Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-domain authentication and key agreement method based on block chain in Internet of Things environment

A technology of key agreement and blockchain, which is applied in the field of cross-domain authentication and key agreement, which can solve problems such as inability to resist man-in-the-middle attacks, reduced scalability, and high communication costs, so as to avoid single point of failure and reduce network burden , Calculate the effect of small amount of data

Pending Publication Date: 2022-07-05
HUNAN UNIV OF SCI & TECH
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Scholars have done the following research on IoT cross-domain authentication and key agreement based on the PKI system: In 2014, Zhang Wenfang and others established a trust link with the help of a virtual bridge CA to realize virtual enterprise-level PKI inter-domain authentication. The elliptic curve threshold signature scheme needs to split the key factor when signing, resulting in higher communication costs, and the scalability of user addition and cancellation will also be reduced
In 2018, Zhou Zhicheng and others used blockchain technology to design a trust model based on the Blockchain Certificate Authority (BCCA) to achieve efficient cross-domain authentication and effectively reduce the number of signatures and verifications in the public key algorithm. However, the design A large number of plaintext communications are used, and there is a greater risk of privacy leakage
In 2021, Zhang Jinhua and others designed a blockchain-based cross-domain authentication and key agreement protocol in an edge computing environment, but the ordinary DH protocol cannot resist man-in-the-middle attacks during key negotiation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain authentication and key agreement method based on block chain in Internet of Things environment
  • Cross-domain authentication and key agreement method based on block chain in Internet of Things environment
  • Cross-domain authentication and key agreement method based on block chain in Internet of Things environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The utility model will be further described below with reference to the accompanying drawings and embodiments.

[0074] like figure 2 shown, figure 2 is the system frame diagram of the present invention, ES A As an edge server, it manages the devices in the trusted domain A (Domain A) and acts as a bridge between the end entity E and the Blockchain Certificate Authentication (BCCA). BCCA uploads the received information to the blockchain, and uses the immutability and traceability of the blockchain to ensure the authenticity and accuracy of the information. Edge entity E a After registration, it can communicate with post-authentication entities in the domain, and can also access cross-domain devices.

[0075] like figure 1 As shown, a blockchain-based cross-domain authentication and key agreement method in the Internet of Things environment includes the following steps:

[0076] (1) Initialization: Each entity, edge server and blockchain-based certificate author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-domain authentication and key negotiation method based on a block chain in an Internet of Things environment. The method comprises the following steps: (1) initialization: each entity, an edge server and a block chain-based certificate authority center BCCA generate own public and private key pairs in an initialization stage; (2) user registration: the entity initiates a registration request to the BCCA through the edge server, and the legal entity receives a digital certificate returned by the edge server; (3) intra-domain authentication: initiating identity authentication in the home domain to the edge server by the entity which has been registered and has the digital certificate; and (4) inter-domain authentication: identity authentication performed by the trusted entity of one domain to another domain is recorded as inter-domain authentication. According to the invention, an Internet of Things entity identity authentication and key agreement protocol based on an elliptic curve is designed, high-efficiency communication of low-performance terminal equipment is ensured, higher security performance can be provided, and the method is more suitable for Internet of Things edge equipment with lower performance.

Description

technical field [0001] The invention relates to a block chain-based cross-domain authentication and key negotiation method in the Internet of Things environment. Background technique [0002] Due to the heterogeneity in the IoT environment and the existence of multiple different security domains, in which low-performance terminal devices represented by users have limited computing capabilities, in some IoT scenarios requiring real-time and security, traditional centralized It is difficult to realize the efficient cross-domain authentication and key agreement communication of "edge device-terminal device" in the existing edge computing environment. Based on public key infrastructure (Public Key Infrastructure, PKI) authentication technology relies on digital certificates for identity authentication, through encryption technology to ensure information security is not leaked, PKI as a security infrastructure, can provide identity authentication, data integrity, data confidentia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L9/40H04L67/1001H04L67/12
CPCH04L9/0861H04L9/0838H04L9/3263H04L9/3066H04L63/0442H04L63/0876H04L63/0823H04L63/10H04L63/1441H04L67/12H04L2209/72
Inventor 张世文晏紫微李梦玲何家毅梁伟
Owner HUNAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products