CN109889532A - Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context - Google Patents

Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context Download PDF

Info

Publication number
CN109889532A
CN109889532A CN201910173914.0A CN201910173914A CN109889532A CN 109889532 A CN109889532 A CN 109889532A CN 201910173914 A CN201910173914 A CN 201910173914A CN 109889532 A CN109889532 A CN 109889532A
Authority
CN
China
Prior art keywords
equipment
fingerprint
internet
event
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910173914.0A
Other languages
Chinese (zh)
Inventor
陈晶
梁微
何琨
杜瑞颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201910173914.0A priority Critical patent/CN109889532A/en
Publication of CN109889532A publication Critical patent/CN109889532A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of internet of things equipment safety certification and cryptographic key negotiation method based on environmental context are mainly generated comprising device-fingerprint, three processes of authentication and key agreement.The device-fingerprint generating process, using the roughly the same principle of the time interval of the same event generation of device-aware in same environment, the consistency for the time interval that binding events detection, affair clustering and same event occur generates device-fingerprint.The authentication procedures judge whether it is safety equipment by the verifying to new equipment fingerprint for verifying whether the new equipment that system is added is safety equipment under same environment.The cipher key agreement process ensures communication safety for generating unified session key for internet of things equipment in system.The safe matching method of internet of things equipment provided by the present invention is more convenient, effectively, securely and reliably.

Description

Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context
Technical field
The invention belongs to Internet of Things field of communication technology, it is related to a kind of internet of things equipment safety certification and key agreement side A kind of method, and in particular to internet of things equipment safety certification and cryptographic key negotiation method based on environmental context.
Background technique
It is household appliance, daily necessity, wearable with the continuous development of technology of Internet of things and the maturation of Internet technology The various internet of things equipment connections such as equipment, which network, has become reality.However these internet of things equipment provide the user with easily together When, there is also certain security risks.The processing capacity of internet of things equipment is limited, and the data of equipment creation generally comprise The movable privacy-sensitive information of relevant user will cause the influence that can not be retrieved once being obtained by attacker.
In order to guarantee the secure communication between internet of things equipment, when newly deployed internet of things equipment is added, need by adding Key and existing equipment carry out safety certification to avoid the attack such as man-in-the-middle attack and agreement manipulation.Traditional safety certification association When discussing and need user that realization is manually operated, such as carrying out equipment certification using bluetooth or wireless network, user is needed to be manually entered Password is authenticated.This method requires equipment that there is interactive interface can complete to authenticate, and is only applicable to Internet of Things and sets Standby less scene, when internet of things equipment quantity is larger, it will increase burden for users.Although can be configured for internet of things equipment Preload key, interactive interface or dedicated pairing hardware (such as NFC), but these methods can make device manufacturer over-burden And increase equipment cost.
The defect that can be good at making up conventional security authentication protocol based on environmental context authentication method, using being present in The characteristics of equipment under same environment will perceive similar case, the similarity signal variation detected according to equipment generate similar Device-fingerprint carry out authentication.But the sensor type of equipment is often multiplicity, heterogeneous sensor collects signal The difference of type will will increase the difficulty of data processing, and reality will be difficult to by generating similar fingerprints there are the equipment under same environment It is existing.
In addition, equipment is matched two-by-two can be realized communication in Internet of things system, but works as and set with what is do not matched directly The transmitting of information is carried out for the equipment for when being communicated, needing to have been carried out pairing by other, this will will increase depositing for equipment Store up cost and communications cost.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides a kind of internet of things equipment based on environmental context to recognize safely Card and key agreement scheme, it can be realized same to avoid the problem for causing data processing difficulty because of sensor type difference Internet of things equipment shares unified session key under environment, and without user's manual authentication, mitigates burden for users, increase in fact The property used.
The technical scheme adopted by the invention is that: a kind of internet of things equipment safety certification and key based on environmental context Machinery of consultation, each equipment in Internet of things system has unique device id, exists in system through safety certification Credible equipment, the session key of system are K;
Characterized by comprising the following steps:
Step 1: elder generation generating device fingerprint F when system is added in new equipment NN
The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint;
Step 2: carrying out authentication with credible equipment again;
For verifying whether the new equipment that system is added is safety equipment under same environment, by new equipment fingerprint Verifying judges whether it is safety equipment;
If so, executing following step 3;
If not, this process terminates;
Step 3: by carrying out key agreement with credible equipment after certification, finally calculating new session key;For for Internet of things equipment generates unified session key in system, ensures communication safety.
Compared with prior art, advantage and good effect are mainly reflected in the following aspects to the present invention:
(1) it can eliminate participation artificial in equipment safety verification process, be suitable for more fields compared to traditional approach Scape, and alleviate burden for users;
(2) it unanimously generates device-fingerprint according to the time interval of the same event of device-aware under same environment, overcomes The problem of data processing difficulty caused by heterogeneous sensor signal type is different;
(3) it can authenticating device it is whether credible, and generate the unified session key of communication between devices, ensure that Internet of Things Communication security in system.
Detailed description of the invention
Fig. 1 is the flow chart of the embodiment of the present invention;
Fig. 2 is the schematic diagram of device-fingerprint generating process in the embodiment of the present invention;
Fig. 3 is the schematic diagram of authentication procedures in the embodiment of the present invention;
Fig. 4 is the schematic diagram of cipher key agreement process in the embodiment of the present invention.
Specific embodiment
For the ease of the understanding and the implementation present invention of this field general technical staff, with reference to the accompanying drawings and embodiments to this Invention is described in further detail, it should be understood that and implementation example described herein is merely to illustrate and explain the present invention, and It is not used in the restriction present invention.
A kind of internet of things equipment safety certification and key agreement based on environmental context that technical solution of the present invention provides Scheme generates, three processes of authentication and key agreement comprising device-fingerprint.Device-fingerprint generate main thought be based on Lower 3 points: (1) original signal that different types of sensor obtains has different characteristics;(2) sensor on distinct device Same event can be perceived in substantially the same manner;(3) different sensors perceive the time interval substantially phase that same event occurs Together.The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint.Identity is recognized Card process judges whether it is credible equipment by the verifying to device-fingerprint.Cipher key agreement process is internet of things equipment in system Unified session key is generated, is ensured communication safety.
In the present invention, each equipment in Internet of things system has unique device id, exists in system and has passed through The credible equipment of safety certification, the session key of system are K.New equipment N is added system and needs first generating device fingerprint FN, then with Credible equipment carries out authentication, by carrying out key agreement with credible equipment after certification, finally calculates new session key.
Referring to Fig.1, a kind of internet of things equipment safety certification and key agreement based on environmental context provided by the invention Method, comprising the following steps:
Step 1: elder generation generating device fingerprint F when system is added in new equipment NN
The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint;
Step 2: carrying out authentication with credible equipment again;
For verifying whether the new equipment that system is added is safety equipment under same environment, by new equipment fingerprint Verifying judges whether it is safety equipment;
If so, executing following step 3;
If not, this process terminates;
Step 3: by carrying out key agreement with credible equipment after certification, finally calculating new session key;For for Internet of things equipment generates unified session key in system, ensures communication safety.
Fig. 2 shows the process of credible equipment generation device-fingerprint in new equipment N and system, specifically includes the following steps:
Step 1.1: the internet of things equipment in safety zone collects different types of signal data according to environmental change;
In the present embodiment, safety zone refers to certain physical boundary (such as house), to by credible equipment and its He distinguishes in the perception of external device.Environmental change refers to a series of immesurable chance events occurred in region.
Step 1.2: noise reduction process being carried out to the original signal data that device sensor is collected into, signal is being kept significantly to become Smooth signal while change;
In the present embodiment, noise reduction process is that exponentially weighted moving average filter (EWMA) is acted on discrete time sequence X is arranged, i.e. y [k]=α * x [k]+(1- α) * y [k-1], wherein α, k, x [k] and y [k] respectively represent weight, sample index, sensing Device data and rolling average data.By the effect of EWMA, it is able to maintain the significant feature of signal, and realizes signal smoothing.
Step 1.3: signal detection is carried out to the signal data after noise reduction, event signal and ambient noise are distinguished, and And the corresponding signal time index of output;
In the present embodiment, the specific implementation of signal detection includes following sub-step:
Step 1.3.1: it executes threshold process and realizes signal detection, including lower threshold ThrlowerAnd upper limit threshold Thrupper, utilize lower threshold ThrlowerEvent signal and ambient noise are distinguished, upper limit threshold Thr is utilizedupperRemoval institute Some high-amplitude signals prevent the spoofing attack of attacker, wherein ThrupperIt can be after specific calibration phase ThrlowerFunction;
Step 1.3.2: the continuous signal of script can be made to become discontinuously by threshold process, in order to more accurately carry out thing Part cluster, ignores the of short duration discontinuity in threshold range between adjacent sectional signal, we utilize signal lump technology by phase The adjacent of short duration continuous signal event group of discontinuous block signal collection assembly one;.
Step 1.4: carrying out affair clustering, the signal of similar incidents is clustered by way of unsupervised learning, to detecting Event classify, and export different event cluster signal time index;
In the present embodiment, the specific implementation of affair clustering includes following sub-step:
Step 1.4.1: according to the function of each device sensor select one group of feature, to the maximum extent improve event can The common temporal signatures such as degree of opinion, such as selection peak swing, duration and area under the curve are analyzed.It is mentioned by feature It takes process to realize dimensionality reduction, while being preserved for the essential characteristic of differentiation event;
Step 1.4.2: executing K-Means cluster, using cluster group number k as input, calculates the Euclid between data point Distance, selection cluster center of mass point to minimize distance, finally similar data point are output in the same cluster;
Wherein cluster group quantity, that is, sensor perceives the event type quantity occurred in environment, due to the thing occurred in environment Part be it is random immesurable, equipment can not know the event how many type will occur, and need to be inferred to cluster using Elbow rule The optimal value of group number k.Elbow rule selects optimal k value by k-J (cost function) figure.
The present embodiment Selection utilization K-Means cluster can eliminate the needs to the training stage.User or device manufacturer Without carrying out the training of particular event type, burden for users can be mitigated, increase the practicality.
Step 1.5: carrying out fingerprint extraction, corresponding event cluster fingerprint is generated according to event cluster signal time index, in turn Generating device fingerprint;
In the present embodiment, device-fingerprint is one group of event cluster fingerprint, i.e. all event cluster fingerprint set for arriving of device-aware, These fingerprints indicate the context that equipment is observed jointly;
Wherein generating the specific implementation of event cluster fingerprint includes following sub-step:
Step 1.5.1: indexing according to event cluster time signal, the bit value of time interval between acquisition event
Step 1.5.2: pass through formulaCalculating event cluster fingerprint F.
Fig. 3 shows the process of credible equipment progress authentication in new equipment N and system, specifically includes the following steps:
Step 2.1: thinking that the new equipment N of addition system all credible equipments through safety certification into system send packet Containing device id and the broadcast message requested is added;
Step 2.2: the information of credible equipment accepting device N, and send the device id of oneself to N and receive the letter of request Breath;
Step 2.3: all devices detect environmental change in one section of specific time, are generated by step 1 respective Device-fingerprint;
In the present embodiment, environmental change is the chance event occurred in the specific time, and equipment can not be predicted in advance will Which event type occurs.
Step 2.4: each credible equipment is generated a random number x and is encrypted using device-fingerprint F to random number k, Obtain ciphertext C=EF(x), it is sent to equipment N, wherein E indicates Encryption Algorithm;
Step 2.5: equipment N utilizes the device-fingerprint F of oneselfNIt is decrypted to obtain plaintext m to ciphertext C, and by the Hash of m Value H (m) is sent to each credible equipment;
Step 2.6: whether each credible equipment is correct by calculating the m value that H (m) judges that equipment N is decrypted;If there is one Equipment determines that equipment N decryption is correct, then N is just the credible equipment in same environment, determines that equipment N decrypts correct credible equipment To N sending device ID and the correct information of decryption, otherwise N is insincere, does not send any information;
Step 2.7: equipment N record replys the device id of decryption correct information, these equipment are that " neighbour " of equipment N sets It is standby.
Fig. 4 shows the process of credible equipment progress key agreement in new equipment N and system, specifically includes the following steps:
Step 3.1: equipment N sends the request for obtaining current sessions key to some " neighbour " equipment;
Step 3.2: being somebody's turn to do " neighbour " equipment and current sessions key K is encrypted, obtain ciphertext C=EF(K), it and is sent to N;
Step 3.3: equipment N decrypts C to obtain K, and calculatesWhereinFor the event cluster fingerprint of equipment N, n is the event number of clusters amount that equipment N is detected;
Step 3.4: equipment N is according to KNIt carries out Hash operation and obtains KN'=H (KN), and then calculate new session keyAnd K ' encryption is obtained
Step 3.5: equipment N willIt is sent to oneself all " neighbour " equipment;
Step 3.6: " neighbour " equipment of equipment N decrypts to obtain new session key K ', and sends this key to oneself " neighbour " equipment, until all equipment more new session key.
The update of session key needs more wheel interactions to complete in the present invention, it is contemplated that and internet of things equipment processing capacity is limited, Equipment only needs to transmit ciphertext and device id, reduces communications cost and alleviates equipment storage burden.
In terms of safety, attacker can steal privacy of user sensitivity letter by the communication between eavesdropping internet of things equipment For breath to realize this target, attacker can mobilize spoofing attack (Shamming attack) or man-in-the-middle attack (Man- in-the-middle attack).The equipment of attacker is placed on outside safety zone but in range for wireless communication, it is intended to go to take advantage of Deceive the credible equipment in a safety zone, may start two kinds of spoofing attack: (1) attacker's equipment can pass through The event occurred inside perception outside safety zone is attempted to initiate eavesdropping attack;(2) attacker can make outside safety zone The event of big noise or vibration is made to initiate signal injection attacks.In addition, attacker can also be by intercepting key agreement phase The communication information of equipment room initiates man-in-the-middle attack.
For the first spoofing attack, the equipment outside safety zone due to causing significantly to decay to signal in physical boundary, Make it that can not perceive all the elements that device-aware arrives in safety zone, only certain events by capturing are can not to generate foot Enough similar device-fingerprints.Therefore can by verifying device-fingerprint come judge the equipment whether with credible equipment be in it is same Environment, to avoid the spoofing attack of attacker.For second of spoofing attack, the present invention utilizes upper limit threshold ThrupperRemoval All high-amplitude signals prevent the spoofing attack of attacker.In addition, the present invention is prevented using encrypted transmission and authentication Only man-in-the-middle attack.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair It is bright range is claimed to be determined by the appended claims.

Claims (10)

1. a kind of internet of things equipment safety certification and cryptographic key negotiation method based on environmental context, each of Internet of things system Equipment has unique device id, there is credible equipment through safety certification in system, and the session key of system is K;
Characterized by comprising the following steps:
Step 1: elder generation generating device fingerprint F when system is added in new equipment NN
The consistency for the time interval that binding events detection, affair clustering and same event occur, generates device-fingerprint;
Step 2: carrying out authentication with credible equipment again;
For verifying whether the new equipment that system is added is safety equipment under same environment, pass through the verifying to new equipment fingerprint Judge whether it is safety equipment;
If so, executing following step 3;
If not, this process terminates;
Step 3: by carrying out key agreement with credible equipment after certification, finally calculating new session key;For for system Middle internet of things equipment generates unified session key, ensures communication safety.
2. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 1 based on environmental context, Be characterized in that, the specific implementation of step 1 the following steps are included:
Step 1.1: the internet of things equipment in safety zone collects different types of signal data according to environmental change;
Step 1.2: noise reduction process being carried out to the original signal data that device sensor is collected into, is keeping signal significant changes Smooth signal simultaneously;
Step 1.3: signal detection being carried out to the signal data after noise reduction, event signal and ambient noise are distinguished, and defeated Corresponding signal time index out;
Step 1.4: carrying out affair clustering, the signal of similar incidents is clustered by way of unsupervised learning, to the thing detected Part is classified, and exports the signal time index of different event cluster;
Step 1.5: carrying out fingerprint extraction, corresponding event cluster fingerprint is generated according to event cluster signal time index, and then generate Device-fingerprint.
3. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context, Be characterized in that: safety zone described in step 1.1 refers to certain physical boundary, to set credible equipment and other external worlds Standby perception distinguishes;Environmental change refers to that immesurable chance event occurs in region.
4. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context, Be characterized in that: noise reduction process described in step 1.2 is that exponentially weighted moving average filter is acted on discrete-time series X, i.e. y [k]=α * x [k]+(1- α) * y [k-1], wherein α, k, x [k] and y [k] respectively represent weight, sample index, sensor Data and rolling average data.
5. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context, It is characterized in that, the specific implementation of signal detection described in step 1.3 includes following sub-step:
Step 1.3.1: it executes threshold process and realizes signal detection, including lower threshold ThrlowerWith upper limit threshold Thrupper, benefit With lower threshold ThrlowerEvent signal and ambient noise are distinguished, upper limit threshold Thr is utilizedupperRemove all Gao Zhen Width signal prevents the spoofing attack of attacker, wherein ThrupperIt can be Thr after specific calibration phaselowerFunction;
Step 1.3.2: utilize signal lump technology by the adjacent of short duration continuous signal thing of discontinuous block signal collection assembly one Part group.
6. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context, It is characterized in that, the specific implementation of affair clustering described in step 1.4 includes following sub-step:
Step 1.4.1: one group of feature is selected according to the function of each device sensor, improves the visible of event to the maximum extent Degree;Dimensionality reduction is realized by characteristic extraction procedure, while being preserved for the essential characteristic of differentiation event;
Step 1.4.2: executing K-Means cluster, using cluster group number k as input, calculates the Euclidean distance between data point, Selection clusters center of mass point to minimize distance, and finally similar data point is output in the same cluster;
Wherein cluster group quantity, that is, sensor perceives the event type quantity occurred in environment, is inferred to cluster using Elbow rule The optimal value of group number k;Elbow rule selects optimal k value by k-J figure.
7. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 2 based on environmental context, It is characterized in that, device-fingerprint described in step 1.5 is one group of event cluster fingerprint, i.e. all event cluster fingerprint collection for arriving of device-aware It closes, these fingerprints indicate the context that equipment is observed jointly;
Wherein generating the specific implementation of event cluster fingerprint includes following sub-step:
Step 1.5.1: indexing according to event cluster time signal, the bit value of time interval between acquisition event
Step 1.5.2: pass through formulaCalculating event cluster fingerprint F.
8. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 1 based on environmental context, Be characterized in that, the specific implementation of step 2 the following steps are included:
Step 2.1: thinking that the new equipment N of addition system all credible equipments through safety certification into system are sent comprising setting Standby ID and the broadcast message that request is added;
Step 2.2: the information of credible equipment accepting device N, and send the device id of oneself to N and receive the information of request;
Step 2.3: all devices detect environmental change in one section of specific time, generate respective equipment by step 1 Fingerprint;
Step 2.4: each credible equipment is generated a random number x and is encrypted using device-fingerprint F to random number k, is obtained Ciphertext C=EF(x), it is sent to equipment N, wherein E indicates Encryption Algorithm;
Step 2.5: equipment N utilizes the device-fingerprint F of oneselfNIt is decrypted to obtain plaintext m to ciphertext C, and by the cryptographic Hash H of m (m) it is sent to each credible equipment;
Step 2.6: whether each credible equipment is correct by calculating the m value that H (m) judges that equipment N is decrypted;If there is an equipment Determine that equipment N decryption is correct, then N is just the credible equipment in same environment, determines that equipment N decrypts correct credible equipment to N Sending device ID and the correct information of decryption, otherwise N is insincere, does not send any information;
Step 2.7: equipment N record replys the device id of decryption correct information, these equipment are " neighbour " equipment of equipment N.
9. the internet of things equipment safety certification and cryptographic key negotiation method according to claim 8 based on environmental context, Be characterized in that: the environmental change in the step 2.3 is the chance event occurred in the specific time, and equipment can not be predicted in advance Which event type will occur.
10. the internet of things equipment safety certification and key described in -9 any one based on environmental context according to claim 1 Machinery of consultation, which is characterized in that the specific implementation of step 3 the following steps are included:
Step 3.1: equipment N sends the request for obtaining current sessions key to some " neighbour " equipment;
Step 3.2: being somebody's turn to do " neighbour " equipment and current sessions key K is encrypted, obtain ciphertext C=EF(K), and it is sent to N;
Step 3.3: equipment N decrypts C to obtain K, and calculatesWhereinFor The event cluster fingerprint of equipment N, n are the event number of clusters amount that equipment N is detected;
Step 3.4: equipment N is according to KNIt carries out Hash operation and obtains KN'=H (KN), and then calculate new session keyAnd K ' encryption is obtained
Step 3.5: equipment N willIt is sent to oneself all " neighbour " equipment;
Step 3.6: " neighbour " equipment of equipment N decrypts to obtain new session key K ', and sends this key to the " close of oneself It is adjacent " equipment, until all equipment more new session keys.
CN201910173914.0A 2019-03-08 2019-03-08 Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context Withdrawn CN109889532A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910173914.0A CN109889532A (en) 2019-03-08 2019-03-08 Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910173914.0A CN109889532A (en) 2019-03-08 2019-03-08 Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context

Publications (1)

Publication Number Publication Date
CN109889532A true CN109889532A (en) 2019-06-14

Family

ID=66931269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910173914.0A Withdrawn CN109889532A (en) 2019-03-08 2019-03-08 Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context

Country Status (1)

Country Link
CN (1) CN109889532A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753342A (en) * 2019-10-18 2020-02-04 武汉大学 Body area network equipment authentication and key agreement method based on channel characteristics
CN110798307A (en) * 2019-10-30 2020-02-14 武汉极意网络科技有限公司 Method, device and equipment for marking distributed anti-crawler user equipment and storage medium
CN112073375A (en) * 2020-08-07 2020-12-11 中国电力科学研究院有限公司 Isolation device and isolation method suitable for power Internet of things client side

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753342A (en) * 2019-10-18 2020-02-04 武汉大学 Body area network equipment authentication and key agreement method based on channel characteristics
CN110753342B (en) * 2019-10-18 2022-05-13 武汉大学 Body area network equipment authentication and key agreement method based on channel characteristics
CN110798307A (en) * 2019-10-30 2020-02-14 武汉极意网络科技有限公司 Method, device and equipment for marking distributed anti-crawler user equipment and storage medium
CN110798307B (en) * 2019-10-30 2023-08-22 武汉极意网络科技有限公司 Decentralized anticreeper user equipment marking method, device, equipment and storage medium
CN112073375A (en) * 2020-08-07 2020-12-11 中国电力科学研究院有限公司 Isolation device and isolation method suitable for power Internet of things client side
CN112073375B (en) * 2020-08-07 2023-09-26 中国电力科学研究院有限公司 Isolation device and isolation method suitable for client side of electric power Internet of things

Similar Documents

Publication Publication Date Title
Al-Turjman et al. Context-sensitive access in industrial internet of things (IIoT) healthcare applications
EP3428818B1 (en) Identity authentication method and system
Xu et al. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication
Fomichev et al. Survey and systematization of secure device pairing
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
JP5407147B2 (en) Method, mobile terminal, processing apparatus and program for executing verification process
CN108173871B (en) Wireless network access authentication system and method based on radio frequency fingerprint and biological fingerprint
Ma et al. EmIr-Auth: eye movement and iris-based portable remote authentication for smart grid
CN105635099A (en) Identity authentication method, identity authentication system, terminal and server
CN102412970B (en) Pervasive-network-oriented remote identity authentication system and method
CN103581900B (en) Communication safety control method, device, the first mobile terminal and mobile healthy equipment
CN101420301A (en) Human face recognizing identity authentication system
CN109889532A (en) Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context
Song et al. Enhancing Packet‐Level Wi‐Fi Device Authentication Protocol Leveraging Channel State Information
CN202444500U (en) Remote identity authentication system for pervasive network
CN110972136A (en) Internet of things safety communication module, terminal, safety control system and authentication method
Wan et al. A lightweight continuous authentication scheme for medical wireless body area networks
Butt et al. Cogent and energy efficient authentication protocol for wsn in iot
CN110753342B (en) Body area network equipment authentication and key agreement method based on channel characteristics
Chen et al. An efficient mutual authentication and key agreement scheme without password for wireless sensor networks
Zhang et al. A key agreement scheme for smart homes using the secret mismatch problem
Chaudhry et al. A physical capture resistant authentication scheme for the internet of drones
CN108650219B (en) User identity identification method, related device, equipment and system
Ghose et al. {HELP}:{Helper-Enabled}{In-Band} Device Pairing Resistant Against Signal Cancellation
CN112311794A (en) Bidirectional identity authentication method based on MFA algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190614