CN117081734A - Cross-domain authentication method for trusted access of industrial Internet equipment - Google Patents

Cross-domain authentication method for trusted access of industrial Internet equipment Download PDF

Info

Publication number
CN117081734A
CN117081734A CN202310992070.9A CN202310992070A CN117081734A CN 117081734 A CN117081734 A CN 117081734A CN 202310992070 A CN202310992070 A CN 202310992070A CN 117081734 A CN117081734 A CN 117081734A
Authority
CN
China
Prior art keywords
domain
identity
authentication
server
service server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310992070.9A
Other languages
Chinese (zh)
Inventor
张志勇
张恬恬
于雅洁
张蓝方
赵可景
邵敬平
张中亚
赵长伟
薛钦海
李亚楠
周滢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Science and Technology
Original Assignee
Henan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Science and Technology filed Critical Henan University of Science and Technology
Priority to CN202310992070.9A priority Critical patent/CN117081734A/en
Publication of CN117081734A publication Critical patent/CN117081734A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The invention discloses a cross-domain authentication method for trusted access of industrial Internet equipment, which comprises the following steps of S1, registration stage: the user U registers at the local authentication server AS, issues a key pair for the user U, and calculates and generates an initial identity credential BCid; s2, identity authentication and industrial perception phase: the identity authentication information in the step S1 is registered and then stored in a blockchain BC, an authentication server AS verifies whether an identity certificate exists in the blockchain BC, and if so, the validity and the validity period of the identity certificate are verified; and then, carrying out integrity measurement and verification on the state of the hardware equipment through periodic industrial safety perception, and updating the identity certificate. By adopting the cross-domain authentication method for the trusted access of the industrial Internet equipment, the invention ensures the trusted access of the equipment and improves the safety and the credibility of an industrial Internet system by periodically sensing the environment where the equipment is and the safety of the equipment.

Description

Cross-domain authentication method for trusted access of industrial Internet equipment
Technical Field
The invention relates to the technical field of industrial Internet security, in particular to a cross-domain authentication method for trusted access of industrial Internet equipment.
Background
The rapid development of the industrial Internet is accompanied by the continuous growth of intelligent equipment and industrial scale, the communication interaction phenomenon of cross-region, cross-platform and cross-equipment is increased, great complexity is brought to the infrastructure, and the problem of identity authentication deficiency of the industrial Internet equipment is also increasingly highlighted.
Most of the existing identity authentication schemes construct different domain trust through block chains, so that the related management work of a third party platform is weakened, the vulnerability problem caused by centralized storage is avoided, an executable technical scheme is provided for the safe realization of identity authentication, and the true integrity of data and the credibility of the identity are protected. The credibility and the safety of cross-domain authentication are improved by using the blockchain technology, so that the safety, the trust and the traceability of users and equipment in an industrial Internet scene are ensured.
The existing industrial Internet identity authentication scheme is developed based on a blockchain technology, but the problem of lack of authentication on equipment of two communication parties still exists, the complex and changeable actual situation of the existing industrial Internet intelligent equipment is not fully considered, and the trusted access of the equipment cannot be ensured.
Disclosure of Invention
The invention aims to provide a cross-domain authentication method for trusted access of industrial Internet equipment, which comprehensively ensures the safety of data resources, the safety of platform identity and the healthy state of integrity of terminal and server interaction by carrying out identity authentication, integrity measurement, verification and the like on two communication parties, effectively solves the problem of equipment cross-domain authentication credibility in an industrial environment, and realizes the double identity credibility of users and hardware equipment; compared with the existing identity authentication scheme, the method has the advantages of guaranteeing the safety of data resources, resisting attack and the like, and improving the safety of the system.
In order to achieve the above purpose, the present invention provides a cross-domain authentication method for trusted access of industrial internet equipment, which comprises a user terminal U, an authentication server AS, a service server BS and a blockchain BC, and is characterized by comprising the following steps:
s1, a registration stage:
the user U registers at the local authentication server AS, issues a key pair for the user U, and calculates and generates an initial identity credential BCid;
s2, identity authentication and industrial perception phase:
the identity authentication information in the step S1 is registered and then stored in a blockchain BC, an authentication server AS verifies whether an identity certificate exists in the blockchain BC, and if so, the validity and the validity period of the identity certificate are verified; and then, carrying out integrity measurement and verification on the state of the hardware equipment through periodic industrial safety perception, and updating the identity certificate.
Preferably, in step S1, first, a TPM chip is configured on both an entity user terminal device and a server device, and an EK certificate and an AIK certificate of a corresponding device are generated based on the TPM chip, and specific steps of the registration stage are as follows:
s11, user U in digital workshop A A To the home domain service server BS A Sending a registration request, inputting a random character string, obtaining an identity ID through an SHA-256 algorithm, and passing through the integrity of a TPMThe method comprises the steps that the PCR value and the measurement log SML of equipment are obtained, and a registration request comprises identity information such as a self-identity identifier ID, the PCR value, a random number N, the measurement log SML, an AIK public key and the like;
s12, signing the identity information and the random number N and then sending the signature to the local domain service server BS A
S13, local domain service server BS A Initially confirming the security and calling the local authentication server AS A User U is provided with A The identity information is forwarded to a local authentication server AS A Performing verification and registration storage;
s14, local domain authentication server AS A After receiving the message, verifying the validity of the random number N using its public key, and the user U A Whether the identity information exists already, if so, terminating the registration; otherwise, the operation of S15 is carried out, and the information is stored and uplink;
s15, inquiring whether the equipment information exists in the block chain BC, and if so, terminating registration; otherwise, register and store the device information and return the final result to the local authentication server AS A
S16, local domain authentication server AS A After receiving the registration success message returned by the block chain BC, generating an initial identity certificate BCid and a validity period ValidityT, and returning the result to the local domain service server BS A
S17, local domain service server BS A Returning a message of successful registration to the user U A User U A The public key is used to check the signature and obtain the identity credential BCid.
Preferably, in step S16, the initial identity credential BCid generation and update algorithm is as follows:
s161, firstly inputting an identity ID, a timestamp and a random number N, and transmitting a message signature to a home domain authentication server AS A
S162, local authentication server AS A Verifying freshness of the random number N and the timestamp, and splicing the ID, the timestamp and the random number N after verification is passed to obtain character string data;
s163, generating a random salt value salt, carrying out hash salification processing on data by using a PBKDF2 algorithm, and generating a hash value hashaldData after iteration;
s164, merging the salt value salt and the hash value hashaldData, and then obtaining an identity credential of a byte type;
s165, obtaining an identity certificate of a character string type by using base64 coding;
s166, when the identity certificate needs to be updated, the identity certificate is regenerated, and the existing identity certificate is invalid.
Preferably, in step S2, the authentication is divided into a home domain identity authentication and a cross-domain identity authentication, and the steps of the home domain identity authentication protocol are as follows:
s21, user U in digital workshop A A First carrying BCid to local domain service server BS A Resource request is sent out, and local domain service server BS A After receiving the request, calling the local authentication server AS A
S22, local domain authentication server AS A Checking the validity and timeliness of the user identity certificate BCid, inquiring and returning a corresponding result if the verification is passed, otherwise, carrying out integrity measurement on the equipment again according to the industrial safety perception of the local domain and updating the identity certificate;
s23, local domain authentication server AS A The verification result is returned to the local domain service server BS A Local area service server BS A Making an analysis decision and deciding whether to issue the resource.
Preferably, in step S22, the specific process of local domain industrial security perception is as follows:
sa1: user U in digital workshop A A To the home domain service server BS A Transmitting request information, wherein the request information comprises equipment information, random numbers, signed equipment information and existing identity certificates;
sa2, local domain service server BS A Confirm the equipment information and existing identity credentials, authenticate server AS to home domain A Forwarding the message;
sa3, home authentication server AS A Query and verify U A Existing identity credentials, and for U A Checking the result after the integrity measurement;
after Sa4, the authentication is passed, the identity certificate and the validity period are regenerated, and the authentication server AS of the local domain is sent A Device information and random number N, signature update and then send to local domain service server BS A
Sa5, local domain service server BS A Forwarding the message to the user terminal;
sa6, user U A For AS A And checking the result after the integrity measurement, and obtaining the updated identity certificate through posterior signature.
Preferably, the steps of the cross-domain identity authentication protocol are as follows:
s31, the first cross-domain authentication triggers the cross-domain industrial security perception to confirm the integrity of the equipment and verify the existing identity credentials, and then the equipment integrity measurement and verification are carried out to update and generate the identity credentials with validity periods;
s32, user U in digital workshop A A Carry the acquired identity certificate BCid and the timestamp to the B domain service server BS of the digital workshop B Sending request, B-domain service server BS B Received U A After the request of (a), forwarding the request and authenticating the server AS to the B domain B Initiating call, B-domain authentication server AS B Verifying the validity and validity of the BCid;
s33, B domain authentication server AS B The uplink inquiry request verifies whether the identity information exists or not and returns a corresponding result to the B-domain service server BS B If the identity information does not exist, carrying out integrity measurement on the equipment again according to the cross-domain industrial safety perception and updating the identity credentials;
s34, B domain authentication server AS B The verification result is returned to the B-domain service server BS B Service server BS B Making an analysis decision and deciding whether to issue the resource.
Preferably, in step S31, the specific flow of the cross-domain industrial security sensing is as follows:
sb1, digital workshop A domain user U A Transmitting requestInformation is obtained for a B domain service server BS of a digital workshop B The request information comprises equipment information, a random number N, signed equipment information and an existing identity credential BCid;
sb2, B domain service server BS of digital workshop B Confirming and forwarding the message;
sb3, B domain authentication server AS B Inquiring and verifying identity certificate BCid, and comparing U with A Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb4, after passing the verification, sending the B domain authentication server AS B Device information and random number N are signed and sent to B domain service server BS B
Sb5, B domain service server BS B Forwarding the above-mentioned message to a-domain service server BS A
Sb 6A domain service server BS A Preliminary acknowledgement and forwarding of the message to the a-domain authentication server AS A
Sb7 and A domain authentication server AS A Authentication server AS for B domain B Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb8, after passing the verification, sending an A domain authentication server AS A Device information and random number are signed and sent to a domain service server BS A
Sb9 for forwarding the message to the B-domain authentication server AS B
Sb10, B domain authentication service AS B Authentication server AS for A domain A Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb11, B domain authentication server AS B Regenerating identity certificate BCid and validity period, encrypting the identity certificate BCid by using a private key and then transmitting the encrypted identity certificate BCid and validity period to a B-domain service server BS B
Sb12, B domain service server BS B Forwarding the message to user U A, U A The public key is used for decryption to obtain the latest identity credential and the validity period.
Therefore, the cross-domain authentication method for the trusted access of the industrial Internet equipment has the following beneficial effects:
(1) The authentication process of the invention firstly verifies the identity of the terminal user and the hardware equipment, and then verifies the server side, thereby realizing the interactive double-sided reliable and effective cross-domain authentication.
(2) The method and the device carry out integrity measurement and verification on the equipment based on the PCR value which cannot be changed in the TPM, ensure that the identity of the users is legal and the state of the hardware equipment is healthy, and effectively resist the security threat brought by the hardware equipment.
(3) In the authentication process, random numbers are used for ensuring the freshness of the message when any party sends the message, and even if the message is intercepted by an adversary from the middle, the authentication failure can be caused by the unreliability of the message, thereby effectively preventing replay attack.
(4) The temporary identity is used in authentication, so that the temporary identity has certain anonymity, and after the validity period of the temporary identity is passed, the identity information is not available any more, and then the temporary identity is updated, so that the malicious tracking of the identity is avoided, and the identity security is effectively improved.
(5) Compared with other schemes, the method has obvious advantages in the cross-domain authentication calculation overhead, and the traffic is reduced. The communication process comprises identity certificates, and the IDs, the random numbers and the like are subjected to hash salting for a plurality of times, so that identity counterfeiting can be effectively guaranteed, and the safety is improved.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
FIG. 1 is a cross-domain authentication scheme diagram of a cross-domain authentication method embodiment for trusted access of industrial Internet equipment;
FIG. 2 is a process diagram of an identity registration protocol of an embodiment of a cross-domain authentication method for trusted access of industrial Internet devices according to the present invention;
FIG. 3 is a process diagram of a local domain identity authentication protocol of an embodiment of a cross-domain authentication method for trusted access of industrial Internet equipment according to the present invention;
fig. 4 is a process diagram of a cross-domain authentication protocol of an embodiment of a cross-domain authentication method for trusted access of industrial internet equipment according to the present invention.
Detailed Description
The technical scheme of the invention is further described below through the attached drawings and the embodiments.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention belongs.
The cross-domain authentication method for the trusted access of the industrial Internet equipment uses the distributed storage based on the blockchain technology, and improves the reliability and the safety of the cross-domain authentication by using the blockchain technology, thereby ensuring the safety, the trust and the traceability of cross-domain users and equipment based on alliance blockchains in the industrial Internet scene.
The invention takes the blockchain as a bottom technology for providing data storage service and the basis of identity authentication of two domains. In order to clarify the responsibility of the authentication server and reduce the workload, a service server is independently arranged to schedule resources, and authentication is completed and resource distribution is performed by calling the authentication server. An authentication server is introduced to take charge of key generation and management, signature generation and authentication operations are completed, and a cross-domain authentication request is completed in cooperation with a service server. Based on an industrial intelligent scene, periodic industrial safety perception is carried out on hardware equipment in an authentication process, corresponding analysis and decision are made, and identity credentials are dynamically updated, so that local domain resources are distributed, and adverse consequences such as resource waste and even intentional acquisition caused by request domain users due to request change or failure and the like are avoided.
Aiming at the problem that the current identity authentication scheme cannot ensure the trusted access of equipment, the scheme provides a novel cross-domain identity authentication scheme for the trusted access of industrial Internet equipment, and a model diagram is shown in figure 1:
it is assumed that an industrial digital plant is made up of several independent digital workshops, with the entities in each digital workshop together participating in maintaining the digital plant's safety and proper operation, including user terminals, servers, service resources, etc. The cross-domain authentication process is described in detail below. When a domain a user wants to access a domain B resource, the detailed description is as follows:
a user in the digital workshop A firstly initiates a resource request message to a service server in the digital workshop B, and the service server responds and calls the domain authentication server to authenticate the identity of the user; meanwhile, the user, the server and other devices in the two digital workshops judge whether the user identity and the communication equipment are damaged or not through bidirectional identity authentication, bidirectional integrity measurement and verification and related calculation and analysis decision, so that the trusted access of the equipment is ensured. If the judging result shows that the identity of the opposite party is not credible or the integrity is destroyed, immediately terminating the data interaction process of the two communication parties; otherwise, the digital workshop B authentication server makes an analysis decision on the request data, and makes a trusted access to the authorization equipment to complete the resource request and distribution process.
The user requesting the resource in the scene belongs to a digital workshop A, the user needs to register in an authentication server AS of the local domain in advance, and the local domain AS issues a key pair for the user. When the A-domain user accesses the resource in the digital workshop A, the A-domain user can directly request the local domain authentication server, and the resource access is performed after verification; when the A-domain user accesses the resources in the digital workshop B, the authentication server in the digital workshop B needs to authenticate the user and equipment thereof by combining with the block chain, so that the safety of the identity and the authenticity of the equipment are ensured, and meanwhile, the B-domain related server equipment also needs to perform identity validity verification and equipment integrity measurement, so that the equipment of the two parties is trusted and authentic.
The terminal equipment, the server and other entities are configured with TPM chips, and the alliance blockchain BC consists of an authentication server in each security domain for storing user information and authority. Based on the above, the digital workshop A and the digital workshop B establish a alliance relationship to form a trust channel, and the two devices complete communication interaction and resource access through trusted access.
The following table 1 outlines some important symbols used in the design process of the present method:
s1, a registration stage:
industrial internet production lines are typically multiple devices that are responsible for a particular production task or tasks, including large amounts of production data and product data. Thus, each device must send a request to the home domain authentication server before joining the production line to generate an initial identity credential for a subsequent authentication procedure.
The user U registers at the local authentication server AS, and issues a key pair for the user U, calculates and generates an initial identity credential BCid, and when the user A is used AS an example for first registration, the participant in the registration process mainly comprises the user terminal U A Authentication server AS A And a service server BS A Block chain BC.
The specific flow is as follows:
firstly, configuring TPM chips on entity user terminal equipment and server equipment, generating EK certificates and AIK certificates of corresponding equipment based on the TPM chips, and specifically, the registration stage comprises the following steps:
s11, user U in digital workshop A A To the home domain service server BS A Sending a registration request, inputting a random character string, obtaining an identity ID through an SHA-256 algorithm, obtaining a PCR value and a measurement log SML of the equipment through the integrity measurement of a TPM, wherein the registration request comprises identity information such as the self ID, the PCR value, a random number N, the measurement log SML, an AIK public key and the like;
s12, signing the identity information and the random number N and then sending the signature to the local domain service server BS A
S13, local domain service server BS A Initially confirming the security and calling the local authentication server AS A User U is provided with A The identity information is forwarded to a local authentication server AS A Performing verification and registration storage;
s14, local domain authentication server AS A After receiving the message, verifying the validity of the random number N using its public key, and the user U A Whether the identity information exists already, if so, terminating the registration; otherwise, the operation of S15 is carried out, and the information is stored and uplink;
s15, inquiring whether the equipment information exists in the block chain BC, and if so, terminating registration; otherwise, register and store the device information and return the final result to the local authentication server AS A
S16, local domain authentication server AS A After receiving the registration success message returned by the block chain BC, generating an initial identity certificate BCid and a validity period ValidityT, and returning the result to the local domain service server BS A
The initial identity credential BCid generation and update algorithm is as follows:
s161, firstly inputting an identity ID, a timestamp and a random number N, and transmitting a message signature to a home domain authentication server AS A
S162, local authentication server AS A Verifying freshness of the random number N and the timestamp, and splicing the ID, the timestamp and the random number N after verification is passed to obtain character string data;
s163, generating a random salt value salt, carrying out hash salification processing on data by using a PBKDF2 algorithm, and generating a hash value hashaldData after iteration;
s164, merging the salt value salt and the hash value hashaldData, and then obtaining an identity credential of a byte type;
s165, obtaining an identity certificate of a character string type by using base64 coding;
s166, when the identity certificate needs to be updated, the identity certificate is regenerated, and the existing identity certificate is invalid.
S17, local domain service server BS A Returning a message of successful registration to the user U A User U A Signature verification using public keyAnd acquiring an identity credential BCid, wherein the user initial identity credential is established based on the completion of registration.
S2, identity authentication and industrial perception phase:
before the identity authentication process is carried out, all service nodes in the domain are registered locally, the identity authentication information in the step S1 is registered and then stored in the blockchain BC, when the identity authentication process is requested, an authentication server AS verifies whether an identity credential exists in the blockchain BC, and if the identity credential exists, the validity and the validity period of the identity credential are verified; in terms of resource deployment, a blockchain exists after all identity authentication information is registered, and the blockchain also supports non-tamperable records, data sharing and the like; in the authentication process, the periodic industrial safety perception is carried out to measure and verify the integrity of the state of the hardware equipment, so that the follow-up operation of the two-party domain communication equipment in a safe and reliable environment is ensured, the identity credentials are updated, and the validity of the identity and the instantaneity of the information are ensured.
The authentication is divided into local domain identity authentication and cross-domain identity authentication, and the steps of the local domain identity authentication protocol are as follows:
s21, user U in digital workshop A A First carrying BCid to local domain service server BS A Resource request is sent out, and local domain service server BS A After receiving the request, calling the local authentication server AS A
S22, local domain authentication server AS A Checking the validity and timeliness of the user identity certificate BCid, inquiring and returning a corresponding result if the verification is passed, otherwise, carrying out integrity measurement on the equipment again according to the industrial safety perception of the local domain and updating the identity certificate;
the industrial safety perception specific flow in the field is as follows:
sa1: user U in digital workshop A A To the home domain service server BS A Transmitting request information, wherein the request information comprises equipment information, random numbers, signed equipment information and existing identity certificates;
sa2, local domain service server BS A Confirm the equipment information and existing identity credentials, authenticate server AS to home domain A Forwarding the message;
sa3, home authentication server AS A Query and verify U A Existing identity credentials, and for U A Checking the result after the integrity measurement;
after Sa4, the authentication is passed, the identity certificate and the validity period are regenerated, and the authentication server AS of the local domain is sent A Device information and random number N, signature update and then send to local domain service server BS A
Sa5, local domain service server BS A Forwarding the message to the user terminal.
Sa6, user U A For AS A And checking the result after the integrity measurement, and obtaining the updated identity certificate through posterior signature.
Through industrial safety perception, the health state of the environment where the hardware equipment is located is ensured, the identity certificate is updated, and the safety of the user and the accuracy of information are ensured.
S23, local domain authentication server AS A The verification result is returned to the local domain service server BS A Local area service server BS A Making an analysis decision and deciding whether to issue the resource.
Based on this, the local domain trust is established, and resource access and interaction operations can be performed in a certain period.
The steps of the cross-domain identity authentication protocol are as follows:
when a user requests an information service of a non-local domain, namely the user in the request domain and the requested resource belong to different trust domains, the cross-domain authentication process carries out cross-domain trust transfer by means of a blockchain, cross-domain trust is established, and a participant comprises a business server BS and an authentication server AS of the two domains. Taking the access of the A domain user to the B domain resource as an example, the primary cross-domain authentication steps are as follows:
s31, when a user UA in a digital workshop A domain accesses a domain resource of a digital workshop B for the first time, firstly triggering a cross-domain industrial safety perception confirmation device to complete and verify an identity certificate, performing key negotiation by two parties before industrial perception to obtain a Session key Session_key, and when industrial safety perception transmission information is encrypted by using the session_key to perform device integrity measurement and verification, confirming the validity of an identity and the integrity of the device, and then generating the identity certificate with a valid period for the cross-domain communication.
The specific flow of the cross-domain industrial safety perception is as follows:
sb1, digital workshop A domain user U A Sending request information to digital workshop B-domain service server BS B The request information comprises equipment information, a random number N, signed equipment information and an existing identity credential BCid;
sb2, B domain service server BS of digital workshop B Confirming and forwarding the message;
sb3, B domain authentication server AS B Inquiring and verifying identity certificate BCid, and comparing U with A Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb4, after passing the verification, sending the B domain authentication server AS B Device information and random number N are signed and sent to B domain service server BS B
Sb5, B domain service server BS B Forwarding the above-mentioned message to a-domain service server BS A
Sb 6A domain service server BS A Preliminary acknowledgement and forwarding of the message to the a-domain authentication server AS A
Sb7 and A domain authentication server AS A Authentication server AS for B domain B Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb8, after passing the verification, sending an A domain authentication server AS A Device information and random number are signed and sent to a domain service server BS A
Sb9 for forwarding the message to the B-domain authentication server AS B
Sb10, B domain authentication service AS B Authentication server AS for A domain A Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb11, B domain authentication server AS B Regenerating identity credential BCid and validity period, adding it with private keyAfter being encrypted, is sent to a B-domain service server BS B
Sb12, B domain service server BS B Forwarding the message to user U A ,U A And decrypting by using the public key to obtain the latest identity certificate and the validity period, and ensuring the health state of the environment where the hardware equipment is located and ensuring the safety of the user and the accuracy of the information through cross-domain industrial safety perception.
S32, user U in digital workshop A A Carry the acquired identity certificate BCid and the timestamp to the B domain service server BS of the digital workshop B Sending request, B-domain service server BS B Received U A After the request of (a), forwarding the request and authenticating the server AS to the B domain B Initiating call, B-domain authentication server AS B And verifying the validity and validity of the BCid.
S33, B domain authentication server AS B The uplink inquiry request verifies whether the identity information exists or not and returns a corresponding result to the B-domain service server BS B And if the identity information does not exist, carrying out integrity measurement on the equipment again according to the cross-domain industrial safety perception and updating the identity credentials.
S34, B domain authentication server AS B The verification result is returned to the B-domain service server BS B Service server BS B Making an analysis decision and deciding whether to issue the resource. After the two-way authentication, the two domains establish cross-domain trust by means of block chain, and the service server BS in the B domain of the digital workshop B Resource available digital workshop A domain user U A Access and interaction are carried out, user U A This may be done over a period of time.
Cross-domain reauthentication phase: after the cross-domain primary authentication is finished, if the user accesses the same resource in a certain period, namely, the cross-domain communication is performed again, re-authentication is not needed. Taking the above-mentioned cross-domain authenticated A-domain user as an example, user U in the digital workshop A-domain A Only the currently held Bcid, validityT and the random number N are sent to the B domain service server BS of the digital workshop B By B-domain service server BS B Authentication server AS for B domain B Calling, inquiring identity validity and its existenceJudging the validity period, checking whether the corresponding random number N is fresh or not, and returning a result if the verification is passed, so as to carry out resource distribution; if the verification fails, the state of the hardware equipment and the identity credential needs to be searched through industrial perception, and after the integrity measurement of the hardware equipment passes the verification, the identity credential is updated, so that the cross-domain authentication flow is executed.
Therefore, the invention designs the cross-domain authentication method for the trusted access of the industrial Internet equipment by adopting the cross-domain authentication method for the trusted access of the industrial Internet equipment, provides industrial safety perception, periodically senses the environment where the equipment is located and the safety of the equipment, completes the integrity measurement and verification of the equipment, effectively resists the safety attack of equipment authentication, prevents the occurrence of safety risks such as counterfeit identity, resource information stealing, unreliable equipment and the like, ensures the trusted access of the equipment, and improves the safety and the reliability of an industrial Internet system.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention and not for limiting it, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that: the technical scheme of the invention can be modified or replaced by the same, and the modified technical scheme cannot deviate from the spirit and scope of the technical scheme of the invention.

Claims (7)

1. The cross-domain authentication method for the trusted access of the industrial Internet equipment comprises a user terminal U, an authentication server AS, a service server BS and a blockchain BC, and is characterized by comprising the following steps:
s1, a registration stage:
the user U registers at the local authentication server AS, issues a key pair for the user U, and calculates and generates an initial identity credential BCid;
s2, identity authentication and industrial perception phase:
the identity authentication information in the step S1 is registered and then stored in a blockchain BC, an authentication server AS verifies whether an identity certificate exists in the blockchain BC, and if so, the validity and the validity period of the identity certificate are verified; and then, carrying out integrity measurement and verification on the state of the hardware equipment through periodic industrial safety perception, and updating the identity certificate.
2. The cross-domain authentication method for trusted access of industrial internet equipment according to claim 1, wherein in step S1, firstly, a TPM chip is configured on both an entity user terminal device and a server device, an EK certificate and an AIK certificate of a corresponding device are generated based on the TPM chip, and the specific steps of the registration stage are as follows:
s11, user U in digital workshop A A To the home domain service server BS A Sending a registration request, inputting a random character string, obtaining an identity ID through an SHA-256 algorithm, and obtaining a PCR value and a measurement log SML of the equipment through the integrity measurement of a TPM, wherein the registration request comprises identity information such as an identity identifier ID, the PCR value, a random number N, the measurement log SML, an AIK public key and the like;
s12, signing the identity information and the random number N and then sending the signature to the local domain service server BS A
S13, local domain service server BS A Initially confirming the security and calling the local authentication server AS A User U is provided with A The identity information is forwarded to a local authentication server AS A Performing verification and registration storage;
s14, local domain authentication server AS A After receiving the message, verifying the validity of the random number N using its public key, and the user U A Whether the identity information exists already, if so, terminating the registration; otherwise, the operation of S15 is carried out, and the information is stored and uplink;
s15, inquiring whether the equipment information exists in the block chain BC, and if so, terminating registration; otherwise, register and store the device information and return the final result to the local authentication server AS A
S16, local domain authentication server AS A After receiving the registration success message returned by the block chain BC, generating an initial identity credential BCid andvalidity period validity T, and returns the result to local domain service server BS A
S17, local domain service server BS A Returning a message of successful registration to the user U A User U A The public key is used to check the signature and obtain the identity credential BCid.
3. The cross-domain authentication method for trusted access of industrial internet equipment according to claim 2, wherein in step S16, the initial identity credential BCid generation and update algorithm is as follows:
s161, firstly inputting an identity ID, a timestamp and a random number N, and transmitting a message signature to a home domain authentication server AS A
S162, local authentication server AS A Verifying freshness of the random number N and the timestamp, and splicing the ID, the timestamp and the random number N after verification is passed to obtain character string data;
s163, generating a random salt value salt, carrying out hash salification processing on data by using a PBKDF2 algorithm, and generating a hash value hashaldData after iteration;
s164, merging the salt value salt and the hash value hashaldData, and then obtaining an identity credential of a byte type;
s165, obtaining an identity certificate of a character string type by using base64 coding;
s166, when the identity certificate needs to be updated, the identity certificate is regenerated, and the existing identity certificate is invalid.
4. The method for cross-domain authentication for trusted access of industrial internet equipment according to claim 1, wherein in step S2, the authentication is divided into local domain authentication and cross-domain authentication, and the steps of the local domain authentication protocol are as follows:
s21, user U in digital workshop A A First carrying BCid to local domain service server BS A Resource request is sent out, and local domain service server BS A After receiving the request, calling the local authentication server AS A
S22, home domainAuthentication server AS A Checking the validity and timeliness of the user identity certificate BCid, inquiring and returning a corresponding result if the verification is passed, otherwise, carrying out integrity measurement on the equipment again according to the industrial safety perception of the local domain and updating the identity certificate;
s23, local domain authentication server AS A The verification result is returned to the local domain service server BS A Local area service server BS A Making an analysis decision and deciding whether to issue the resource.
5. The cross-domain authentication method for trusted access of industrial internet equipment according to claim 4, wherein in step S22, the specific process of local domain industrial security awareness is as follows:
sa1: user U in digital workshop A A To the home domain service server BS A Transmitting request information, wherein the request information comprises equipment information, random numbers, signed equipment information and existing identity certificates;
sa2, local domain service server BS A Confirm the equipment information and existing identity credentials, authenticate server AS to home domain A Forwarding the message;
sa3, home authentication server AS A Query and verify U A Existing identity credentials, and for U A Checking the result after the integrity measurement;
after Sa4, the authentication is passed, the identity certificate and the validity period are regenerated, and the authentication server AS of the local domain is sent A Device information and random number N, signature update and then send to local domain service server BS A
Sa5, local domain service server BS A Forwarding the message to the user terminal;
sa6, user U A For AS A And checking the result after the integrity measurement, and obtaining the updated identity certificate through posterior signature.
6. The cross-domain authentication method for trusted access of industrial internet equipment according to claim 4, wherein the step of the cross-domain identity authentication protocol is as follows:
s31, the first cross-domain authentication triggers the cross-domain industrial security perception to confirm the integrity of the equipment and verify the existing identity credentials, and then the equipment integrity measurement and verification are carried out to update and generate the identity credentials with validity periods;
s32, user U in digital workshop A A Carry the acquired identity certificate BCid and the timestamp to the B domain service server BS of the digital workshop B Sending request, B-domain service server BS B Received U A After the request of (a), forwarding the request and authenticating the server AS to the B domain B Initiating call, B-domain authentication server AS B Verifying the validity and validity of the BCid;
s33, B domain authentication server AS B The uplink inquiry request verifies whether the identity information exists or not and returns a corresponding result to the B-domain service server BS B If the identity information does not exist, carrying out integrity measurement on the equipment again according to the cross-domain industrial safety perception and updating the identity credentials;
s34, B domain authentication server AS B The verification result is returned to the B-domain service server BS B Service server BS B Making an analysis decision and deciding whether to issue the resource.
7. The cross-domain authentication method for trusted access of industrial internet equipment according to claim 6, wherein in step S31, the specific flow of the cross-domain industrial security awareness is as follows:
sb1, digital workshop A domain user U A Sending request information to digital workshop B-domain service server BS B The request information comprises equipment information, a random number N, signed equipment information and an existing identity credential BCid;
sb2, B domain service server BS of digital workshop B Confirming and forwarding the message;
sb3, B domain authentication server AS B Inquiring and verifying identity certificate BCid, and comparing U with A Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
Sb4after passing the verification, sending the B-domain authentication server AS B Device information and random number N are signed and sent to B domain service server BS B
Sb5, B domain service server BS B Forwarding the above-mentioned message to a-domain service server BS A
Sb 6A domain service server BS A Preliminary acknowledgement and forwarding of the message to the a-domain authentication server AS A
Sb7 and A domain authentication server AS A Authentication server AS for B domain B Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb8, after passing the verification, sending an A domain authentication server AS A Device information and random number are signed and sent to a domain service server BS A
Sb9 for forwarding the message to the B-domain authentication server AS B
Sb10, B domain authentication service AS B Authentication server AS for A domain A Verifying the integrity of the equipment and the safety of the identity by verifying the result after the integrity measurement;
sb11, B domain authentication server AS B Regenerating identity certificate BCid and validity period, encrypting the identity certificate BCid by using a private key and then transmitting the encrypted identity certificate BCid and validity period to a B-domain service server BS B
Sb12, B domain service server BS B Forwarding the message to user U A, U A The public key is used for decryption to obtain the latest identity credential and the validity period.
CN202310992070.9A 2023-08-08 2023-08-08 Cross-domain authentication method for trusted access of industrial Internet equipment Pending CN117081734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310992070.9A CN117081734A (en) 2023-08-08 2023-08-08 Cross-domain authentication method for trusted access of industrial Internet equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310992070.9A CN117081734A (en) 2023-08-08 2023-08-08 Cross-domain authentication method for trusted access of industrial Internet equipment

Publications (1)

Publication Number Publication Date
CN117081734A true CN117081734A (en) 2023-11-17

Family

ID=88716282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310992070.9A Pending CN117081734A (en) 2023-08-08 2023-08-08 Cross-domain authentication method for trusted access of industrial Internet equipment

Country Status (1)

Country Link
CN (1) CN117081734A (en)

Similar Documents

Publication Publication Date Title
Mohammadali et al. A novel identity-based key establishment method for advanced metering infrastructure in smart grid
CN109922077B (en) Identity authentication method and system based on block chain
US10581615B2 (en) Blockchain-based identity authentication method, device, node and system
CN109618326B (en) User dynamic identifier generation method, service registration method and login verification method
US8515066B2 (en) Method, apparatus and program for establishing encrypted communication channel between apparatuses
CN1905436B (en) Method for ensuring data exchange safety
CN109728909A (en) Identity identifying method and system based on USBKey
US20190356496A1 (en) Public Key Infrastructure & Method of Distribution
US9398024B2 (en) System and method for reliably authenticating an appliance
US8085937B1 (en) System and method for securing calls between endpoints
CN114710275B (en) Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment
JP4783340B2 (en) Protecting data traffic in a mobile network environment
JP2007181123A (en) Digital certificate exchange method, terminal device, and program
CN114091009A (en) Method for establishing secure link by using distributed identity
CN117376026A (en) Internet of things equipment identity authentication method and system
WO2023116027A1 (en) Cross-domain identity verification method in secure multi-party computation, and server
Bilal et al. Time‐assisted authentication protocol
Palomar et al. Secure content access and replication in pure p2p networks
CN116015970A (en) Cross-domain identity authentication method based on SGX
JP4025734B2 (en) Session management apparatus, method, and program for establishing encrypted communication channel between terminals
CN117081734A (en) Cross-domain authentication method for trusted access of industrial Internet equipment
Diaz et al. On securing online registration protocols: Formal verification of a new proposal
CN115361147A (en) Device registration method and device, computer device and storage medium
KR101962349B1 (en) Consolidated Authentication Method based on Certificate
Boonkrong et al. Authentication and key establishment protocols

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination