CN113364584B - 一种物联网设备与雾节点认证系统和方法 - Google Patents
一种物联网设备与雾节点认证系统和方法 Download PDFInfo
- Publication number
- CN113364584B CN113364584B CN202110627182.5A CN202110627182A CN113364584B CN 113364584 B CN113364584 B CN 113364584B CN 202110627182 A CN202110627182 A CN 202110627182A CN 113364584 B CN113364584 B CN 113364584B
- Authority
- CN
- China
- Prior art keywords
- new
- internet
- things equipment
- fog node
- things
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000004364 calculation method Methods 0.000 claims abstract description 26
- 238000004891 communication Methods 0.000 claims abstract description 23
- 230000003993 interaction Effects 0.000 claims description 30
- 230000008569 process Effects 0.000 claims description 25
- 230000005540 biological transmission Effects 0.000 claims description 22
- 230000004044 response Effects 0.000 claims description 22
- 230000006870 function Effects 0.000 claims description 19
- 238000003860 storage Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 230000003111 delayed effect Effects 0.000 claims description 3
- 101150061215 outM gene Proteins 0.000 claims 2
- 230000007547 defect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000010367 cloning Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110627182.5A CN113364584B (zh) | 2021-06-04 | 2021-06-04 | 一种物联网设备与雾节点认证系统和方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110627182.5A CN113364584B (zh) | 2021-06-04 | 2021-06-04 | 一种物联网设备与雾节点认证系统和方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113364584A CN113364584A (zh) | 2021-09-07 |
CN113364584B true CN113364584B (zh) | 2022-06-14 |
Family
ID=77532418
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110627182.5A Active CN113364584B (zh) | 2021-06-04 | 2021-06-04 | 一种物联网设备与雾节点认证系统和方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113364584B (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143062B (zh) * | 2021-11-25 | 2024-01-26 | 中南财经政法大学 | 基于区块链的雾计算环境的安全认证系统、方法、终端及介质 |
CN114143343B (zh) * | 2021-11-25 | 2024-04-19 | 中南财经政法大学 | 雾计算环境中远程访问控制系统、控制方法、终端及介质 |
CN116074091B (zh) * | 2023-02-06 | 2024-05-14 | 华中师范大学 | 一种雾辅助智能家居三方认证系统、方法、设备及终端 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3340214B1 (en) * | 2016-12-21 | 2021-01-20 | Secure-IC SAS | Synthetic physically unclonable function |
EP3934203A1 (en) * | 2016-12-30 | 2022-01-05 | INTEL Corporation | Decentralized data storage and processing for iot devices |
US10868669B2 (en) * | 2017-10-16 | 2020-12-15 | Taiwan Semiconductor Manufacturing Company Ltd. | Method for role-based data transmission using physically unclonable function (PUF)-based keys |
CN109167778B (zh) * | 2018-08-28 | 2020-11-10 | 南京邮电大学 | 物联网中终端设备无身份通用认证方法 |
CN110138538B (zh) * | 2019-05-09 | 2022-06-21 | 南京邮电大学 | 基于雾计算的智能电网安全与隐私保护数据聚合方法 |
CN111818039B (zh) * | 2020-07-03 | 2021-07-20 | 西安电子科技大学 | 物联网中基于puf的三因素匿名用户认证协议方法 |
CN112769568B (zh) * | 2021-01-29 | 2022-07-22 | 华中师范大学 | 雾计算环境中的安全认证通信系统、方法、物联网设备 |
-
2021
- 2021-06-04 CN CN202110627182.5A patent/CN113364584B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN113364584A (zh) | 2021-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | A privacy-aware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain | |
CN112953727B (zh) | 一种面向物联网的设备匿名身份认证方法及系统 | |
CN113364584B (zh) | 一种物联网设备与雾节点认证系统和方法 | |
He et al. | Handover authentication for mobile networks: security and efficiency aspects | |
US9787651B2 (en) | Method and device for establishing session keys | |
Meng et al. | Low-latency authentication against satellite compromising for space information network | |
CN110768954B (zh) | 适用于5g网络设备的轻量级安全接入认证方法及应用 | |
CN114143343B (zh) | 雾计算环境中远程访问控制系统、控制方法、终端及介质 | |
Chen et al. | Security analysis and improvement of user authentication framework for cloud computing | |
CN112769568B (zh) | 雾计算环境中的安全认证通信系统、方法、物联网设备 | |
Ullah et al. | A secure NDN framework for Internet of Things enabled healthcare | |
Miao et al. | A secure and efficient lightweight vehicle group authentication protocol in 5G networks | |
Wu et al. | An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network | |
US11240661B2 (en) | Secure simultaneous authentication of equals anti-clogging mechanism | |
CN111654481A (zh) | 一种身份认证方法、装置和存储介质 | |
Zahednejad et al. | A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability | |
Cui et al. | Multi-factor based session secret key agreement for the Industrial Internet of Things | |
Kim et al. | LiSP-XK: extended light-weight signcryption for IoT in resource-constrained environments | |
Hafeez et al. | Beta-uav: Blockchain-based efficient and trusted authentication for uav communication | |
Yang et al. | Iba: A secure and efficient device-to-device interaction-based authentication scheme for internet of things | |
US20200366474A1 (en) | Private key generation method and device | |
CN117221883B (zh) | 面向5g移动边缘计算的安全认证方法及相关设备 | |
Miao et al. | Secure and efficient communication approaches for industry 5.0 in edge computing | |
CN112468983B (zh) | 一种低功耗的电力物联网智能设备接入认证方法及其辅助装置 | |
Kumar et al. | Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231016 Address after: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province Patentee after: Dragon totem Technology (Hefei) Co.,Ltd. Address before: 430079 No.152 Luoyu Road, Hongshan District, Wuhan City, Hubei Province Patentee before: CENTRAL CHINA NORMAL University |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231108 Address after: Room 606-609, Compound Office Complex Building, No. 757, Dongfeng East Road, Yuexiu District, Guangzhou, Guangdong Province, 510699 Patentee after: China Southern Power Grid Internet Service Co.,Ltd. Address before: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province Patentee before: Dragon totem Technology (Hefei) Co.,Ltd. |
|
TR01 | Transfer of patent right |