CN109889532A - Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context - Google Patents
Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context Download PDFInfo
- Publication number
- CN109889532A CN109889532A CN201910173914.0A CN201910173914A CN109889532A CN 109889532 A CN109889532 A CN 109889532A CN 201910173914 A CN201910173914 A CN 201910173914A CN 109889532 A CN109889532 A CN 109889532A
- Authority
- CN
- China
- Prior art keywords
- equipment
- fingerprint
- internet
- event
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of internet of things equipment safety certification and cryptographic key negotiation method based on environmental context are mainly generated comprising device-fingerprint, three processes of authentication and key agreement.The device-fingerprint generating process, using the roughly the same principle of the time interval of the same event generation of device-aware in same environment, the consistency for the time interval that binding events detection, affair clustering and same event occur generates device-fingerprint.The authentication procedures judge whether it is safety equipment by the verifying to new equipment fingerprint for verifying whether the new equipment that system is added is safety equipment under same environment.The cipher key agreement process ensures communication safety for generating unified session key for internet of things equipment in system.The safe matching method of internet of things equipment provided by the present invention is more convenient, effectively, securely and reliably.
Description
Technical field
The invention belongs to Internet of Things field of communication technology, it is related to a kind of internet of things equipment safety certification and key agreement side
A kind of method, and in particular to internet of things equipment safety certification and cryptographic key negotiation method based on environmental context.
Background technique
It is household appliance, daily necessity, wearable with the continuous development of technology of Internet of things and the maturation of Internet technology
The various internet of things equipment connections such as equipment, which network, has become reality.However these internet of things equipment provide the user with easily together
When, there is also certain security risks.The processing capacity of internet of things equipment is limited, and the data of equipment creation generally comprise
The movable privacy-sensitive information of relevant user will cause the influence that can not be retrieved once being obtained by attacker.
In order to guarantee the secure communication between internet of things equipment, when newly deployed internet of things equipment is added, need by adding
Key and existing equipment carry out safety certification to avoid the attack such as man-in-the-middle attack and agreement manipulation.Traditional safety certification association
When discussing and need user that realization is manually operated, such as carrying out equipment certification using bluetooth or wireless network, user is needed to be manually entered
Password is authenticated.This method requires equipment that there is interactive interface can complete to authenticate, and is only applicable to Internet of Things and sets
Standby less scene, when internet of things equipment quantity is larger, it will increase burden for users.Although can be configured for internet of things equipment
Preload key, interactive interface or dedicated pairing hardware (such as NFC), but these methods can make device manufacturer over-burden
And increase equipment cost.
The defect that can be good at making up conventional security authentication protocol based on environmental context authentication method, using being present in
The characteristics of equipment under same environment will perceive similar case, the similarity signal variation detected according to equipment generate similar
Device-fingerprint carry out authentication.But the sensor type of equipment is often multiplicity, heterogeneous sensor collects signal
The difference of type will will increase the difficulty of data processing, and reality will be difficult to by generating similar fingerprints there are the equipment under same environment
It is existing.
In addition, equipment is matched two-by-two can be realized communication in Internet of things system, but works as and set with what is do not matched directly
The transmitting of information is carried out for the equipment for when being communicated, needing to have been carried out pairing by other, this will will increase depositing for equipment
Store up cost and communications cost.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides a kind of internet of things equipment based on environmental context to recognize safely
Card and key agreement scheme, it can be realized same to avoid the problem for causing data processing difficulty because of sensor type difference
Internet of things equipment shares unified session key under environment, and without user's manual authentication, mitigates burden for users, increase in fact
The property used.
The technical scheme adopted by the invention is that: a kind of internet of things equipment safety certification and key based on environmental context
Machinery of consultation, each equipment in Internet of things system has unique device id, exists in system through safety certification
Credible equipment, the session key of system are K;
Characterized by comprising the following steps:
Step 1: elder generation generating device fingerprint F when system is added in new equipment NN;
The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint;
Step 2: carrying out authentication with credible equipment again;
For verifying whether the new equipment that system is added is safety equipment under same environment, by new equipment fingerprint
Verifying judges whether it is safety equipment;
If so, executing following step 3;
If not, this process terminates;
Step 3: by carrying out key agreement with credible equipment after certification, finally calculating new session key;For for
Internet of things equipment generates unified session key in system, ensures communication safety.
Compared with prior art, advantage and good effect are mainly reflected in the following aspects to the present invention:
(1) it can eliminate participation artificial in equipment safety verification process, be suitable for more fields compared to traditional approach
Scape, and alleviate burden for users;
(2) it unanimously generates device-fingerprint according to the time interval of the same event of device-aware under same environment, overcomes
The problem of data processing difficulty caused by heterogeneous sensor signal type is different;
(3) it can authenticating device it is whether credible, and generate the unified session key of communication between devices, ensure that Internet of Things
Communication security in system.
Detailed description of the invention
Fig. 1 is the flow chart of the embodiment of the present invention;
Fig. 2 is the schematic diagram of device-fingerprint generating process in the embodiment of the present invention;
Fig. 3 is the schematic diagram of authentication procedures in the embodiment of the present invention;
Fig. 4 is the schematic diagram of cipher key agreement process in the embodiment of the present invention.
Specific embodiment
For the ease of the understanding and the implementation present invention of this field general technical staff, with reference to the accompanying drawings and embodiments to this
Invention is described in further detail, it should be understood that and implementation example described herein is merely to illustrate and explain the present invention, and
It is not used in the restriction present invention.
A kind of internet of things equipment safety certification and key agreement based on environmental context that technical solution of the present invention provides
Scheme generates, three processes of authentication and key agreement comprising device-fingerprint.Device-fingerprint generate main thought be based on
Lower 3 points: (1) original signal that different types of sensor obtains has different characteristics;(2) sensor on distinct device
Same event can be perceived in substantially the same manner;(3) different sensors perceive the time interval substantially phase that same event occurs
Together.The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint.Identity is recognized
Card process judges whether it is credible equipment by the verifying to device-fingerprint.Cipher key agreement process is internet of things equipment in system
Unified session key is generated, is ensured communication safety.
In the present invention, each equipment in Internet of things system has unique device id, exists in system and has passed through
The credible equipment of safety certification, the session key of system are K.New equipment N is added system and needs first generating device fingerprint FN, then with
Credible equipment carries out authentication, by carrying out key agreement with credible equipment after certification, finally calculates new session key.
Referring to Fig.1, a kind of internet of things equipment safety certification and key agreement based on environmental context provided by the invention
Method, comprising the following steps:
Step 1: elder generation generating device fingerprint F when system is added in new equipment NN;
The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint;
Step 2: carrying out authentication with credible equipment again;
For verifying whether the new equipment that system is added is safety equipment under same environment, by new equipment fingerprint
Verifying judges whether it is safety equipment;
If so, executing following step 3;
If not, this process terminates;
Step 3: by carrying out key agreement with credible equipment after certification, finally calculating new session key;For for
Internet of things equipment generates unified session key in system, ensures communication safety.
Fig. 2 shows the process of credible equipment generation device-fingerprint in new equipment N and system, specifically includes the following steps:
Step 1.1: the internet of things equipment in safety zone collects different types of signal data according to environmental change;
In the present embodiment, safety zone refers to certain physical boundary (such as house), to by credible equipment and its
He distinguishes in the perception of external device.Environmental change refers to a series of immesurable chance events occurred in region.
Step 1.2: noise reduction process being carried out to the original signal data that device sensor is collected into, signal is being kept significantly to become
Smooth signal while change;
In the present embodiment, noise reduction process is that exponentially weighted moving average filter (EWMA) is acted on discrete time sequence
X is arranged, i.e. y [k]=α * x [k]+(1- α) * y [k-1], wherein α, k, x [k] and y [k] respectively represent weight, sample index, sensing
Device data and rolling average data.By the effect of EWMA, it is able to maintain the significant feature of signal, and realizes signal smoothing.
Step 1.3: signal detection is carried out to the signal data after noise reduction, event signal and ambient noise are distinguished, and
And the corresponding signal time index of output;
In the present embodiment, the specific implementation of signal detection includes following sub-step:
Step 1.3.1: it executes threshold process and realizes signal detection, including lower threshold ThrlowerAnd upper limit threshold
Thrupper, utilize lower threshold ThrlowerEvent signal and ambient noise are distinguished, upper limit threshold Thr is utilizedupperRemoval institute
Some high-amplitude signals prevent the spoofing attack of attacker, wherein ThrupperIt can be after specific calibration phase
ThrlowerFunction;
Step 1.3.2: the continuous signal of script can be made to become discontinuously by threshold process, in order to more accurately carry out thing
Part cluster, ignores the of short duration discontinuity in threshold range between adjacent sectional signal, we utilize signal lump technology by phase
The adjacent of short duration continuous signal event group of discontinuous block signal collection assembly one;.
Step 1.4: carrying out affair clustering, the signal of similar incidents is clustered by way of unsupervised learning, to detecting
Event classify, and export different event cluster signal time index;
In the present embodiment, the specific implementation of affair clustering includes following sub-step:
Step 1.4.1: according to the function of each device sensor select one group of feature, to the maximum extent improve event can
The common temporal signatures such as degree of opinion, such as selection peak swing, duration and area under the curve are analyzed.It is mentioned by feature
It takes process to realize dimensionality reduction, while being preserved for the essential characteristic of differentiation event;
Step 1.4.2: executing K-Means cluster, using cluster group number k as input, calculates the Euclid between data point
Distance, selection cluster center of mass point to minimize distance, finally similar data point are output in the same cluster;
Wherein cluster group quantity, that is, sensor perceives the event type quantity occurred in environment, due to the thing occurred in environment
Part be it is random immesurable, equipment can not know the event how many type will occur, and need to be inferred to cluster using Elbow rule
The optimal value of group number k.Elbow rule selects optimal k value by k-J (cost function) figure.
The present embodiment Selection utilization K-Means cluster can eliminate the needs to the training stage.User or device manufacturer
Without carrying out the training of particular event type, burden for users can be mitigated, increase the practicality.
Step 1.5: carrying out fingerprint extraction, corresponding event cluster fingerprint is generated according to event cluster signal time index, in turn
Generating device fingerprint;
In the present embodiment, device-fingerprint is one group of event cluster fingerprint, i.e. all event cluster fingerprint set for arriving of device-aware,
These fingerprints indicate the context that equipment is observed jointly;
Wherein generating the specific implementation of event cluster fingerprint includes following sub-step:
Step 1.5.1: indexing according to event cluster time signal, the bit value of time interval between acquisition event
Step 1.5.2: pass through formulaCalculating event cluster fingerprint F.
Fig. 3 shows the process of credible equipment progress authentication in new equipment N and system, specifically includes the following steps:
Step 2.1: thinking that the new equipment N of addition system all credible equipments through safety certification into system send packet
Containing device id and the broadcast message requested is added;
Step 2.2: the information of credible equipment accepting device N, and send the device id of oneself to N and receive the letter of request
Breath;
Step 2.3: all devices detect environmental change in one section of specific time, are generated by step 1 respective
Device-fingerprint;
In the present embodiment, environmental change is the chance event occurred in the specific time, and equipment can not be predicted in advance will
Which event type occurs.
Step 2.4: each credible equipment is generated a random number x and is encrypted using device-fingerprint F to random number k,
Obtain ciphertext C=EF(x), it is sent to equipment N, wherein E indicates Encryption Algorithm;
Step 2.5: equipment N utilizes the device-fingerprint F of oneselfNIt is decrypted to obtain plaintext m to ciphertext C, and by the Hash of m
Value H (m) is sent to each credible equipment;
Step 2.6: whether each credible equipment is correct by calculating the m value that H (m) judges that equipment N is decrypted;If there is one
Equipment determines that equipment N decryption is correct, then N is just the credible equipment in same environment, determines that equipment N decrypts correct credible equipment
To N sending device ID and the correct information of decryption, otherwise N is insincere, does not send any information;
Step 2.7: equipment N record replys the device id of decryption correct information, these equipment are that " neighbour " of equipment N sets
It is standby.
Fig. 4 shows the process of credible equipment progress key agreement in new equipment N and system, specifically includes the following steps:
Step 3.1: equipment N sends the request for obtaining current sessions key to some " neighbour " equipment;
Step 3.2: being somebody's turn to do " neighbour " equipment and current sessions key K is encrypted, obtain ciphertext C=EF(K), it and is sent to
N;
Step 3.3: equipment N decrypts C to obtain K, and calculatesWhereinFor the event cluster fingerprint of equipment N, n is the event number of clusters amount that equipment N is detected;
Step 3.4: equipment N is according to KNIt carries out Hash operation and obtains KN'=H (KN), and then calculate new session keyAnd K ' encryption is obtained
Step 3.5: equipment N willIt is sent to oneself all " neighbour " equipment;
Step 3.6: " neighbour " equipment of equipment N decrypts to obtain new session key K ', and sends this key to oneself
" neighbour " equipment, until all equipment more new session key.
The update of session key needs more wheel interactions to complete in the present invention, it is contemplated that and internet of things equipment processing capacity is limited,
Equipment only needs to transmit ciphertext and device id, reduces communications cost and alleviates equipment storage burden.
In terms of safety, attacker can steal privacy of user sensitivity letter by the communication between eavesdropping internet of things equipment
For breath to realize this target, attacker can mobilize spoofing attack (Shamming attack) or man-in-the-middle attack (Man-
in-the-middle attack).The equipment of attacker is placed on outside safety zone but in range for wireless communication, it is intended to go to take advantage of
Deceive the credible equipment in a safety zone, may start two kinds of spoofing attack: (1) attacker's equipment can pass through
The event occurred inside perception outside safety zone is attempted to initiate eavesdropping attack;(2) attacker can make outside safety zone
The event of big noise or vibration is made to initiate signal injection attacks.In addition, attacker can also be by intercepting key agreement phase
The communication information of equipment room initiates man-in-the-middle attack.
For the first spoofing attack, the equipment outside safety zone due to causing significantly to decay to signal in physical boundary,
Make it that can not perceive all the elements that device-aware arrives in safety zone, only certain events by capturing are can not to generate foot
Enough similar device-fingerprints.Therefore can by verifying device-fingerprint come judge the equipment whether with credible equipment be in it is same
Environment, to avoid the spoofing attack of attacker.For second of spoofing attack, the present invention utilizes upper limit threshold ThrupperRemoval
All high-amplitude signals prevent the spoofing attack of attacker.In addition, the present invention is prevented using encrypted transmission and authentication
Only man-in-the-middle attack.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this
The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention
Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair
It is bright range is claimed to be determined by the appended claims.
Claims (10)
1. a kind of internet of things equipment safety certification and cryptographic key negotiation method based on environmental context, each of Internet of things system
Equipment has unique device id, there is credible equipment through safety certification in system, and the session key of system is K;
Characterized by comprising the following steps:
Step 1: elder generation generating device fingerprint F when system is added in new equipment NN;
The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint;
Step 2: carrying out authentication with credible equipment again;
For verifying whether the new equipment that system is added is safety equipment under same environment, pass through the verifying to new equipment fingerprint
Judge whether it is safety equipment;
If so, executing following step 3;
If not, this process terminates;
Step 3: by carrying out key agreement with credible equipment after certification, finally calculating new session key;For for system
Middle internet of things equipment generates unified session key, ensures communication safety.
2. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 1 based on environmental context,
Be characterized in that, the specific implementation of step 1 the following steps are included:
Step 1.1: the internet of things equipment in safety zone collects different types of signal data according to environmental change;
Step 1.2: noise reduction process being carried out to the original signal data that device sensor is collected into, is keeping signal significant changes
Smooth signal simultaneously;
Step 1.3: signal detection being carried out to the signal data after noise reduction, event signal and ambient noise are distinguished, and defeated
Corresponding signal time index out;
Step 1.4: carrying out affair clustering, the signal of similar incidents is clustered by way of unsupervised learning, to the thing detected
Part is classified, and exports the signal time index of different event cluster;
Step 1.5: carrying out fingerprint extraction, corresponding event cluster fingerprint is generated according to event cluster signal time index, and then generate
Device-fingerprint.
3. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context,
Be characterized in that: safety zone described in step 1.1 refers to certain physical boundary, to set credible equipment and other external worlds
Standby perception distinguishes;Environmental change refers to that immesurable chance event occurs in region.
4. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context,
Be characterized in that: noise reduction process described in step 1.2 is that exponentially weighted moving average filter is acted on discrete-time series
X, i.e. y [k]=α * x [k]+(1- α) * y [k-1], wherein α, k, x [k] and y [k] respectively represent weight, sample index, sensor
Data and rolling average data.
5. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context,
It is characterized in that, the specific implementation of signal detection described in step 1.3 includes following sub-step:
Step 1.3.1: it executes threshold process and realizes signal detection, including lower threshold ThrlowerWith upper limit threshold Thrupper, benefit
With lower threshold ThrlowerEvent signal and ambient noise are distinguished, upper limit threshold Thr is utilizedupperRemove all Gao Zhen
Width signal prevents the spoofing attack of attacker, wherein ThrupperIt can be Thr after specific calibration phaselowerFunction;
Step 1.3.2: utilize signal lump technology by the adjacent of short duration continuous signal thing of discontinuous block signal collection assembly one
Part group.
6. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context,
It is characterized in that, the specific implementation of affair clustering described in step 1.4 includes following sub-step:
Step 1.4.1: one group of feature is selected according to the function of each device sensor, improves the visible of event to the maximum extent
Degree;Dimensionality reduction is realized by characteristic extraction procedure, while being preserved for the essential characteristic of differentiation event;
Step 1.4.2: executing K-Means cluster, using cluster group number k as input, calculates the Euclidean distance between data point,
Selection clusters center of mass point to minimize distance, and finally similar data point is output in the same cluster;
Wherein cluster group quantity, that is, sensor perceives the event type quantity occurred in environment, is inferred to cluster using Elbow rule
The optimal value of group number k;Elbow rule selects optimal k value by k-J figure.
7. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context,
It is characterized in that, device-fingerprint described in step 1.5 is one group of event cluster fingerprint, i.e. all event cluster fingerprint collection for arriving of device-aware
It closes, these fingerprints indicate the context that equipment is observed jointly;
Wherein generating the specific implementation of event cluster fingerprint includes following sub-step:
Step 1.5.1: indexing according to event cluster time signal, the bit value of time interval between acquisition event
Step 1.5.2: pass through formulaCalculating event cluster fingerprint F.
8. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 1 based on environmental context,
Be characterized in that, the specific implementation of step 2 the following steps are included:
Step 2.1: thinking that the new equipment N of addition system all credible equipments through safety certification into system are sent comprising setting
Standby ID and the broadcast message that request is added;
Step 2.2: the information of credible equipment accepting device N, and send the device id of oneself to N and receive the information of request;
Step 2.3: all devices detect environmental change in one section of specific time, generate respective equipment by step 1
Fingerprint;
Step 2.4: each credible equipment is generated a random number x and is encrypted using device-fingerprint F to random number k, is obtained
Ciphertext C=EF(x), it is sent to equipment N, wherein E indicates Encryption Algorithm;
Step 2.5: equipment N utilizes the device-fingerprint F of oneselfNIt is decrypted to obtain plaintext m to ciphertext C, and by the cryptographic Hash H of m
(m) it is sent to each credible equipment;
Step 2.6: whether each credible equipment is correct by calculating the m value that H (m) judges that equipment N is decrypted;If there is an equipment
Determine that equipment N decryption is correct, then N is just the credible equipment in same environment, determines that equipment N decrypts correct credible equipment to N
Sending device ID and the correct information of decryption, otherwise N is insincere, does not send any information;
Step 2.7: equipment N record replys the device id of decryption correct information, these equipment are " neighbour " equipment of equipment N.
9. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 8 based on environmental context,
Be characterized in that: the environmental change in the step 2.3 is the chance event occurred in the specific time, and equipment can not be predicted in advance
Which event type will occur.
10. the internet of things equipment safety certification and key described in -9 any one based on environmental context according to claim 1
Machinery of consultation, which is characterized in that the specific implementation of step 3 the following steps are included:
Step 3.1: equipment N sends the request for obtaining current sessions key to some " neighbour " equipment;
Step 3.2: being somebody's turn to do " neighbour " equipment and current sessions key K is encrypted, obtain ciphertext C=EF(K), and it is sent to N;
Step 3.3: equipment N decrypts C to obtain K, and calculatesWhereinFor
The event cluster fingerprint of equipment N, n are the event number of clusters amount that equipment N is detected;
Step 3.4: equipment N is according to KNIt carries out Hash operation and obtains KN'=H (KN), and then calculate new session keyAnd K ' encryption is obtained
Step 3.5: equipment N willIt is sent to oneself all " neighbour " equipment;
Step 3.6: " neighbour " equipment of equipment N decrypts to obtain new session key K ', and sends this key to the " close of oneself
It is adjacent " equipment, until all equipment more new session keys.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910173914.0A CN109889532A (en) | 2019-03-08 | 2019-03-08 | Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910173914.0A CN109889532A (en) | 2019-03-08 | 2019-03-08 | Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109889532A true CN109889532A (en) | 2019-06-14 |
Family
ID=66931269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910173914.0A Withdrawn CN109889532A (en) | 2019-03-08 | 2019-03-08 | Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889532A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110753342A (en) * | 2019-10-18 | 2020-02-04 | 武汉大学 | Body area network equipment authentication and key agreement method based on channel characteristics |
CN110798307A (en) * | 2019-10-30 | 2020-02-14 | 武汉极意网络科技有限公司 | Method, device and equipment for marking distributed anti-crawler user equipment and storage medium |
CN112073375A (en) * | 2020-08-07 | 2020-12-11 | 中国电力科学研究院有限公司 | Isolation device and isolation method suitable for power Internet of things client side |
-
2019
- 2019-03-08 CN CN201910173914.0A patent/CN109889532A/en not_active Withdrawn
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110753342A (en) * | 2019-10-18 | 2020-02-04 | 武汉大学 | Body area network equipment authentication and key agreement method based on channel characteristics |
CN110753342B (en) * | 2019-10-18 | 2022-05-13 | 武汉大学 | Body area network equipment authentication and key agreement method based on channel characteristics |
CN110798307A (en) * | 2019-10-30 | 2020-02-14 | 武汉极意网络科技有限公司 | Method, device and equipment for marking distributed anti-crawler user equipment and storage medium |
CN110798307B (en) * | 2019-10-30 | 2023-08-22 | 武汉极意网络科技有限公司 | Decentralized anticreeper user equipment marking method, device, equipment and storage medium |
CN112073375A (en) * | 2020-08-07 | 2020-12-11 | 中国电力科学研究院有限公司 | Isolation device and isolation method suitable for power Internet of things client side |
CN112073375B (en) * | 2020-08-07 | 2023-09-26 | 中国电力科学研究院有限公司 | Isolation device and isolation method suitable for client side of electric power Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al-Turjman et al. | Context-sensitive access in industrial internet of things (IIoT) healthcare applications | |
EP3428818B1 (en) | Identity authentication method and system | |
Xu et al. | Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication | |
Fomichev et al. | Survey and systematization of secure device pairing | |
CN103124269B (en) | Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment | |
JP5407147B2 (en) | Method, mobile terminal, processing apparatus and program for executing verification process | |
CN108173871B (en) | Wireless network access authentication system and method based on radio frequency fingerprint and biological fingerprint | |
Ma et al. | EmIr-Auth: eye movement and iris-based portable remote authentication for smart grid | |
CN105635099A (en) | Identity authentication method, identity authentication system, terminal and server | |
CN102412970B (en) | Pervasive-network-oriented remote identity authentication system and method | |
CN103581900B (en) | Communication safety control method, device, the first mobile terminal and mobile healthy equipment | |
CN101420301A (en) | Human face recognizing identity authentication system | |
CN109889532A (en) | Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context | |
Song et al. | Enhancing Packet‐Level Wi‐Fi Device Authentication Protocol Leveraging Channel State Information | |
CN202444500U (en) | Remote identity authentication system for pervasive network | |
CN110972136A (en) | Internet of things safety communication module, terminal, safety control system and authentication method | |
Wan et al. | A lightweight continuous authentication scheme for medical wireless body area networks | |
Butt et al. | Cogent and energy efficient authentication protocol for wsn in iot | |
CN110753342B (en) | Body area network equipment authentication and key agreement method based on channel characteristics | |
Chen et al. | An efficient mutual authentication and key agreement scheme without password for wireless sensor networks | |
Zhang et al. | A key agreement scheme for smart homes using the secret mismatch problem | |
Chaudhry et al. | A physical capture resistant authentication scheme for the internet of drones | |
CN108650219B (en) | User identity identification method, related device, equipment and system | |
Ghose et al. | {HELP}:{Helper-Enabled}{In-Band} Device Pairing Resistant Against Signal Cancellation | |
CN112311794A (en) | Bidirectional identity authentication method based on MFA algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190614 |