CN115643575A - Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation - Google Patents

Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation Download PDF

Info

Publication number
CN115643575A
CN115643575A CN202211673749.3A CN202211673749A CN115643575A CN 115643575 A CN115643575 A CN 115643575A CN 202211673749 A CN202211673749 A CN 202211673749A CN 115643575 A CN115643575 A CN 115643575A
Authority
CN
China
Prior art keywords
radio frequency
frequency fingerprint
block chain
edge
wireless terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211673749.3A
Other languages
Chinese (zh)
Other versions
CN115643575B (en
Inventor
陈良
陈志伟
文红
侯文静
侯欣宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN202211673749.3A priority Critical patent/CN115643575B/en
Publication of CN115643575A publication Critical patent/CN115643575A/en
Application granted granted Critical
Publication of CN115643575B publication Critical patent/CN115643575B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation, and belongs to the technical field of security access authentication. The invention utilizes the radio frequency fingerprint authentication technology of the physical layer to establish lightweight authentication between the wireless terminal and the edge equipment; meanwhile, peer-to-peer trust relationships are established among the edge devices through the upper-layer block chain technology, training characteristics of the physical radio frequency fingerprints are cooperatively shared, and the requirement for retraining the physical radio frequency fingerprint characteristics of the edge devices is reduced; finally, the purpose of reducing data processing amount is achieved, and the safe access authentication of the light-weight Internet of things wireless terminal is achieved.

Description

Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation
Technical Field
The invention belongs to the technical field of security access authentication, and particularly relates to a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation.
Background
With the development of the mobile internet and the progress of communication technology, a large number of lightweight internet of things terminal devices are added into the network, access authentication is the first door of security, and high-security access authentication is the key for ensuring network security.
The traditional password access authentication technology is an authentication method based on calculation, the calculation complexity is high, the storage capacity is large, and the requirements of a lightweight terminal are difficult to meet. The radio frequency fingerprint authentication is a technology for carrying out access authentication by utilizing radio frequency fingerprint physical characteristic information, and is very suitable for the edge computing scene with a large number of internet of things terminals at a close distance due to the characteristics of light weight, load mainly concentrated on an authentication side and the like, authentication and computation are completed in edge equipment, and a wireless terminal does not need to carry out any computation and add any overhead, so that the problems of low power, small storage and difficulty in carrying out access authentication of the internet of things terminals are effectively solved. Machine learning is an effective method for realizing radio frequency fingerprint authentication at present, and because a wireless terminal needs to be re-authenticated when being transferred from one edge device to another edge device, the requirement for re-training of radio frequency fingerprint features is increased, so how to reduce the expense for re-training of the radio frequency fingerprint features and realize credible sharing of radio frequency fingerprint information of cross-edge devices is an urgent problem to be solved for cross-edge side radio frequency fingerprint authentication.
Disclosure of Invention
Aiming at the problem that the retraining cost of physical radio frequency fingerprint features is high under a new edge device when the prior art is used for cross-edge device physical radio frequency fingerprint authentication, the invention provides a radio frequency fingerprint cross-layer safety access authentication method based on a block chain under edge calculation, and light weight authentication is established between a wireless terminal and the edge device by utilizing the radio frequency fingerprint authentication technology of a physical layer; meanwhile, peer-to-peer trust relationships are established among the edge devices through the upper-layer block chain technology, training characteristics of the physical radio frequency fingerprints are cooperatively shared, and the requirement for retraining the physical radio frequency fingerprint characteristics of the edge devices is reduced; finally, the purpose of reducing data processing amount is achieved, and the safe access authentication of the light-weight Internet of things wireless terminal is achieved.
The technical scheme adopted by the invention is as follows:
a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation is characterized by comprising the following steps:
s1, system initialization:
each edge device issues a private and public key pair, and a plurality of edge devices negotiate together to complete block chain initialization setting.
S2, registering:
s2-1, the wireless terminal sends a registration request to the edge device, the edge device obtains the identity ID of the wireless terminal, and the physical radio frequency fingerprint characteristics are extracted from the registration request of the wireless terminal.
And S2-2, the edge equipment trains and updates a classifier model by using the extracted physical radio frequency fingerprint characteristics, and simultaneously obtains registered physical radio frequency fingerprint characteristics corresponding to the physical radio frequency fingerprint characteristics.
S2-3, the edge device generates registration data information data = < Register, < Hash (ID), hash (classfier), hash (RFF) > > according to the identity ID and the registered physical radio frequency fingerprint characteristics of the wireless terminal and a classifier model, and then generates registration transaction information mes according to the registration data information data and sends the registration transaction information mes to a block chain network; wherein, the Hash (ID) represents the Hash value of the ID, the Hash (classifier) represents the Hash value of the classifier model, and the Hash (RFF) represents the Hash value of the physical radio frequency fingerprint feature.
S2-4, after other edge devices in the block chain network receive the registered transaction information mes, verifying whether the identity ID is repeated; if the registration is repeated, the registration is terminated; if not, verifying whether the digital signature of the registered transaction information mes is legal or not; if not, terminating the registration; if the data is legal, the data is placed in a self trading pool; and when the number of the registered transactions in the transaction pool meets the requirement, the edge equipment packs all the registered transaction information into the block and sends the block to the block chain network.
And S2-5, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain network.
S2-6, after the block chain network consensus succeeds, the edge device exports a classifier model and registers physical radio frequency fingerprint characteristics, and adds the classifier model and the registered physical radio frequency fingerprint characteristics into an IPFS (inter-plane File System) network; the IPFS network cooperatively stores the classifier model and the registered physical radio frequency fingerprint characteristics among the edge devices, and returns the Hash value of the classifier model and the Hash value of the registered physical radio frequency fingerprint characteristics to all the edge devices to finish registration; and the last edge device returns the own edge device number of the wireless terminal.
S3, access authentication:
s3-1, the wireless terminal sends an authentication request to the edge equipment, wherein the authentication request comprises the identity ID of the wireless terminal and the number of the edge equipment where the wireless terminal is located; and simultaneously, the edge equipment extracts the physical radio frequency fingerprint characteristics to be authenticated from the authentication request.
And S3-2, the edge equipment inquires the Hash value of the classifier model and the Hash value of the ID corresponding to the ID, and requests the corresponding classifier model and the registered physical radio frequency fingerprint characteristic from an IPFS network of the edge equipment through the two Hash values.
S3-3, after the edge equipment obtains the classifier model, inputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and judging whether the physical radio frequency fingerprint characteristics to be authenticated are consistent with the registered physical radio frequency fingerprint characteristics; if the two are consistent, the wireless terminal passes the authentication, and if the two are not consistent, the wireless terminal does not pass the authentication.
And S3-4, the edge device determines whether the wireless terminal is accessed to the edge device according to the authentication result and returns the authentication result to the wireless terminal.
Further, the radio frequency fingerprint cross-layer security access authentication method based on the block chain under the edge calculation further comprises a step of deleting the wireless terminal controlled by the malicious node, and the specific process is as follows:
s4-1, after the edge device detects that a certain wireless terminal is controlled by a malicious node, the edge device deletes the identity ID and the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal, and retrains and updates the classifier model by utilizing other registered physical radio frequency fingerprint characteristics.
And S4-2, the edge equipment generates deleted data information data according to the deleted identity ID and the registered physical radio frequency fingerprint characteristics, and then generates deleted transaction information mes according to the deleted data information data and sends the deleted transaction information mes to the block chain network.
S4-3, after receiving the deleted transaction information mes, other edge devices in the block chain network verify whether the ID is registered; if not, terminating the deleting operation; if the transaction information mes is registered, verifying whether the digital signature of the deleted transaction information mes is legal or not; if not, terminating the deleting operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; and when the number of the deleted transactions in the transaction pool meets the requirement, the edge equipment packs all the deleted transaction information into a block and sends the block to the block chain network.
And S4-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the edge device.
And S4-5, after the block chain network consensus is successful, the edge equipment updates the classifier model in the IPFS network, then the IPFS network deletes the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal controlled by the malicious node, and returns the Hash values of the updated classifier model to all the edge equipment to finish the deletion operation.
Further, the radio frequency fingerprint cross-layer security access authentication method based on the block chain under the edge calculation further comprises an updating step, and the specific process is as follows:
and S5-1, after the edge device extracts the new physical radio frequency fingerprint characteristics of the wireless terminal, the wireless terminal retrains and updates the classifier model by using the new physical radio frequency fingerprint characteristics, and obtains the updated registered physical radio frequency fingerprint characteristics.
And S5-2, the edge equipment generates updating data information data according to the updated registered physical radio frequency fingerprint characteristics and the identity ID thereof, and then generates updating transaction information mes according to the updating data information data and sends the updating transaction information mes to the block chain network.
S5-3, after other edge devices in the block chain network receive the updated transaction information mes, verifying whether the digital signature of the updated transaction information mes is legal or not; if not, terminating the updating operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; and when the updated transaction number in the transaction pool meets the requirement, the edge equipment packs all the updated transaction information into the block and sends the block to the block chain network.
And S5-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the edge device.
And S5-5, after the block chain network consensus is successful, the edge equipment updates the classifier model and the registered physical radio frequency fingerprint characteristics in the IPFS network, and returns the Hash values of the updated classifier model and the updated registered physical radio frequency fingerprint characteristics to all the edge equipment to finish the updating operation.
The invention has the beneficial effects that:
(1) The invention realizes the identity authentication of the wireless terminal across the edge devices by the cooperation of the edge devices to store the classifier model and register the physical radio frequency fingerprint characteristics and combining the access control of the upper block chain.
(2) The physical radio frequency fingerprint characteristics of the wireless terminal are identified through the edge device, high-safety authentication of unclonable is achieved, and meanwhile, the light-weight safety authentication of the wireless terminal can be achieved because the wireless terminal does not need to execute complex operation.
(3) Under the condition that resource energy is limited, the wireless terminal realizes physical radio frequency fingerprint identification authentication through edge equipment, and light-weight safety is realized on a physical layer; meanwhile, the edge device ensures the sharing of training characteristics through the upper-layer block chain, and reduces the repeated training overhead under a credible mechanism.
Drawings
Fig. 1 is a diagram of a registration process of a radio frequency fingerprint cross-layer secure access authentication method based on a block chain under edge calculation;
fig. 2 is a diagram illustrating a radio frequency fingerprint cross-layer secure access authentication process based on a block chain under edge calculation.
Detailed Description
The technical solution of the present invention is further described in detail below with reference to an SVM (support vector machine) classification method, but the scope of the present invention is not limited to the following description.
Suppose there isJEach edge device comprises K wireless terminals currently; each edge device trains an SVM classifier model by using the physical radio frequency fingerprint characteristics of K wireless terminals to obtain the firstjUnder the edge equipmentiRegistered physical radio frequency fingerprint characteristics corresponding to each wireless terminal,j= 1,2,…Ji=1,2,…K
the embodiment provides a registration process of a radio frequency fingerprint cross-layer secure access authentication method based on a block chain under edge calculation, as shown in fig. 1, including the following steps:
A1. wireless terminaliEdge equipmentjMaking a registration request, the edge device obtains the wireless terminaliAnd extracting physical radio frequency fingerprint characteristics from the registration request of the wireless terminal
Figure 142740DEST_PATH_IMAGE001
A2. Edge devicejUtilizing extracted physical radio frequency fingerprint features
Figure 966078DEST_PATH_IMAGE001
Training and updating classifier model, and obtaining physical radio frequency fingerprint characteristics
Figure 273562DEST_PATH_IMAGE001
Corresponding registered physical RF fingerprint characteristics
Figure 632999DEST_PATH_IMAGE002
A3. Edge devicejAccording to the wireless terminaliIdentity ID and registered physical radio frequency fingerprint characteristics of
Figure 102158DEST_PATH_IMAGE002
And the classifier model generates a registration data information data =<Register , <Hash(ID) , Hash(classifier) , Hash(RFF)>>Then according to said registration data informationThe data generates registration transaction information mes and sends the registration transaction information mes to a block chain network; wherein, the Hash (ID) represents the Hash value of the ID, the Hash (classifier) represents the Hash value of the classifier model, and the Hash (RFF) represents the Hash value of the physical radio frequency fingerprint feature.
A4. After other edge devices in the block chain network receive the registered transaction information mes, verifying whether the identity ID is repeated; if the registration is repeated, the registration is terminated; if not, verifying whether the digital signature of the registered transaction information mes is legal or not; if not, terminating the registration; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the number of registered transactions in the transaction pool meets the requirement, the edge devicejPackaging all registered transaction information into a block and sending the block to the blockchain network.
A5. After other edge devices in the block chain network receive the block, the validity of the block is verified, and if the validity requirement is met, the block is added into the block chain of the edge device.
A6. After the block chain network consensus is successful, the edge devicejExporting a classifier model and registering physical radio frequency fingerprint characteristics, and adding the classifier model and the registered physical radio frequency fingerprint characteristics into an IPFS network; the IPFS network cooperatively stores the classifier model and the registered physical radio frequency fingerprint characteristics among the edge devices, and returns the Hash value of the classifier model and the Hash value of the registered physical radio frequency fingerprint characteristics to all the edge devices to finish registration; final edge devicejAnd returning the own edge device number of the wireless terminal.
When the wireless terminaliAccess to the edge devicejThe authentication steps are as follows:
B1. wireless terminaliTo the associated edge devicejSending an authentication Request:
Request{ID, j}
the authentication request includes the ID of the wireless terminal and the number of the edge devicej
Edge devicejObtaining the wireless terminal through the extraction of the authentication RequestiTo-be-authenticated physical radio frequency fingerprint characteristics
Figure 138423DEST_PATH_IMAGE001
B2. Edge devicejInquiring the Hash value of the classifier model corresponding to the identity ID and the Hash value of the ID, and requesting the corresponding classifier model and the registered physical radio frequency fingerprint characteristic from the IPFS network of the edge equipment through the two Hash values
Figure 249599DEST_PATH_IMAGE002
After the edge equipment obtains the classifier model, inputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and distinguishing the physical radio frequency fingerprint characteristics to be authenticated
Figure 932384DEST_PATH_IMAGE003
Whether or not to register physical RF fingerprint characteristics
Figure 838023DEST_PATH_IMAGE002
Consistency; if they are consistent, the wireless terminaliPassing the authentication, if not, the wireless terminaliAuthentication is not passed.
B3. Edge devicejDetermining the wireless terminal according to the authentication resultiWhether to access the edge device or not and returns the authentication result to the wireless terminali
When the wireless terminaliWhen moving from one edge device to another edge device, as shown in fig. 2, the authentication process is as follows:
C1. wireless terminaliEdge-pointing devicemSending an authentication request le:
RequestLe{ID, j, m }
the authentication request includes the ID of the wireless terminal and the number of the edge devicejEdge device number to be accessedm
Edge devicemObtaining the wireless terminal through the extraction of the authentication request RequestLeiTo-be-authenticated physical radio frequency fingerprint characteristics
Figure 370373DEST_PATH_IMAGE004
C2. Edge devicemExtracting edge device numbers from a blockchainjThe Hash value of the corresponding classifier model and the Hash value corresponding to the identity ID of the wireless terminal are used for requesting the edge equipment from the IPFS network according to the two Hash valuesjCorresponding classifier model and registered physical radio frequency fingerprint characteristics
Figure 19660DEST_PATH_IMAGE002
C3. Edge devicemTo-be-authenticated physical radio frequency fingerprint characteristics
Figure 88110DEST_PATH_IMAGE004
Inputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and judging whether the physical radio frequency fingerprint characteristics to be authenticated are the same as the registered physical radio frequency fingerprint characteristics
Figure 899072DEST_PATH_IMAGE002
The consistency is achieved; if they are consistent, the wireless terminaliPassing the authentication, if not, the wireless terminaliThe authentication is not passed.
C4. Edge devicemDetermining the wireless terminal according to the authentication resultiWhether the edge equipment is accessed or not is judged, and the authentication result and the edge equipment number of the wireless terminal are returned to the wireless terminali。
The invention provides a radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation, which utilizes a radio frequency fingerprint authentication technology to establish lightweight authentication between a wireless terminal and edge equipment; meanwhile, peer-to-peer trust relationships are established among the edge devices through a block chain technology, training characteristics of the radio frequency fingerprints are cooperatively shared, and the requirement for retraining the radio frequency fingerprint characteristics of the edge devices is reduced; finally, the purpose of reducing data processing amount is achieved, and the safe access authentication of the light-weight Internet of things wireless terminal is achieved.

Claims (3)

1. A radio frequency fingerprint cross-layer security access authentication method based on a block chain under edge calculation is characterized by comprising the following steps:
s1, system initialization:
each edge device issues a private and public key pair, and a plurality of edge devices jointly negotiate to complete block chain initialization setting;
s2, registering:
s2-1, the wireless terminal sends a registration request to the edge equipment, the edge equipment obtains the identity ID of the wireless terminal, and physical radio frequency fingerprint characteristics are extracted from the registration request of the wireless terminal;
s2-2, the edge device trains and updates a classifier model by using the extracted physical radio frequency fingerprint characteristics, and meanwhile, registered physical radio frequency fingerprint characteristics corresponding to the physical radio frequency fingerprint characteristics are obtained;
s2-3, the edge device generates registration data information data = < Register, < Hash (ID), hash (classfier), hash (RFF) > > according to the identity ID and the registered physical radio frequency fingerprint characteristics of the wireless terminal and a classifier model, and then generates registration transaction information mes according to the registration data information data and sends the registration transaction information mes to a block chain network; wherein, hash (ID) represents the Hash value of the ID, hash (classifier) represents the Hash value of the classifier model, and Hash (RFF) represents the Hash value of the physical radio frequency fingerprint characteristic;
s2-4, after other edge devices in the block chain network receive the registered transaction information mes, verifying whether the identity ID is repeated; if the registration is repeated, the registration is terminated; if not, verifying whether the digital signature of the registered transaction information mes is legal or not; if not, terminating the registration; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the number of registered transactions in the transaction pool meets the requirement, the edge device packs all registered transaction information into a block and sends the block to a block chain network;
s2-5, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain;
s2-6, after the block chain network consensus is successful, the edge device derives a classifier model and registers physical radio frequency fingerprint characteristics, and adds the classifier model and the registered physical radio frequency fingerprint characteristics into the IPFS network; the IPFS network cooperatively stores the classifier model and the registered physical radio frequency fingerprint characteristics among the edge devices, and returns the Hash value of the classifier model and the Hash value of the registered physical radio frequency fingerprint characteristics to all the edge devices to finish registration; the last edge device returns the edge device number of the wireless terminal;
s3, access authentication:
s3-1, the wireless terminal sends an authentication request to the edge equipment, wherein the authentication request comprises the identity ID of the wireless terminal and the number of the edge equipment where the wireless terminal is located; meanwhile, the edge device extracts the physical radio frequency fingerprint characteristics to be authenticated from the authentication request;
s3-2, the edge equipment inquires a Hash value of the classifier model corresponding to the identity ID and a Hash value of the ID, and requests the corresponding classifier model and the registered physical radio frequency fingerprint characteristic from an IPFS network of the edge equipment through the two Hash values;
s3-3, after the edge equipment obtains the classifier model, inputting the physical radio frequency fingerprint characteristics to be authenticated into the classifier model, and judging whether the physical radio frequency fingerprint characteristics to be authenticated are consistent with the registered physical radio frequency fingerprint characteristics or not; if the two are consistent, the wireless terminal passes the authentication, and if the two are not consistent, the wireless terminal does not pass the authentication;
and S3-4, the edge device determines whether the wireless terminal is accessed to the edge device according to the authentication result and returns the authentication result to the wireless terminal.
2. The block chain-based radio frequency fingerprint cross-layer security access authentication method under edge computing according to claim 1, further comprising a step of deleting a wireless terminal controlled by a malicious node, the specific process is as follows:
s4-1, when the edge device detects that a certain wireless terminal is controlled by a malicious node, the edge device deletes the identity ID and the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal, and retrains and updates the classifier model by using other registered physical radio frequency fingerprint characteristics;
s4-2, the edge device generates deleted data information data according to the deleted identity ID and the registered physical radio frequency fingerprint characteristics, then generates deleted transaction information mes according to the deleted data information data, and sends the deleted transaction information mes to the block chain network;
s4-3, after receiving the deleted transaction information mes, other edge devices in the block chain network verify whether the ID is registered or not; if not, terminating the deleting operation; if the transaction information mes is registered, verifying whether the digital signature of the deleted transaction information mes is legal or not; if not, terminating the deleting operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the number of the deleted transactions in the transaction pool meets the requirement, the edge equipment packs all the deleted transaction information into a block and sends the block to a block chain network;
s4-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain;
and S4-5, after the block chain network consensus is successful, the edge equipment updates the classifier model in the IPFS network, then the IPFS network deletes the registered physical radio frequency fingerprint characteristics corresponding to the wireless terminal controlled by the malicious node, and returns the Hash values of the updated classifier model to all the edge equipment to finish the deletion operation.
3. The block chain-based radio frequency fingerprint cross-layer security access authentication method under edge computing according to claim 2, further comprising an updating step, specifically comprising:
s5-1, after the edge device extracts the new physical radio frequency fingerprint characteristics of the wireless terminal, the wireless terminal retrains and updates the classifier model by using the new physical radio frequency fingerprint characteristics, and obtains updated registered physical radio frequency fingerprint characteristics;
s5-2, the edge device generates updating data information data according to the updated registered physical radio frequency fingerprint characteristics and the identity ID thereof, and then generates updating transaction information mes according to the updating data information data and sends the updating transaction information mes to a block chain network;
s5-3, after other edge devices in the block chain network receive the updated transaction information mes, verifying whether the digital signature of the updated transaction information mes is legal or not; if not, terminating the updating operation; if the transaction is legal, the transaction is placed in a transaction pool of the user; when the updating transaction number in the transaction pool meets the requirement, the edge device packs all updating transaction information into a block and sends the block to a block chain network;
s5-4, after other edge devices in the block chain network receive the block, verifying the validity of the block, and if the validity requirement is met, adding the block into the block chain of the block chain;
and S5-5, after the block chain network consensus is successful, the edge equipment updates the classifier model and the registered physical radio frequency fingerprint characteristics in the IPFS network, and returns the Hash values of the updated classifier model and the updated registered physical radio frequency fingerprint characteristics to all the edge equipment to finish the updating operation.
CN202211673749.3A 2022-12-26 2022-12-26 Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation Active CN115643575B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211673749.3A CN115643575B (en) 2022-12-26 2022-12-26 Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211673749.3A CN115643575B (en) 2022-12-26 2022-12-26 Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation

Publications (2)

Publication Number Publication Date
CN115643575A true CN115643575A (en) 2023-01-24
CN115643575B CN115643575B (en) 2023-03-10

Family

ID=84950007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211673749.3A Active CN115643575B (en) 2022-12-26 2022-12-26 Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation

Country Status (1)

Country Link
CN (1) CN115643575B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170251364A1 (en) * 2015-08-19 2017-08-31 University Of Electronic Science And Technology Of China Cross-layer Authentication Method based on Radio Frequency Fingerprint
US20180019879A1 (en) * 2016-07-12 2018-01-18 International Business Machines Corporation Token identity and attribute management
US20200244464A1 (en) * 2019-01-25 2020-07-30 International Business Machines Corporation Blockchain based authentication
US20200259658A1 (en) * 2019-02-07 2020-08-13 International Business Machines Corporation Smart device to impose trust at the edge of a blockchain
US20210142336A1 (en) * 2019-11-11 2021-05-13 Insoo Suk Method and system for certifying product authenticity using physical feature information including digitized surface fingerprint and blockchain
US20210334876A1 (en) * 2020-04-23 2021-10-28 International Business Machines Corporation Data-analysis-based validation of product review data and linking to supply chain record data
CN114024766A (en) * 2021-11-23 2022-02-08 重庆邮电大学 Zero trust identity authentication method facing edge computing node
CN115169590A (en) * 2022-05-16 2022-10-11 中国石油大学(华东) Industrial Internet of things equipment participation federal learning method based on edge calculation and transfer learning
CN115378604A (en) * 2022-08-11 2022-11-22 重庆邮电大学 Identity authentication method of edge computing terminal equipment based on credit value mechanism

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170251364A1 (en) * 2015-08-19 2017-08-31 University Of Electronic Science And Technology Of China Cross-layer Authentication Method based on Radio Frequency Fingerprint
US20180019879A1 (en) * 2016-07-12 2018-01-18 International Business Machines Corporation Token identity and attribute management
US20200244464A1 (en) * 2019-01-25 2020-07-30 International Business Machines Corporation Blockchain based authentication
US20200259658A1 (en) * 2019-02-07 2020-08-13 International Business Machines Corporation Smart device to impose trust at the edge of a blockchain
US20210142336A1 (en) * 2019-11-11 2021-05-13 Insoo Suk Method and system for certifying product authenticity using physical feature information including digitized surface fingerprint and blockchain
US20210334876A1 (en) * 2020-04-23 2021-10-28 International Business Machines Corporation Data-analysis-based validation of product review data and linking to supply chain record data
CN114024766A (en) * 2021-11-23 2022-02-08 重庆邮电大学 Zero trust identity authentication method facing edge computing node
CN115169590A (en) * 2022-05-16 2022-10-11 中国石油大学(华东) Industrial Internet of things equipment participation federal learning method based on edge calculation and transfer learning
CN115378604A (en) * 2022-08-11 2022-11-22 重庆邮电大学 Identity authentication method of edge computing terminal equipment based on credit value mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
方俊杰;雷凯;: "面向边缘人工智能计算的区块链技术综述" *

Also Published As

Publication number Publication date
CN115643575B (en) 2023-03-10

Similar Documents

Publication Publication Date Title
Biswas et al. A scalable blockchain framework for secure transactions in IoT
CN112073379B (en) Lightweight Internet of things security key negotiation method based on edge calculation
CN108964925B (en) File authentication equipment method, device, equipment and readable medium
JP6401784B2 (en) Payment authentication system, method and apparatus
CN106850201B (en) Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system
US10887113B2 (en) Mobile authentication interoperability for digital certificates
CN113162768B (en) Intelligent Internet of things equipment authentication method and system based on block chain
US10771451B2 (en) Mobile authentication and registration for digital certificates
CN110958111A (en) Electric power mobile terminal identity authentication mechanism based on block chain
CN109005538A (en) Towards the message authentication method between automatic driving vehicle and more mobile edge calculations servers
CN111385103B (en) Authority processing method, system and device and electronic equipment
US20190288833A1 (en) System and Method for Securing Private Keys Behind a Biometric Authentication Gateway
Feng et al. Research on mobile commerce payment management based on the face biometric authentication
CN106657164B (en) A kind of identification composite algorism and system for real-name authentication
Alotaibi et al. Enhancing OAuth services security by an authentication service with face recognition
Zhang et al. Multiaccess edge integrated networking for Internet of Vehicles: A blockchain-based deep compressed cooperative learning approach
CN111010279A (en) Remote multi-factor authentication protocol based on zero-knowledge proof
CN115643575B (en) Radio frequency fingerprint cross-layer security access authentication method based on block chain under edge calculation
CN113724078A (en) Zk-snark-based block chain integral user authentication method
CN116567631B (en) Mobile terminal security authentication method based on segmented block chain
Cheng et al. Research on privacy protection technology in face identity authentication system based on edge computing
CN111274572A (en) User login authentication system based on online banking safety management
CN114844629A (en) Verification method and device of block chain account, computer equipment and storage medium
CN114172742A (en) Layered authentication method for power internet of things terminal equipment based on node map and edge authentication
Zhang et al. A blockchain and multi factor fusion based electronic identity registration and verification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant