CN115643575A - Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation - Google Patents
Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation Download PDFInfo
- Publication number
- CN115643575A CN115643575A CN202211673749.3A CN202211673749A CN115643575A CN 115643575 A CN115643575 A CN 115643575A CN 202211673749 A CN202211673749 A CN 202211673749A CN 115643575 A CN115643575 A CN 115643575A
- Authority
- CN
- China
- Prior art keywords
- radio frequency
- frequency fingerprint
- block chain
- edge
- wireless terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation, and belongs to the technical field of security access authentication. The invention utilizes the radio frequency fingerprint authentication technology of the physical layer to establish lightweight authentication between the wireless terminal and the edge equipment; meanwhile, peer-to-peer trust relationships are established among the edge devices through the upper-layer block chain technology, training characteristics of the physical radio frequency fingerprints are cooperatively shared, and the requirement for retraining the physical radio frequency fingerprint characteristics of the edge devices is reduced; finally, the purpose of reducing data processing amount is achieved, and the safe access authentication of the light-weight Internet of things wireless terminal is achieved.
Description
Technical Field
The invention belongs to the technical field of security access authentication, and particularly relates to a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation.
Background
With the development of the mobile internet and the progress of communication technology, a large number of lightweight internet of things terminal devices are added into the network, access authentication is the first door of security, and high-security access authentication is the key for ensuring network security.
The traditional password access authentication technology is an authentication method based on calculation, the calculation complexity is high, the storage capacity is large, and the requirements of a lightweight terminal are difficult to meet. The radio frequency fingerprint authentication is a technology for carrying out access authentication by utilizing radio frequency fingerprint physical characteristic information, and is very suitable for the edge computing scene with a large number of internet of things terminals at a close distance due to the characteristics of light weight, load mainly concentrated on an authentication side and the like, authentication and computation are completed in edge equipment, and a wireless terminal does not need to carry out any computation and add any overhead, so that the problems of low power, small storage and difficulty in carrying out access authentication of the internet of things terminals are effectively solved. Machine learning is an effective method for realizing radio frequency fingerprint authentication at present, and because a wireless terminal needs to be re-authenticated when being transferred from one edge device to another edge device, the requirement for re-training of radio frequency fingerprint features is increased, so how to reduce the expense for re-training of the radio frequency fingerprint features and realize credible sharing of radio frequency fingerprint information of cross-edge devices is an urgent problem to be solved for cross-edge side radio frequency fingerprint authentication.
Disclosure of Invention
Aiming at the problem that the retraining cost of physical radio frequency fingerprint features is high under a new edge device when the prior art is used for cross-edge device physical radio frequency fingerprint authentication, the invention provides a radio frequency fingerprint cross-layer safety access authentication method based on a block chain under edge calculation, and light weight authentication is established between a wireless terminal and the edge device by utilizing the radio frequency fingerprint authentication technology of a physical layer; meanwhile, peer-to-peer trust relationships are established among the edge devices through the upper-layer block chain technology, training characteristics of the physical radio frequency fingerprints are cooperatively shared, and the requirement for retraining the physical radio frequency fingerprint characteristics of the edge devices is reduced; finally, the purpose of reducing data processing amount is achieved, and the safe access authentication of the light-weight Internet of things wireless terminal is achieved.
The technical scheme adopted by the invention is as follows:
a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation is characterized by comprising the following steps:
s1, system initialization:
each edge device issues a private and public key pair, and a plurality of edge devices negotiate together to complete block chain initialization setting.
S2, registering:
s2-1, the wireless terminal sends a registration request to the edge device, the edge device obtains the identity ID of the wireless terminal, and the physical radio frequency fingerprint characteristics are extracted from the registration request of the wireless terminal.
And S2-2, the edge equipment trains and updates a classifier model by using the extracted physical radio frequency fingerprint characteristics, and simultaneously obtains registered physical radio frequency fingerprint characteristics corresponding to the physical radio frequency fingerprint characteristics.
S2-3, the edge device generates registration data information data = < Register, < Hash (ID), hash (classfier), hash (RFF) > > according to the identity ID and the registered physical radio frequency fingerprint characteristics of the wireless terminal and a classifier model, and then generates registration transaction information mes according to the registration data information data and sends the registration transaction information mes to a block chain network; wherein, the Hash (ID) represents the Hash value of the ID, the Hash (classifier) represents the Hash value of the classifier model, and the Hash (RFF) represents the Hash value of the physical radio frequency fingerprint feature.
S2-4, after other edge devices in the block chain network receive the registered transaction information mes, verifying whether the identity ID is repeated; if the registration is repeated, the registration is terminated; if not, verifying whether the digital signature of the registered transaction information mes is legal or not; if not, terminating the registration; if the data is legal, the data is placed in a self trading pool; and when the number of the registered transactions in the transaction pool meets the requirement, the edge equipment packs all the registered transaction information into the block and sends the block to the block chain network.
And S2-5, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain network.
S2-6, after the block chain network consensus succeeds, the edge device exports a classifier model and registers physical radio frequency fingerprint characteristics, and adds the classifier model and the registered physical radio frequency fingerprint characteristics into an IPFS (inter-plane File System) network; the IPFS network cooperatively stores the classifier model and the registered physical radio frequency fingerprint characteristics among the edge devices, and returns the Hash value of the classifier model and the Hash value of the registered physical radio frequency fingerprint characteristics to all the edge devices to finish registration; and the last edge device returns the own edge device number of the wireless terminal.
S3, access authentication:
s3-1, the wireless terminal sends an authentication request to the edge equipment, wherein the authentication request comprises the identity ID of the wireless terminal and the number of the edge equipment where the wireless terminal is located; and simultaneously, the edge equipment extracts the physical radio frequency fingerprint characteristics to be authenticated from the authentication request.
And S3-2, the edge equipment inquires the Hash value of the classifier model and the Hash value of the ID corresponding to the ID, and requests the corresponding classifier model and the registered physical radio frequency fingerprint characteristic from an IPFS network of the edge equipment through the two Hash values.
S3-3, after the edge equipment obtains the classifier model, inputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and judging whether the physical radio frequency fingerprint characteristics to be authenticated are consistent with the registered physical radio frequency fingerprint characteristics; if the two are consistent, the wireless terminal passes the authentication, and if the two are not consistent, the wireless terminal does not pass the authentication.
And S3-4, the edge device determines whether the wireless terminal is accessed to the edge device according to the authentication result and returns the authentication result to the wireless terminal.
Further, the radio frequency fingerprint cross-layer security access authentication method based on the block chain under the edge calculation further comprises a step of deleting the wireless terminal controlled by the malicious node, and the specific process is as follows:
s4-1, after the edge device detects that a certain wireless terminal is controlled by a malicious node, the edge device deletes the identity ID and the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal, and retrains and updates the classifier model by utilizing other registered physical radio frequency fingerprint characteristics.
And S4-2, the edge equipment generates deleted data information data according to the deleted identity ID and the registered physical radio frequency fingerprint characteristics, and then generates deleted transaction information mes according to the deleted data information data and sends the deleted transaction information mes to the block chain network.
S4-3, after receiving the deleted transaction information mes, other edge devices in the block chain network verify whether the ID is registered; if not, terminating the deleting operation; if the transaction information mes is registered, verifying whether the digital signature of the deleted transaction information mes is legal or not; if not, terminating the deleting operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; and when the number of the deleted transactions in the transaction pool meets the requirement, the edge equipment packs all the deleted transaction information into a block and sends the block to the block chain network.
And S4-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the edge device.
And S4-5, after the block chain network consensus is successful, the edge equipment updates the classifier model in the IPFS network, then the IPFS network deletes the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal controlled by the malicious node, and returns the Hash values of the updated classifier model to all the edge equipment to finish the deletion operation.
Further, the radio frequency fingerprint cross-layer security access authentication method based on the block chain under the edge calculation further comprises an updating step, and the specific process is as follows:
and S5-1, after the edge device extracts the new physical radio frequency fingerprint characteristics of the wireless terminal, the wireless terminal retrains and updates the classifier model by using the new physical radio frequency fingerprint characteristics, and obtains the updated registered physical radio frequency fingerprint characteristics.
And S5-2, the edge equipment generates updating data information data according to the updated registered physical radio frequency fingerprint characteristics and the identity ID thereof, and then generates updating transaction information mes according to the updating data information data and sends the updating transaction information mes to the block chain network.
S5-3, after other edge devices in the block chain network receive the updated transaction information mes, verifying whether the digital signature of the updated transaction information mes is legal or not; if not, terminating the updating operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; and when the updated transaction number in the transaction pool meets the requirement, the edge equipment packs all the updated transaction information into the block and sends the block to the block chain network.
And S5-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the edge device.
And S5-5, after the block chain network consensus is successful, the edge equipment updates the classifier model and the registered physical radio frequency fingerprint characteristics in the IPFS network, and returns the Hash values of the updated classifier model and the updated registered physical radio frequency fingerprint characteristics to all the edge equipment to finish the updating operation.
The invention has the beneficial effects that:
(1) The invention realizes the identity authentication of the wireless terminal across the edge devices by the cooperation of the edge devices to store the classifier model and register the physical radio frequency fingerprint characteristics and combining the access control of the upper block chain.
(2) The physical radio frequency fingerprint characteristics of the wireless terminal are identified through the edge device, high-safety authentication of unclonable is achieved, and meanwhile, the light-weight safety authentication of the wireless terminal can be achieved because the wireless terminal does not need to execute complex operation.
(3) Under the condition that resource energy is limited, the wireless terminal realizes physical radio frequency fingerprint identification authentication through edge equipment, and light-weight safety is realized on a physical layer; meanwhile, the edge device ensures the sharing of training characteristics through the upper-layer block chain, and reduces the repeated training overhead under a credible mechanism.
Drawings
Fig. 1 is a diagram of a registration process of a radio frequency fingerprint cross-layer secure access authentication method based on a block chain under edge calculation;
fig. 2 is a diagram illustrating a radio frequency fingerprint cross-layer secure access authentication process based on a block chain under edge calculation.
Detailed Description
The technical solution of the present invention is further described in detail below with reference to an SVM (support vector machine) classification method, but the scope of the present invention is not limited to the following description.
Suppose there isJEach edge device comprises K wireless terminals currently; each edge device trains an SVM classifier model by using the physical radio frequency fingerprint characteristics of K wireless terminals to obtain the firstjUnder the edge equipmentiRegistered physical radio frequency fingerprint characteristics corresponding to each wireless terminal,j= 1,2,…J,i=1,2,…K。
the embodiment provides a registration process of a radio frequency fingerprint cross-layer secure access authentication method based on a block chain under edge calculation, as shown in fig. 1, including the following steps:
A1. wireless terminaliEdge equipmentjMaking a registration request, the edge device obtains the wireless terminaliAnd extracting physical radio frequency fingerprint characteristics from the registration request of the wireless terminal。
A2. Edge devicejUtilizing extracted physical radio frequency fingerprint featuresTraining and updating classifier model, and obtaining physical radio frequency fingerprint characteristicsCorresponding registered physical RF fingerprint characteristics。
A3. Edge devicejAccording to the wireless terminaliIdentity ID and registered physical radio frequency fingerprint characteristics ofAnd the classifier model generates a registration data information data =<Register , <Hash(ID) , Hash(classifier) , Hash(RFF)>>Then according to said registration data informationThe data generates registration transaction information mes and sends the registration transaction information mes to a block chain network; wherein, the Hash (ID) represents the Hash value of the ID, the Hash (classifier) represents the Hash value of the classifier model, and the Hash (RFF) represents the Hash value of the physical radio frequency fingerprint feature.
A4. After other edge devices in the block chain network receive the registered transaction information mes, verifying whether the identity ID is repeated; if the registration is repeated, the registration is terminated; if not, verifying whether the digital signature of the registered transaction information mes is legal or not; if not, terminating the registration; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the number of registered transactions in the transaction pool meets the requirement, the edge devicejPackaging all registered transaction information into a block and sending the block to the blockchain network.
A5. After other edge devices in the block chain network receive the block, the validity of the block is verified, and if the validity requirement is met, the block is added into the block chain of the edge device.
A6. After the block chain network consensus is successful, the edge devicejExporting a classifier model and registering physical radio frequency fingerprint characteristics, and adding the classifier model and the registered physical radio frequency fingerprint characteristics into an IPFS network; the IPFS network cooperatively stores the classifier model and the registered physical radio frequency fingerprint characteristics among the edge devices, and returns the Hash value of the classifier model and the Hash value of the registered physical radio frequency fingerprint characteristics to all the edge devices to finish registration; final edge devicejAnd returning the own edge device number of the wireless terminal.
When the wireless terminaliAccess to the edge devicejThe authentication steps are as follows:
B1. wireless terminaliTo the associated edge devicejSending an authentication Request:
Request{ID, j}
the authentication request includes the ID of the wireless terminal and the number of the edge devicej。
Edge devicejObtaining the wireless terminal through the extraction of the authentication RequestiTo-be-authenticated physical radio frequency fingerprint characteristics。
B2. Edge devicejInquiring the Hash value of the classifier model corresponding to the identity ID and the Hash value of the ID, and requesting the corresponding classifier model and the registered physical radio frequency fingerprint characteristic from the IPFS network of the edge equipment through the two Hash values。
After the edge equipment obtains the classifier model, inputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and distinguishing the physical radio frequency fingerprint characteristics to be authenticatedWhether or not to register physical RF fingerprint characteristicsConsistency; if they are consistent, the wireless terminaliPassing the authentication, if not, the wireless terminaliAuthentication is not passed.
B3. Edge devicejDetermining the wireless terminal according to the authentication resultiWhether to access the edge device or not and returns the authentication result to the wireless terminali。
When the wireless terminaliWhen moving from one edge device to another edge device, as shown in fig. 2, the authentication process is as follows:
C1. wireless terminaliEdge-pointing devicemSending an authentication request le:
RequestLe{ID, j, m }
the authentication request includes the ID of the wireless terminal and the number of the edge devicejEdge device number to be accessedm。
Edge devicemObtaining the wireless terminal through the extraction of the authentication request RequestLeiTo-be-authenticated physical radio frequency fingerprint characteristics。
C2. Edge devicemExtracting edge device numbers from a blockchainjThe Hash value of the corresponding classifier model and the Hash value corresponding to the identity ID of the wireless terminal are used for requesting the edge equipment from the IPFS network according to the two Hash valuesjCorresponding classifier model and registered physical radio frequency fingerprint characteristics。
C3. Edge devicemTo-be-authenticated physical radio frequency fingerprint characteristicsInputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and judging whether the physical radio frequency fingerprint characteristics to be authenticated are the same as the registered physical radio frequency fingerprint characteristicsThe consistency is achieved; if they are consistent, the wireless terminaliPassing the authentication, if not, the wireless terminaliThe authentication is not passed.
C4. Edge devicemDetermining the wireless terminal according to the authentication resultiWhether the edge equipment is accessed or not is judged, and the authentication result and the edge equipment number of the wireless terminal are returned to the wireless terminali。
The invention provides a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation, which utilizes a radio frequency fingerprint authentication technology to establish lightweight authentication between a wireless terminal and edge equipment; meanwhile, peer-to-peer trust relationships are established among the edge devices through a block chain technology, training characteristics of the radio frequency fingerprints are cooperatively shared, and the requirement for retraining the radio frequency fingerprint characteristics of the edge devices is reduced; finally, the purpose of reducing data processing amount is achieved, and the safe access authentication of the light-weight Internet of things wireless terminal is achieved.
Claims (3)
1. A radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation is characterized by comprising the following steps:
s1, system initialization:
each edge device issues a private and public key pair, and a plurality of edge devices jointly negotiate to complete block chain initialization setting;
s2, registering:
s2-1, the wireless terminal sends a registration request to the edge equipment, the edge equipment obtains the identity ID of the wireless terminal, and physical radio frequency fingerprint characteristics are extracted from the registration request of the wireless terminal;
s2-2, the edge device trains and updates a classifier model by using the extracted physical radio frequency fingerprint characteristics, and meanwhile, registered physical radio frequency fingerprint characteristics corresponding to the physical radio frequency fingerprint characteristics are obtained;
s2-3, the edge device generates registration data information data = < Register, < Hash (ID), hash (classfier), hash (RFF) > > according to the identity ID and the registered physical radio frequency fingerprint characteristics of the wireless terminal and a classifier model, and then generates registration transaction information mes according to the registration data information data and sends the registration transaction information mes to a block chain network; wherein, hash (ID) represents the Hash value of the ID, hash (classifier) represents the Hash value of the classifier model, and Hash (RFF) represents the Hash value of the physical radio frequency fingerprint characteristic;
s2-4, after other edge devices in the block chain network receive the registered transaction information mes, verifying whether the identity ID is repeated; if the registration is repeated, the registration is terminated; if not, verifying whether the digital signature of the registered transaction information mes is legal or not; if not, terminating the registration; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the number of registered transactions in the transaction pool meets the requirement, the edge device packs all registered transaction information into a block and sends the block to a block chain network;
s2-5, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain;
s2-6, after the block chain network consensus is successful, the edge device derives a classifier model and registers physical radio frequency fingerprint characteristics, and adds the classifier model and the registered physical radio frequency fingerprint characteristics into the IPFS network; the IPFS network cooperatively stores the classifier model and the registered physical radio frequency fingerprint characteristics among the edge devices, and returns the Hash value of the classifier model and the Hash value of the registered physical radio frequency fingerprint characteristics to all the edge devices to finish registration; the last edge device returns the edge device number of the wireless terminal;
s3, access authentication:
s3-1, the wireless terminal sends an authentication request to the edge equipment, wherein the authentication request comprises the identity ID of the wireless terminal and the number of the edge equipment where the wireless terminal is located; meanwhile, the edge device extracts the physical radio frequency fingerprint characteristics to be authenticated from the authentication request;
s3-2, the edge equipment inquires a Hash value of the classifier model corresponding to the identity ID and a Hash value of the ID, and requests the corresponding classifier model and the registered physical radio frequency fingerprint characteristic from an IPFS network of the edge equipment through the two Hash values;
s3-3, after the edge equipment obtains the classifier model, inputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and judging whether the physical radio frequency fingerprint characteristics to be authenticated are consistent with the registered physical radio frequency fingerprint characteristics or not; if the two are consistent, the wireless terminal passes the authentication, and if the two are not consistent, the wireless terminal does not pass the authentication;
and S3-4, the edge device determines whether the wireless terminal is accessed to the edge device according to the authentication result and returns the authentication result to the wireless terminal.
2. The block chain-based radio frequency fingerprint cross-layer security access authentication method under edge computing according to claim 1, further comprising a step of deleting a wireless terminal controlled by a malicious node, the specific process is as follows:
s4-1, when the edge device detects that a certain wireless terminal is controlled by a malicious node, the edge device deletes the identity ID and the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal, and retrains and updates the classifier model by using other registered physical radio frequency fingerprint characteristics;
s4-2, the edge device generates deleted data information data according to the deleted identity ID and the registered physical radio frequency fingerprint characteristics, then generates deleted transaction information mes according to the deleted data information data, and sends the deleted transaction information mes to the block chain network;
s4-3, after receiving the deleted transaction information mes, other edge devices in the block chain network verify whether the ID is registered or not; if not, terminating the deleting operation; if the transaction information mes is registered, verifying whether the digital signature of the deleted transaction information mes is legal or not; if not, terminating the deleting operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the number of the deleted transactions in the transaction pool meets the requirement, the edge equipment packs all the deleted transaction information into a block and sends the block to a block chain network;
s4-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain;
and S4-5, after the block chain network consensus is successful, the edge equipment updates the classifier model in the IPFS network, then the IPFS network deletes the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal controlled by the malicious node, and returns the Hash values of the updated classifier model to all the edge equipment to finish the deletion operation.
3. The block chain-based radio frequency fingerprint cross-layer security access authentication method under edge computing according to claim 2, further comprising an updating step, specifically comprising:
s5-1, after the edge device extracts the new physical radio frequency fingerprint characteristics of the wireless terminal, the wireless terminal retrains and updates the classifier model by using the new physical radio frequency fingerprint characteristics, and obtains updated registered physical radio frequency fingerprint characteristics;
s5-2, the edge device generates updating data information data according to the updated registered physical radio frequency fingerprint characteristics and the identity ID thereof, and then generates updating transaction information mes according to the updating data information data and sends the updating transaction information mes to a block chain network;
s5-3, after other edge devices in the block chain network receive the updated transaction information mes, verifying whether the digital signature of the updated transaction information mes is legal or not; if not, terminating the updating operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the updating transaction number in the transaction pool meets the requirement, the edge device packs all updating transaction information into a block and sends the block to a block chain network;
s5-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain;
and S5-5, after the block chain network consensus is successful, the edge equipment updates the classifier model and the registered physical radio frequency fingerprint characteristics in the IPFS network, and returns the Hash values of the updated classifier model and the updated registered physical radio frequency fingerprint characteristics to all the edge equipment to finish the updating operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211673749.3A CN115643575B (en) | 2022-12-26 | 2022-12-26 | Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211673749.3A CN115643575B (en) | 2022-12-26 | 2022-12-26 | Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115643575A true CN115643575A (en) | 2023-01-24 |
CN115643575B CN115643575B (en) | 2023-03-10 |
Family
ID=84950007
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211673749.3A Active CN115643575B (en) | 2022-12-26 | 2022-12-26 | Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115643575B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170251364A1 (en) * | 2015-08-19 | 2017-08-31 | University Of Electronic Science And Technology Of China | Cross-layer Authentication Method based on Radio Frequency Fingerprint |
US20180019879A1 (en) * | 2016-07-12 | 2018-01-18 | International Business Machines Corporation | Token identity and attribute management |
US20200244464A1 (en) * | 2019-01-25 | 2020-07-30 | International Business Machines Corporation | Blockchain based authentication |
US20200259658A1 (en) * | 2019-02-07 | 2020-08-13 | International Business Machines Corporation | Smart device to impose trust at the edge of a blockchain |
US20210142336A1 (en) * | 2019-11-11 | 2021-05-13 | Insoo Suk | Method and system for certifying product authenticity using physical feature information including digitized surface fingerprint and blockchain |
US20210334876A1 (en) * | 2020-04-23 | 2021-10-28 | International Business Machines Corporation | Data-analysis-based validation of product review data and linking to supply chain record data |
CN114024766A (en) * | 2021-11-23 | 2022-02-08 | 重庆邮电大学 | Zero trust identity authentication method facing edge computing node |
CN115169590A (en) * | 2022-05-16 | 2022-10-11 | 中国石油大学(华东) | Industrial Internet of things equipment participation federal learning method based on edge calculation and transfer learning |
CN115378604A (en) * | 2022-08-11 | 2022-11-22 | 重庆邮电大学 | Identity authentication method of edge computing terminal equipment based on credit value mechanism |
-
2022
- 2022-12-26 CN CN202211673749.3A patent/CN115643575B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170251364A1 (en) * | 2015-08-19 | 2017-08-31 | University Of Electronic Science And Technology Of China | Cross-layer Authentication Method based on Radio Frequency Fingerprint |
US20180019879A1 (en) * | 2016-07-12 | 2018-01-18 | International Business Machines Corporation | Token identity and attribute management |
US20200244464A1 (en) * | 2019-01-25 | 2020-07-30 | International Business Machines Corporation | Blockchain based authentication |
US20200259658A1 (en) * | 2019-02-07 | 2020-08-13 | International Business Machines Corporation | Smart device to impose trust at the edge of a blockchain |
US20210142336A1 (en) * | 2019-11-11 | 2021-05-13 | Insoo Suk | Method and system for certifying product authenticity using physical feature information including digitized surface fingerprint and blockchain |
US20210334876A1 (en) * | 2020-04-23 | 2021-10-28 | International Business Machines Corporation | Data-analysis-based validation of product review data and linking to supply chain record data |
CN114024766A (en) * | 2021-11-23 | 2022-02-08 | 重庆邮电大学 | Zero trust identity authentication method facing edge computing node |
CN115169590A (en) * | 2022-05-16 | 2022-10-11 | 中国石油大学(华东) | Industrial Internet of things equipment participation federal learning method based on edge calculation and transfer learning |
CN115378604A (en) * | 2022-08-11 | 2022-11-22 | 重庆邮电大学 | Identity authentication method of edge computing terminal equipment based on credit value mechanism |
Non-Patent Citations (1)
Title |
---|
方俊杰;雷凯;: "面向边缘人工智能计算的区块链技术综述" * |
Also Published As
Publication number | Publication date |
---|---|
CN115643575B (en) | 2023-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Biswas et al. | A scalable blockchain framework for secure transactions in IoT | |
CN112073379B (en) | Lightweight Internet of things security key negotiation method based on edge calculation | |
CN109413032A (en) | A kind of single-point logging method, computer readable storage medium and gateway | |
CN108964925B (en) | File authentication equipment method, device, equipment and readable medium | |
JP6401784B2 (en) | Payment authentication system, method and apparatus | |
CN106850201B (en) | Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system | |
US20180097640A1 (en) | Mobile Authentication Interoperability For Digital Certificates | |
US20190182237A1 (en) | Mobile Authentication And Registration For Digital Certificates | |
CN110958111A (en) | Electric power mobile terminal identity authentication mechanism based on block chain | |
CN111385103B (en) | Authority processing method, system and device and electronic equipment | |
CN109005538A (en) | Towards the message authentication method between automatic driving vehicle and more mobile edge calculations servers | |
CN108171486A (en) | It is a kind of that there is the terminal of E-seal | |
CN112954680B (en) | Tracing attack resistant lightweight access authentication method and system for wireless sensor network | |
CN114861211B (en) | Metadata scene-oriented data privacy protection method, system and storage medium | |
CN113724078A (en) | Zk-snark-based block chain integral user authentication method | |
CN106657164B (en) | A kind of identification composite algorism and system for real-name authentication | |
CN114844629A (en) | Verification method and device of block chain account, computer equipment and storage medium | |
Zhang et al. | Multiaccess edge integrated networking for Internet of Vehicles: A blockchain-based deep compressed cooperative learning approach | |
CN115643575B (en) | Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation | |
Cheng et al. | Research on privacy protection technology in face identity authentication system based on edge computing | |
CN114172742A (en) | Layered authentication method for power internet of things terminal equipment based on node map and edge authentication | |
Megalingam et al. | Voter ID Card and Fingerprint-Based E-voting System | |
Wang et al. | Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device Selection | |
Zhang et al. | A blockchain and multi factor fusion based electronic identity registration and verification system | |
Peng et al. | Identity Authentication Technology in Edge Computing Environment: Vision and Challenges |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |