend against DOS att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of Internet of Things security, and discloses a massive Internet of Things equipment authentication method, a storage medium and an information data processing terminal. The massive Internet of Things equipment authentication method comprises the steps: IOT equipment interacts with a smart city operation center IOC, and equipment initialization is completed through a secure channel; the equipment initialization stage is completed, and an aggregator AG is selected through the IOC to perform aggregator authentication; after the aggregator authentication is completed, the IOT equipment completes group authentication under the assistance of the AG; and after the group authentication is completed, the intra-group equipment completes session key negotiation under the assistance of the AG. According to the method, the equipment with the high trust value is selected as an aggregator to assist the IOC to carry out group certification on other equipment, so that remote certification of massive IOT equipment is more reliable and efficient. Meanwhile, a reputation mechanism is used for supervising the trust value of the equipment, and the situation that the whole system network is affected due to the fact that the successfully authenticated equipment is dealt with by an attacker is prevented.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to a massive Internet of Things device authentication method, a storage medium, and an information data processing terminal. Background technique [0002] At present, with the popularization of 5G, the Internet of Things will also be fully developed and applied due to the increase in network communication speed. IOT devices have been widely used in the construction of smart cities. The "smartness" of smart cities is mainly reflected in intelligent perception, comprehensive interconnection, resource sharing, and collaborative cooperation. The identity verification of IOT devices is a major challenge to the security of smart cities. The attacker can maliciously place counterfeit devices, forge their identities and pretend to be legitimate devices to access the network, thereby illegally receiving and sending information. Attackers can also take advanta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/08H04L63/06H04L9/3278H04L9/3297H04L9/0838
Inventor 曹进韩雨溪李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products