CN113572765B - 一种面向资源受限终端的轻量级身份认证密钥协商方法 - Google Patents

一种面向资源受限终端的轻量级身份认证密钥协商方法 Download PDF

Info

Publication number
CN113572765B
CN113572765B CN202110835373.0A CN202110835373A CN113572765B CN 113572765 B CN113572765 B CN 113572765B CN 202110835373 A CN202110835373 A CN 202110835373A CN 113572765 B CN113572765 B CN 113572765B
Authority
CN
China
Prior art keywords
uid
smart card
ctr
password
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110835373.0A
Other languages
English (en)
Other versions
CN113572765A (zh
Inventor
何倩
宋静
石荣
江炳城
黄少伟
董庆贺
翟仲毅
喻军
郭标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Genial Technology Co ltd
Guilin University of Electronic Technology
Original Assignee
Guangdong Genial Technology Co ltd
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Genial Technology Co ltd, Guilin University of Electronic Technology filed Critical Guangdong Genial Technology Co ltd
Priority to CN202110835373.0A priority Critical patent/CN113572765B/zh
Publication of CN113572765A publication Critical patent/CN113572765A/zh
Application granted granted Critical
Publication of CN113572765B publication Critical patent/CN113572765B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

本发明公开了一种面向资源受限终端的轻量级身份认证密钥协商协议,该方法提供一套资源受限终端和服务器之间进行身份认证和会话密钥协商服务,能够确保资源受限终端和服务器的身份真实有效,避免了恶意攻击。该方案包括包括四个阶段:注册阶段、登录和认证阶段、修改密码阶段、智能卡撤销阶段。该方法引入椭圆曲线算法对登录认证过程的关键数据进行加密,在协议设计过程中引入单向哈希算法、基于智能卡和密码双因子作为身份认证的重要环节,避免数据明文传输泄露风险,并且抵抗智能卡丢失攻击、离线字典攻击等安全漏洞,相比于其他密钥协商协议,本协议密钥尺寸、系统参数和存储空间较小,并且运算速度快,适用于计算资源、存储资源受限的终端设备。

Description

一种面向资源受限终端的轻量级身份认证密钥协商方法
技术领域
本发明涉及信息安全领域,具体是一种面向资源受限终端的轻量级身份认证密钥协商方法。
背景技术
随着物联网技术快速发展,资源受限终端设备数量急剧增长,例如智能手表、电视、可穿戴设备、家居安全系统、无人驾驶汽车以及机器人等每时每刻都在使用和产生数据,这些数据呈指数级增长。资源受限终端设备具有很多局限性,一方面资源受限终端与服务器或者计算机相比,在存储能力、计算能力、电池功率等方面存在局限性,而且资源受限终端移动性更强,层次更复杂,多种安全域并存,因此不适合部署原来具有高消耗的身份认证密钥协商协议来保证安全通信。另一方面,例如智能手表、可穿戴设备、无人驾驶汽车等资源受限终端需要处理位置、活动等敏感数据,所以这些资源受限终端比传统身份验证需要更强的安全性。
身份认证密钥协商方法可以使终端与服务器在开放网络中实现安全通信,通过认证密钥协商协议使通信双方协商建立一个共享会话密钥,为后续通信提供保密性和完整性。终端-服务器认证方案有很多种,但都或多或少存在一定的缺点。例如基于证书的认证方案,需要提供证书的管理、签发服务,而对于资源受限终端的存储能力、计算能力的局限性,该方案效率较低。基于口令的认证方案,需要服务提供商维护验证表来保证所有用户密码的有效性,而随着用户越来越多,验证表的维护工作也愈来愈难,并且一旦验证表泄露,存在离线密码猜测攻击、假冒攻击等安全问题,不利于安全等级需求较高的资源受限终端。
资源受限终端的特性使以上身份认证密钥协商协议不利于完成高效安全的会话通信。物联网、人工智能、云计算、边缘计算等技术不断成熟,资源终端设备用户和服务提供商需要新的处理模式,以获得更强的决策能力、过程优化能力和通讯能力。在这些分布式环境中所提供的服务若没有设置安全高效的访问控制,攻击者可以随时控制公共网络,盗取或修改传送的信息。所以资源受限终端需向服务器完成身份注册,保证只有合法用户才可以访问该服务,同时资源受限终端也会认证服务提供商的合法性。但是对于资源受限终端而言,原有的一些认证方案具有一定的局限性。一方面较高的计算复杂度,不利于计算能力不强的资源受限终端。另一方面,原有的一些方案大多存在智能卡丢失攻击、离线字典攻击、密钥泄露攻击、缺乏前向安全性等一个或多个漏洞攻击,不利于安全等级需求较高的资源受限终端。保护资源受限终端设备数据的安全,不仅要保证数据的完整性,而且要保护数据的隐私性。
发明内容
针对资源受限终端设备特点和现有身份认证技术存在的问题,本发明提出一种面向资源受限终端的轻量级身份认证密钥协商方法,该方法能够确保资源受限终端和服务器的身份真实有效,避免恶意攻击。
实现本发明目的的技术方案是:
一种面向资源受限终端的轻量级身份认证密钥协商方法,包括:
(1)注册阶段:用户Ui需要输入其身份UIDi和口令密码PWi产生用户注册信息,将其发送给相应服务器Sj;服务器检查用户的有效性,判断用户之前是否已经注册,如果判断用户已经注册了,则提醒用户重新选择新的身份标识;如果判断用户之前并未注册,则初始化相应智能卡SC,并将其返回给用户,用户获得颁发的智能卡,使合法用户拥有合法身份,用于后期进行快速通信交流;
(2)登录和认证阶段:用户向服务器发送登录请求消息,服务器检查其时间有效性,如果合法,则解密用户的身份信息,判断身份ID是否合法,如果是合法用户,则服务器产生验证消息返回给用户;否则服务器终止会话;当用户接受到服务器发送的验证消息时,首先检查时间有效性,其次验证服务器合法性,如果均合法,则用户产生会话密钥SK,并且向服务器发送用户验证消息;否则用户终止会话;服务器接收到用户发送的信息,首先检查时间有效性,其次验证用户身份合法性,如果均合法,则产生会话密钥SK;否则终止会话;
(3)修改密码阶段:用户可以通过输入旧密码来修改密码;如果用户旧密码输入错误,则拒绝修改密码并终止会话;
(4)智能卡撤销阶段:如果Ui遗失了Sj给其颁发的智能卡,则Ui可以请求Sj重新颁发一个新的智能卡。
步骤(1)所述注册阶段,其实现方法步骤如下:
1)Ui选择身份UIDi、口令密码PWi和随机数oi,计算RIDi=H0(UIDi||PWi||oi),注意RIDi是通过H0()输出的属于Zp的一个很大的数,可以看做长度为|Zp|的字符串。将计算结果RIDi和用户身份标识UIDi通过安全通道发送给服务器Sj
2)Sj选择身份SIDj、智能卡标识符SCID和随机数oj,检查用户身份标识UIDi的是否已被注册过;若用户身份标识UIDi有效,则计算ID=UIDi||SIDj||SCID,
Figure GDA0003223916170000031
若用户身份标识UIDi已被注册过,则Sj会返回请求,并让Ui重新选一个新的身份标识;
3)Sj将EID和V0 j存入智能卡SC中,并将其通过安全通道返回给Ui,同时将ID,智能卡标识符SCID和Sj的计数器CTR_S存储在注册表中;Ui收到Sj颁发的智能卡SC后,将智能卡计数器CTR_SC初始化为0并存入SC中。
步骤(2)所述登录和认证阶段,其实现方法步骤如下:
1)当Ui想要获取Sj提供的服务时,Ui需要输入其身份UIDi和口令密码PWi;当CTR_SC<n时,其中n是一个需要重置的阈值,SC选择随机数ri∈Zp,并计算Xu=ri·G,
Figure GDA0003223916170000033
其中G是基点,然后将
Figure GDA0003223916170000034
发送给Sj
2)Sj接收到
Figure GDA0003223916170000035
后,首先检查时间是否满足
Figure GDA0003223916170000036
其中ΔT是预定义的时延阈值,可以抵抗重放攻击;其次解密EID检查用户身份的有效性,
Figure GDA0003223916170000037
若用户身份ID有效,则检索ID对应的oj和CTR_S;否则,立即终止通信;若CTR_S<n,计算
Figure GDA0003223916170000038
进而判断
Figure GDA0003223916170000039
是否成立;如果
Figure GDA00032239161700000310
Sj选择随机数rj,bs,计算
Figure GDA00032239161700000311
Xs=rj·G,
Figure GDA00032239161700000312
Figure GDA00032239161700000313
然后将
Figure GDA00032239161700000314
返回给Ui
3)Ui收到
Figure GDA0003223916170000041
时,首先检查时间是否满足
Figure GDA0003223916170000042
若满足,则计算
Figure GDA0003223916170000043
然后判断
Figure GDA0003223916170000044
是否成立;若成立,则计算
Figure GDA0003223916170000045
Figure GDA0003223916170000046
其中T3为当前时间戳,同时将CTR_SC设置为0,并将
Figure GDA0003223916170000047
返回给Sj进行认证;如不成立,则设置CTR_SC=CTR_SC+1,Ui拒绝Sj并终止会话;
4)Sj接收到
Figure GDA0003223916170000048
后,首先检查时间是否满足
Figure GDA0003223916170000049
若满足,则进行下一步计算
Figure GDA00032239161700000410
Figure GDA00032239161700000411
则计算SK=H2(Xs||Xu||UIDi||SIDj),同时将CTR_S设置为0,从而判定Sj和Ui成功通过认证,并确定Sj和Ui之间的会话密钥为SK=H2(Xs||Xu||UIDi||SIDj)。否则,Sj拒绝服务并终止会话,同时设置CTR_S=CTR_S+1。
步骤(3)所述修改密码阶段,其实现方法如下:
输入旧密码PWi并计算RIDi=H0(UIDi||PWi||oi),将RIDi发送给Sj;Sj只需计算
Figure GDA00032239161700000412
如果
Figure GDA00032239161700000413
是否满足,则返回用户允许修改密码,并用新的密码计算
Figure GDA00032239161700000414
其余步骤和注册阶段同理;否则,则拒绝修改密码并终止会话。
步骤(4)所述智能卡撤销阶段,其实现方法步骤如下:
1)首先Ui需要同注册阶段类似,使用其密码PWi和身份标识UIDi计算RIDi,将{RIDi,UIDi}发送给Sj
2)Sj检查UIDi的有效性,即Ui是否被注册过,若注册过,则重新选择一个智能卡标识符SCIDnew和随机数
Figure GDA00032239161700000415
同注册阶段一样,重新计算IDnew,EIDnew
Figure GDA00032239161700000416
用新的EIDnew
Figure GDA00032239161700000417
替换原来智能卡中的EID,
Figure GDA00032239161700000418
3)将新的智能卡颁发给Ui
本发明方法提供一套资源受限终端和服务器之间进行身份认证和会话密钥协商服务,能够确保资源受限终端和服务器的身份真实有效,避免了恶意攻击。该方法引入椭圆曲线算法、单向哈希算法和双因素认证方法,抵抗智能卡丢失攻击、离线字典攻击等安全漏洞,相比于其他密钥协商协议,本协议密钥尺寸、系统参数和存储空间较小,并且运算速度快,适用于计算资源、存储资源受限的终端设备。并具有以下安全性:抵抗离线字典攻击;匿名性;抵抗伪造假冒攻击;抵抗重放攻击;抵抗已知密钥攻击;抵抗智能卡丢失攻击;抵抗中间人攻击;完全前向安全性。
附图说明
图1为本发明系统整体模型图;
图2为本发明实施例注册阶段流程图;
图3为本发明实施例登录和认证阶段流程图;
具体实施方式
为使本发明实施的技术手段、创作特征、达成目的与功效易于了解掌握,下面结合附图对本发明作进一步说明。
实施例:
本发明一种面向资源受限终端的轻量级身份认证密钥协商方法。该方法有四个阶段:注册阶段、登录和认证阶段、修改密码阶段、智能卡撤销阶段(如图1所示)。在方案中,设置服务器Sj的计数器CTR_S和用户的计数器CTR_SC用于跟踪登录和身份验证的连续尝试失败次数,初始值设置为0,最大失败阈值设置为n,当CTR_S>n或者CTR_SC>n时,通信过程立即终止。本发明用到的符号及说明如下表所示:
Figure GDA0003223916170000051
Figure GDA0003223916170000061
本方法四个阶段具体描述如下:
阶段A:注册阶段(如图2所示)
注册阶段主要为用户颁发智能卡,使合法用户拥有合法身份,便于后期进行快速通讯交流。首先,Ui选择身份UIDi、口令密码PWi和随机数oi,计算RIDi=H0(UIDi||PWi||oi),注意RIDi是通过H0()输出的属于Zp的一个很大的数,可以看做长度为|Zp|的字符串。将计算结果RIDi和用户身份标识UIDi通过安全通道发送给Sj;其次,Sj选择身份SIDj、智能卡标识符SCID和随机数oj,检查用户身份标识UIDi的是否已被注册过。若用户身份标识UIDi有效,则计算ID=UIDi||SIDj||SCID,
Figure GDA0003223916170000062
若用户身份标识UIDi已被注册过,则Sj会返回请求,并让Ui重新选一个新的身份标识。最后Sj将EID和
Figure GDA0003223916170000063
存入智能卡SC中,并将其通过安全通道返回给Ui,同时将ID,智能卡标识符SCID和Sj的计数器CTR_S存储在注册表中。Ui收到Sj颁发的智能卡SC后,将智能卡计数器CTR_SC初始化为0并存入SC中。具体过程如下表所示:
Figure GDA0003223916170000064
Figure GDA0003223916170000071
阶段B:登录和认证阶段(如图3所示)
当Ui想要获取Sj提供的服务时,Ui需要输入其身份UIDi和口令密码PWi。当CTR_SC<n时,其中n是一个需要重置的阈值,SC选择随机数ri∈Zp,并计算Xu=ri·G,
Figure GDA0003223916170000072
其中G是基点,然后将
Figure GDA0003223916170000073
发送给服务器Sj
Sj接收到
Figure GDA0003223916170000074
后,首先检查时间是否满足
Figure GDA0003223916170000075
其中ΔT是预定义的时延阈值,可以抵抗重放攻击;其次解密EID检查用户身份的有效性,
Figure GDA0003223916170000076
若用户身份ID有效,则检索ID对应的oj和CTR_S。否则,立即终止通信。若CTR_S<n,计算
Figure GDA0003223916170000077
进而判断
Figure GDA0003223916170000078
是否成立。如果
Figure GDA0003223916170000079
Sj选择随机数rj,bs,计算
Figure GDA00032239161700000710
Figure GDA00032239161700000711
Figure GDA00032239161700000712
然后将
Figure GDA00032239161700000713
返回给Ui
当Ui收到
Figure GDA00032239161700000714
时,首先检查时间是否满足
Figure GDA00032239161700000715
若满足,则计算
Figure GDA00032239161700000716
然后判断
Figure GDA00032239161700000717
是否成立。若成立,则计算
Figure GDA00032239161700000718
Figure GDA00032239161700000719
其中T3为当前时间戳,同时将CTR_SC设置为0,并将
Figure GDA00032239161700000720
返回给Sj进行认证。如不成立,则设置CTR_SC=CTR_SC+1,Ui拒绝Sj并终止会话。
同理,当Sj接收到
Figure GDA0003223916170000081
后,首先检查时间是否满足
Figure GDA0003223916170000082
若满足,则进行下一步计算
Figure GDA0003223916170000083
Figure GDA0003223916170000084
则计算SK=H2(Xs||Xu||UIDi||SIDj),同时将CTR_S设置为0,从而判定Sj和Ui成功通过认证,并确定Sj和Ui之间的会话密钥为SK=H2(Xs||Xu||UIDi||SIDj)。否则,Sj拒绝服务并终止会话,同时设置CTR_S=CTR_S+1。详细过程如下表所示:
Figure GDA0003223916170000085
阶段C:修改密码阶段。
当Ui想要修改密码时,首先输入旧密码PWi计算RIDi=H0(UIDi||PWi||oi),将RIDi发送给Sj。Sj只需计算
Figure GDA0003223916170000091
如果
Figure GDA0003223916170000092
是否满足,则返回用户允许修改密码,并用新的密码计算
Figure GDA0003223916170000093
其余步骤和注册阶段同理。否则,则拒绝修改密码并终止会话。
阶段D:智能卡撤销阶段。
如果Ui遗失了Sj给其颁发的智能卡,则Ui可以请求Sj重新颁发一个新的智能卡。首先Ui需要同注册阶段类似,使用其密码PWi和身份标识UIDi计算RIDi,将{RIDi,UIDi}发送给Sj。然后Sj检查UIDi的有效性,即Ui是否被注册过,若注册过,则重新选择一个智能卡标识符SCIDnew和随机数
Figure GDA0003223916170000094
同注册阶段一样,重新计算IDnew,EIDnew
Figure GDA0003223916170000095
用新的EIDnew
Figure GDA0003223916170000096
替换原来智能卡中的EID,
Figure GDA0003223916170000097
最后将新的智能卡颁发给用户Ui

Claims (1)

1.一种面向资源受限终端的轻量级身份认证密钥协商方法,其特征是:包括:
(1)注册阶段:
1)用户Ui选择身份UIDi、口令密码PWi和随机数oi,计算RIDi=H0(UIDi||PWi||oi),将计算结果RIDi和用户身份标识UIDi通过安全通道发送给服务器Sj
2)Sj选择身份SIDj、智能卡标识符SCID和随机数oj,检查用户身份标识UIDi的是否已被注册过;若用户身份标识UIDi有效,则计算ID=UIDi||SIDj||SCID,
Figure FDA0004118011090000011
若用户身份标识UIDi已被注册过,则Sj会返回请求,并让Ui重新选一个新的身份标识;
3)Sj将EID和
Figure FDA0004118011090000012
存入智能卡SC中,并将其通过安全通道返回给Ui,同时将ID,智能卡标识符SCID和Sj的计数器CTR_S存储在注册表中;Ui收到Sj颁发的智能卡SC后,将智能卡计数器CTR_SC初始化为0并存入SC中;
(2)登录和认证阶段:
1)当Ui想要获取Sj提供的服务时,Ui需要输入其身份UIDi和口令密码PWi;当CTR_SC<n时,其中n是一个需要重置的阈值,SC选择随机数ri∈Zp,并计算Xu=ri·G,
Figure FDA0004118011090000013
其中G是基点,然后将
Figure FDA0004118011090000014
发送给Sj
2)Sj接收到
Figure FDA0004118011090000015
后,首先检查时间是否满足
Figure FDA0004118011090000016
其中ΔT是预定义的时延阈值,可以抵抗重放攻击;其次解密EID检查用户身份的有效性,
Figure FDA0004118011090000017
若用户身份ID有效,则检索ID对应的oj和CTR_S;否则,立即终止通信;若CTR_S<n,计算
Figure FDA0004118011090000018
进而判断
Figure FDA0004118011090000019
是否成立;如果
Figure FDA00041180110900000110
Sj选择随机数rj,bs,计算
Figure FDA00041180110900000111
Xs=rj·G,
Figure FDA00041180110900000112
Figure FDA0004118011090000021
然后将
Figure FDA0004118011090000022
返回给Ui
3)Ui收到
Figure FDA0004118011090000023
时,首先检查时间是否满足
Figure FDA0004118011090000024
若满足,则计算
Figure FDA0004118011090000025
然后判断
Figure FDA0004118011090000026
是否成立;若成立,则计算
Figure FDA0004118011090000027
Figure FDA0004118011090000028
其中T3为当前时间戳,同时将CTR_SC设置为0,并将
Figure FDA0004118011090000029
返回给Sj进行认证;如不成立,则设置CTR_SC=CTR_SC+1,Ui拒绝Sj并终止会话;
4)Sj接收到
Figure FDA00041180110900000210
后,首先检查时间是否满足
Figure FDA00041180110900000211
若满足,则进行下一步计算
Figure FDA00041180110900000212
Figure FDA00041180110900000213
则计算SK=H2(Xs||Xu||UIDi||SIDj),同时将CTR_S设置为0,从而判定Sj和Ui成功通过认证,并确定Sj和Ui之间的会话密钥为SK=H2(Xs||Xu||UIDi||SIDj),否则,Sj拒绝服务并终止会话,同时设置CTR_S=CTR_S+1;
(3)修改密码阶段:输入旧密码PWi并计算RIDi=H0(UIDi||PWi||oi),将RIDi发送给Sj;Sj只需计算
Figure FDA00041180110900000214
如果
Figure FDA00041180110900000215
满足,则返回用户允许修改密码,并用新的密码计算
Figure FDA00041180110900000216
其余步骤和注册阶段同理;否则,则拒绝修改密码并终止会话;
(4)智能卡撤销阶段:1)首先Ui需要同注册阶段类似,使用其密码PWi和身份标识UIDi计算RIDi,将{RIDi,UIDi}发送给Sj
2)Sj检查UIDi的有效性,即Ui是否被注册过,若注册过,则重新选择一个智能卡标识符SCIDnew和随机数
Figure FDA00041180110900000217
同注册阶段一样,重新计算IDnew,EIDnew,
Figure FDA00041180110900000218
用新的EIDnew,
Figure FDA00041180110900000219
替换原来智能卡中的EID,
Figure FDA00041180110900000220
3)将新的智能卡颁发给Ui
CN202110835373.0A 2021-07-23 2021-07-23 一种面向资源受限终端的轻量级身份认证密钥协商方法 Active CN113572765B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110835373.0A CN113572765B (zh) 2021-07-23 2021-07-23 一种面向资源受限终端的轻量级身份认证密钥协商方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110835373.0A CN113572765B (zh) 2021-07-23 2021-07-23 一种面向资源受限终端的轻量级身份认证密钥协商方法

Publications (2)

Publication Number Publication Date
CN113572765A CN113572765A (zh) 2021-10-29
CN113572765B true CN113572765B (zh) 2023-04-14

Family

ID=78166617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110835373.0A Active CN113572765B (zh) 2021-07-23 2021-07-23 一种面向资源受限终端的轻量级身份认证密钥协商方法

Country Status (1)

Country Link
CN (1) CN113572765B (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572800B (zh) * 2019-08-14 2022-04-05 中国人民解放军战略支援部队信息工程大学 面向机器到机器环境下设备身份认证方法及装置
CN114124375A (zh) * 2021-11-13 2022-03-01 北京工业大学 一种用于物联网环境的多阶段密钥协商方法
CN114519184B (zh) * 2022-04-20 2022-07-15 北京圣博润高新技术股份有限公司 基于Agent进程的账号改密方法、装置、设备及介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360413A (zh) * 2011-04-11 2012-02-22 桂林电子科技大学 可控密钥序列的具有误导功能的隐写方法
CN109600747A (zh) * 2018-12-06 2019-04-09 电子科技大学 一种无线传感器网络动态凭证认证密钥协商方法
CN110460438A (zh) * 2019-08-07 2019-11-15 南京信息工程大学 具有用户隐私保护功能的轻量级通讯方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7509487B2 (en) * 2003-09-29 2009-03-24 Gemalto Inc. Secure networking using a resource-constrained device
US10972259B2 (en) * 2016-09-05 2021-04-06 Lg Electronics Inc. Lightweight and escrow-less authenticated key agreement for the internet of things
CN107483195A (zh) * 2017-09-08 2017-12-15 哈尔滨工业大学深圳研究生院 物联网环境下安全的双方认证与密钥协商协议
CN111130758B (zh) * 2020-02-03 2021-07-06 电子科技大学 一种适用于资源受限设备的轻量级匿名认证方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360413A (zh) * 2011-04-11 2012-02-22 桂林电子科技大学 可控密钥序列的具有误导功能的隐写方法
CN109600747A (zh) * 2018-12-06 2019-04-09 电子科技大学 一种无线传感器网络动态凭证认证密钥协商方法
CN110460438A (zh) * 2019-08-07 2019-11-15 南京信息工程大学 具有用户隐私保护功能的轻量级通讯方法

Also Published As

Publication number Publication date
CN113572765A (zh) 2021-10-29

Similar Documents

Publication Publication Date Title
Wazid et al. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
Irshad et al. A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
CN111371730B (zh) 边缘计算场景下支持异构终端匿名接入的轻量级认证方法
Zhang et al. SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks
CN113572765B (zh) 一种面向资源受限终端的轻量级身份认证密钥协商方法
Sani et al. Xyreum: A high-performance and scalable blockchain for iiot security and privacy
CN110768954B (zh) 适用于5g网络设备的轻量级安全接入认证方法及应用
Goutham Reddy et al. Lightweight authentication with key‐agreement protocol for mobile network environment using smart cards
Yang et al. Provably secure client-server key management scheme in 5g networks
He et al. A lightweight authentication and key exchange protocol with anonymity for IoT
Kumar et al. A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs
Kumar et al. A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network
Li et al. An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
Al Sibahee et al. Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks
Truong et al. Improved Chebyshev polynomials-based authentication scheme in client-server environment
US11240661B2 (en) Secure simultaneous authentication of equals anti-clogging mechanism
Lin et al. A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing
CN116388995A (zh) 一种基于puf的轻量级智能电网认证方法
Song et al. Hardening password-based credential databases
Karmakar et al. A PUF and Fuzzy Extractor-Based UAV-Ground Station and UAV-UAV authentication mechanism with intelligent adaptation of secure sessions
CN112468983B (zh) 一种低功耗的电力物联网智能设备接入认证方法及其辅助装置
CN114666114A (zh) 一种基于生物特征的移动云数据安全认证方法
Kumar et al. A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks
CN112511544A (zh) 针对多服务器环境下认证协议的优化方法
Ling et al. An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant