Movatterモバイル変換


[0]ホーム

URL:


CN116318678B - A multi-factor Internet of Things terminal dynamic group access authentication method - Google Patents

A multi-factor Internet of Things terminal dynamic group access authentication method
Download PDF

Info

Publication number
CN116318678B
CN116318678BCN202310311718.1ACN202310311718ACN116318678BCN 116318678 BCN116318678 BCN 116318678BCN 202310311718 ACN202310311718 ACN 202310311718ACN 116318678 BCN116318678 BCN 116318678B
Authority
CN
China
Prior art keywords
group
new
vid
auth
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310311718.1A
Other languages
Chinese (zh)
Other versions
CN116318678A (en
Inventor
罗文俊
敖晋
陈自刚
程智全
朱海华
陈龙
代仁杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and TelecommunicationsfiledCriticalChongqing University of Post and Telecommunications
Priority to CN202310311718.1ApriorityCriticalpatent/CN116318678B/en
Publication of CN116318678ApublicationCriticalpatent/CN116318678A/en
Application grantedgrantedCritical
Publication of CN116318678BpublicationCriticalpatent/CN116318678B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明涉及一种多因子物联网终端动态群组接入认证方法,属于物联网领域,包括:S1:SDN控制器与物联网网关建立安全连接,SDN控制器进行系统初始化,生成一个安全私钥,并选择一个安全单项哈希函数;S2:将物联网终端按群组进行划分,在安全信道下统一注册;S3:物联网终端通过PUF解密智能卡中的秘密参数,并对物联网终端的安全性、可靠性进行验证;S4:物联网终端进行身份认证与会话密钥协商;S5:当要向某一终端群组中添加新成员时,更新组密钥以保证前向安全;S6:当发现一个群组中的某个成员存在恶意行为时,将该成员逐出群组,并更新组密钥SKG以保证后向安全;S7:定时更新组身份与PUF激励响应对。

The invention relates to a multi-factor Internet of Things terminal dynamic group access authentication method, which belongs to the field of Internet of Things, and comprises the following steps: S1: an SDN controller establishes a secure connection with an Internet of Things gateway, the SDN controller performs system initialization, generates a secure private key, and selects a secure single hash function; S2: the Internet of Things terminals are divided into groups, and are uniformly registered under a secure channel; S3: the Internet of Things terminals decrypt secret parameters in a smart card through a PUF, and verify the security and reliability of the Internet of Things terminals; S4: the Internet of Things terminals perform identity authentication and session key negotiation; S5: when a new member is to be added to a terminal group, the group key is updated to ensure forward security; S6: when a member in a group is found to have malicious behavior, the member is expelled from the group, and the group key SKG is updated to ensure backward security; S7: the group identity and PUF incentive response pairs are updated regularly.

Description

Multi-factor internet of things terminal dynamic group access authentication method
Technical Field
The invention belongs to the field of Internet of things, and relates to a dynamic group access authentication method for a multi-factor Internet of things terminal.
Background
With the large-scale deployment of internet of things services, the number of internet of things terminals is increasing explosively. However, a large number of low-cost, low-power-consumption, narrow-bandwidth internet of things terminals are often deployed in unmanned or wireless signal complex environments with less data to send or receive. If the communication network is accessed by adopting an end-to-end authentication method one by one, a great deal of unnecessary signaling and calculation overhead is generated. The authentication efficiency is low, and the service life of the terminal powered by the battery is consumed. How to realize access authentication and key distribution and management of tens of thousands of internet of things terminals becomes a challenging research problem. The grouping of a plurality of terminals of the Internet of things is an effective management means, and the service network of group authentication faces to massive concurrent access scenes, and only needs to authenticate individual nodes in the group, and other group members can finish batch authentication locally. On the premise of ensuring safety, various system overheads can be reduced, and authentication efficiency is improved.
Lai C et al propose a lightweight group authentication scheme based on resource-constrained machine-to-machine (M2M) under 3GPP network architecture in "Lai C,LuR,ZhengD,etal.GLARM:Group-basedlightweightauthentication scheme for resource-constrained machine to machine communications[J].Computer Networks,2016,99:66-81.". In the scheme, a symmetrical cryptosystem and a method for aggregating MAC addresses are adopted to realize simultaneous authentication of a group of terminals. But this protocol does not implement forward/backward security, once the current key is compromised, the historical keys and future keys will be presumed to be unsecure, possibly resulting in a significant amount of encrypted data being compromised.
Li J et al in "Li J,Wen M,Zhang T.Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks[J].IEEE Internet ofThings Journal,2015,3(3):408-417." propose an AKA protocol based on dynamic policy updating of groups. In the protocol, a scheme of combining asynchronous secret sharing with Diffie-Hellman key exchange is adopted to realize distributed authentication and session key negotiation in the LTE-A network and realize dynamic updating of the access authority of the MTC device. However, the protocol adopts point multiplication operation, and each terminal device needs to communicate with a service network to realize key negotiation, so that the calculation and signaling overhead of the terminal is high.
Cao J et al in "Cao J,Yan Z,Ma R,et al.LSAA:A lightweight and secure access authentication scheme forbothUE andmMTC devices in 5Gnetworks[J].IEEE Internet ofThings Journal,2020,7(6):5329-5344." propose a lightweight secure access authentication scheme for UE and MMTC devices in a 5G network. In the scheme, the secure functions of mutual authentication, session key establishment, identity privacy protection, forward/backward confidentiality and the like of common User Equipment (UE) large-scale machine type communication (MMTC) equipment are realized by using Chebyshev chaotic mapping. However, the scheme does not verify the reliability and the safety of the terminal of the Internet of things and lacks a dynamic refreshing mechanism, so that a malicious node can be accessed to the system.
Among the above protocols, the protocol proposed by Lai C et al does not realize forward/backward security, once the current key leaks, the history key and the future key can be presumed, possibly resulting in a large amount of encrypted data leaking, the protocol proposed by Li J et al is complex in calculation, and each terminal device needs to communicate with the service network to realize key negotiation, resulting in high computational and signaling overhead of the terminal, and the protocol proposed by Cao J et al does not verify the reliability and security of the terminal of the internet of things and lacks a dynamic refresh mechanism, possibly causing the system to access a malicious node.
Disclosure of Invention
Therefore, the invention aims to provide a multi-factor internet of things terminal dynamic group access authentication method, which aims to realize a plurality of security functions, reduce signaling, calculation and storage expenses of the internet of things terminal in authentication, and realize batch authentication and session key negotiation of the internet of things terminal.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a multi-factor internet of things terminal dynamic group access authentication method comprises the following steps:
s1, in a system initialization stage, an SDN controller establishes a secure connection with an Internet of things gateway, the SDN controller performs system initialization, generates a secure private key and selects a secure single hash function;
S2, in the registration stage of the terminals of the Internet of things, the terminals of the Internet of things are divided according to groups, and unified registration is performed under a safety channel;
s3, in the login stage, the terminal of the Internet of things decrypts secret parameters in the smart card through the PUF, and verifies the safety and reliability of the terminal of the Internet of things;
s4, in a group to be authenticated, firstly, a group leader initiates an access authentication request to an SDN controller; the SDN controller verifies the identity of the group leader through the information in registration and the parameters in the authentication request, generates a random number, calculates an encryption key for each member in the group, and then sends the encryption key to the gateway of the Internet of things; the gateway of the internet of things calculates a session key for each terminal member, protects a random number through an encryption key, and then broadcasts an authentication message to group members; the group member calculates the encryption key, the session key and the group key locally according to the parameters and the authentication information when logging in, then verifies the authentication information and updates the pseudo identity, and then calculates the authentication success information and sends the authentication success information to the group owner;
s5, dynamically joining the terminal, namely updating a group key to ensure forward security when a new member is to be added into a certain terminal group;
S6, dynamically removing the terminal, namely when a member in a group is found to have malicious behaviors, evicting the member from the group, and updating a group key SKG to ensure backward safety;
And S7, updating the group identity and PUF excitation response at fixed time, namely updating the group identity and PUF excitation response to prevent tracking attack after a certain period of time, reselecting a private key and a PUF input excitation by each terminal of the Internet of things, calculating corresponding registration parameters and sending the registration parameters to an SDN controller, recalculating the group identity and the selection random number by the SDN controller according to the new parameters and sending the group identity and the selection random number to each terminal of the Internet of things through an original session key, and then synchronously calculating an updated session key and a group key by each terminal and the SDN controller.
Further, the step S1 specifically includes that the SDN controller establishes a secure connection with the gateway of the Internet of things, then generates a secure private key deltasc, and selects a secure single hash function H () {0,1}*→{0,1}n, n is the bit width of the hash function message digest output.
Further, in the step S2, all k terminal members in the group are provided with a physical unclonable function PUF by default, and initialize a stimulus response CRP (Ci, ri), and the registration of the terminal of the internet of things specifically includes the following steps:
S21, outputting a calculated registration parameter GPWi through an identity IDi and a PUF by the terminal of the Internet of things, and sending registration information of < IDi,GPWi > to the SDN controller;
Ri=PUF(Ci)
GPWi=H(IDi||Ri)
Wherein, Ri represents the output response of the physical unclonable function PUF, Ci represents the input stimulus of the physical unclonable function, GPWi represents the registration parameter, and H represents the hash function;
S22, calculating a pseudo identity VIDi for the terminal of the Internet of things by the SDN controller, selecting a large prime number pi and an exponential operation primitive root g, and sending registration information < VIDi,pi, g > to the terminal of the Internet of things by the SDN controller, wherein the calculation formula of the VIDi is as follows:
VIDi=H(IDi||δsc)
δsc represents the security private key of the SDN controller;
S22, selecting a private key xi by the terminal of the Internet of things, calculating registration information yi≡gximodpi, and sending registration information < yi > to the SDN;
s24, the SDN controller constructs a congruence equation set according to the registration information to calculate a set identity mark GID, the set identity mark is encrypted through the registration information to calculate Wi, the SDN controller sends registration information < Wi > to the terminal of the Internet of things, and the GID is a calculation result of the congruence equation, and the formula is as follows:
S25, the terminal of the Internet of things verifies and calculates B1 and B2 for encryption private keys and parameter integrity, and stores < B1,B2,VIDi,Wi > into the smart card SMCi, wherein Wi is used for protecting the parameter of the GID:
B1 and B2 are used for protecting the private key and integrity verification of the terminal of the Internet of things, and the calculation process is as follows:
B2=H(VIDi||IDi||xi||Ri||Wi||GID)。
Further, the step S3 specifically includes that the terminal of the Internet of things reads the identity IDi and the PUF input stimulus Ci, and parameters < B1,B2,VIDi,Wi > in the smart card, calculates GPWi, decrypts the private key protected by B1, and verifies the integrity of the parameters.
Further, the step S4 specifically includes:
S41, generating a timestamp T1 by a group leader, calculating an authentication request verification parameter AUTHGL=H(GID||VIDGL||IDGL||T1), and sending an authentication request message < VIDGL,AUTHGL,T1 > to the gateway of the Internet of things;
S42, the gateway of the Internet of things forwards the authentication request message to the SDN controller;
S43, after verifying the freshness of the message, the SDN controller verifies AUTHGL, calculates an encryption key Ki=H(VIDi||GID||GPWi for each terminal member, selects a random number r, and sends the message < { VIDi,Ki }, r, GID > to the terminal of the Internet of things;
S44, the gateway of the Internet of things calculates Di for protecting the random number r, calculates a session key SKi and an integrity verification parameter AUTHi-ITG, and sends a message < VIDi,Di,AUTHi-ITG > to a group leader according to the following formula:
SKi=H(VIDi||GID||r||Ki)
AUTHi-ITG=H(VIDi||GID||r||SKi||Ki||Di)
S45, broadcasting the message in the group by the group owner, calculating an encryption key Ki by the terminal member, decrypting Di to obtain a random number r, calculating a session key SKi, calculating a group key SKG, carrying out integrity verification and calculation AUTHi-ITG, updating a pseudo-identity calculation VIDinew, calculating an authentication success parameter AUTHi-N, and sending the message < VIDi,AUTHi-N > to the group owner, wherein the formula is as follows:
SKG=H(r||GID)
VIDinew=H(r||VIDi||IDi)
AUTHi-N=H(VIDi||GID||Di||r||SKi||SKG||Ki)
S46, the group leader carries out fusion calculation on the information of each member to obtain fusion authentication parameters AUTHt, and sends the information < VIDGL,AUTHt > to the gateway of the Internet of things, wherein:
s47, the gateway of the Internet of things calculates SKG, verifies AUTHt, sends an authentication success message to the SDN controller, and synchronously calculates < SKi,SKG,VIDinew >.
Further, the step S5 specifically includes the following steps:
S51, the new member Nk+1 generates a time stamp T2, calculates an authentication request verification parameter AUTHk+1, and sends a message < VIDk+1,AUTHk+1,T2 > to the group owner of the group, with the following specific formula:
AUTHk+1=H(GID'||VIDk+1||IDk+1||GPWk+1||T2)
s52, adding a group identity to the message by the group leader, and sending the message < VIDGL,VIDk+1,AUTHk+1,T2 > to the SDN controller;
s53, the SDN controller verifies the freshness of the message, verifies and calculates AUTHk+1, reconstructs a congruence equation set to calculate a new group identity mark GIDnew, selects a new random number rnew, calculates encryption keys K'k+1 and Kk+1, and sends the message < { VIDk+1,K'k+1,Kk+1},rnew,GIDnew > to the gateway of the Internet of things, wherein the calculation formula is as follows:
K’k+1=H(VIDk+1||GID'||GPWk+1)
Kk+1=H(VIDk+1||GIDnew||GPWk+1)
S54, the gateway of the Internet of things calculates D'k+1 and Dk+1 for encrypting the new group identity and the random number, calculates a session key SKk+1 and an integrity verification parameter AUTH(k+1)-ITG, sends a message < VIDk+1,D'k+1,Dk+1,AUTH(k+1)-ITG > to a new member, and broadcasts < rnew,GIDnew > to the original group member through the original group key, wherein the calculation formula is as follows:
SKk+1=H(VIDk+1||GIDnew||rnew||Kk+1)
AUTH(k+1)-ITG=H(VIDk+1||GIDnew||rnew||SKk+1||K'k+1||Kk+1||D'k+1||Dk+1)
S55, the new member calculates an encryption key K 'k+1 and Kk+1 to decrypt D'k+1 and Dk+1 to obtain a new group identity and a random number, calculates a session key SKk+1 and a group key SKGnew, calculates an AUTH(k+1)-ITG to be verified, updates a pseudo-identity VIDk+1new, calculates an authentication success parameter AUTH(k+1)-N, and sends a message < VIDk+1,AUTH(k+1)-N > to the gateway of the Internet of things, and other members update the < SKi,SKG,Wi > after receiving the < rnew,GIDnew >, wherein the calculation formula is as follows:
VIDk+1new=H(r||VIDk+1||IDk+1)
AUTH(k+1)-N=H(VIDk+1||GIDnew||D'k+1||Dk+1||rnew||SKk+1||SKGnew||K'k+1||Kk+1)
s56, the gateway of the Internet of things calculates SKGnew, verifies and calculates AUTH(k+1)-N, sends an authentication success message to the SDN controller, and synchronously updates the < SKi,SKG >.
Further, the step S6 specifically includes the following steps:
S61, firstly, the SDN controller retrieves malicious member Nk, and cancels legal identity of Nk, modifies yk into other value y'k, and reconstructs a congruence equation set to calculate GIDnew:
SDN generates a new random number rnew and encrypts and sends a message < rnew,GIDnew > to group members except malicious member Nk through SKi;
Other members update < SKi,SKG,Wi >, and the SC recalculates < SKi,SKG > and synchronizes with the ITG through encryption.
Further, step S7 includes the steps of generating a new PUF input stimulus Cinew by the Internet of things terminal, calculating Rinew,GPWinew, selecting a new private key xinew to calculate yinew, sending a message < GPWinew,yinew > to the SDN controller, reconstructing a congruence equation set by the SDN controller to obtain a GIDnew, generating a new random number Rnew, broadcasting the message < Rnew,GIDnew > to all group members, and updating parameters of the < SKi,SKG,Wi,B1,B2 > by the group members, the SDN controller and the Internet of things gateway.
The invention has the beneficial effects that:
Firstly, the method not only can realize the safety functions of mutual authentication, identity anonymity, replay attack resistance and the like, but also can update the pseudo identity and the random number after each negotiation, and update the encryption key at regular time, thereby ensuring the randomness and independence of each session key and the group key, even if an attacker obtains the current group key or the session key of a member in various ways, the former or later group key or session key can not be calculated, and the forward/backward safety is realized.
Secondly, only hash, exclusive or and other lightweight encryption algorithms are used in the whole process of the method, and the SDN controller only needs to authenticate the group leader in the terminal group of the internet of things, and other terminals of the internet of things can complete authentication and session key negotiation through local calculation by a method of broadcasting and aggregating messages, so that the calculation and signaling cost of terminals with limited resources is greatly reduced.
Thirdly, by utilizing the characteristics of the PUF and combining with the smart card, the reliability and the security verification of the terminal of the Internet of things are realized, a terminal adding and removing mechanism is designed, when a certain node in a group of the terminal of the Internet of things is added into or leaves the group, the SDN controller can reconstruct a congruence equation set through the China remainder theorem to generate a new group identity mark, and the updating of the secret key is realized with minimum cost without re-authenticating each member in the group.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objects and other advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out in the specification.
Drawings
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in the following preferred detail with reference to the accompanying drawings, in which:
FIG. 1 is a diagram of a network architecture according to an embodiment of the present invention;
FIG. 2 is a detailed protocol registration process diagram according to an embodiment of the present invention;
fig. 3 is a detailed protocol authentication process diagram according to an embodiment of the present invention.
Detailed Description
Other advantages and effects of the present invention will become apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present invention with reference to specific examples. The invention may be practiced or carried out in other embodiments that depart from the specific details, and the details of the present description may be modified or varied from the spirit and scope of the present invention. It should be noted that the illustrations provided in the following embodiments merely illustrate the basic idea of the present invention by way of illustration, and the following embodiments and features in the embodiments may be combined with each other without conflict.
In which the drawings are for illustrative purposes only and are not intended to be construed as limiting the invention, and in which certain elements of the drawings may be omitted, enlarged or reduced in order to better illustrate embodiments of the invention, and not to represent actual product dimensions, it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
In the description of the present invention, it should be understood that, if there are terms such as "upper", "lower", "left", "right", "front", "rear", etc., the directions or positional relationships indicated are based on the directions or positional relationships shown in the drawings, only for convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred devices or elements must have a specific direction, be constructed and operated in a specific direction, so that the terms describing the positional relationships in the drawings are merely for exemplary illustration and are not to be construed as limitations of the present invention, and that the specific meanings of the terms described above may be understood by those skilled in the art according to specific circumstances.
Referring to fig. 1 to 3, with the rapid development of the internet of things, the existing protocol for handling access authentication of a large number of terminals of the internet of things has many problems of insufficient security function, high system overhead, lack of refresh mechanism and the like. Aiming at the current state of the art, the invention provides a multi-factor internet of things terminal dynamic group access authentication method, which realizes batch lightweight authentication of the internet of things terminal on the premise of ensuring safety.
In order to implement the access authentication protocol in the present invention, a network architecture of internet of things terminal group authentication is designed, and refer to fig. 1. The method comprises the steps that a large number of internet of things terminals form a plurality of authentication groups, each group comprises a group leader, an internet of things gateway is responsible for information transmission, partial parameter calculation and authentication information verification, and an SDN controller is responsible for internet of things terminal registration, session key calculation and other responsibilities.
The invention relates to a multi-factor internet of things terminal dynamic group access authentication method, which comprises the following 7 stages:
(1) And in the system initialization stage, the Internet of Things Gateway (ITG) and the SDN Controller (SC) establish secure connection, and the data interaction between the ITG and the SDN controller is secure and credible. The SDN controller firstly initializes the system, generates a security private key deltasc, and selects a security single hash function H () {0,1}*→{0,1}n, n is the bit width of the hash function message digest output.
(2) In the registration stage of the terminals of the Internet of things, the terminals of the Internet of things perform unified registration according to group division, and an existing group of the terminals of the Internet of things is assumed, wherein k terminal members { N1,N2,...,Nk } are arranged in the group, each member is provided with a PUF by default, an excitation response pair (Ci,Ri) is initialized, and the registration process is completed under a secure channel. The terminal registration process of the Internet of things comprises the following steps:
(2a) Referring to fig. 2, each Ni selects one identity IDi for itself and calculates Ri=PUF(Ci),GPWi=H(IDi||Ri). Ni then sends < IDi,GPWi > to the SC over the secure channel.
(2B) Referring to fig. 2, after receiving the registration message sent by Ni, the SC calculates a pseudo-identity VIDi=H(IDi||δsc for Ni). SC selects one large prime number pi (i=1,..k) for Ni, and pi≠pj when i+.j, and satisfies that there are two different large prime numbers in the range of pi -1. Next, SC selects an exponential-operated primitive root, g, for the group, which is also the generator of group Z*pi. The SC sends < VIDi,pi, g > to Ni over the secure channel.
(2C) Referring to fig. 2, after receiving the SC reply message, Ni selects a private key xi∈Z*pi for itself and calculates yi≡gximodpi. Ni then issues < yi > to the SC over the secure channel.
(2D) Referring to fig. 2, after receiving yi from k Ni transmissions, the SC constructs a congruence equation set using the chinese remainder theorem,
Wherein GID is the group identity of the group, SC is Ni for calculationThen, the SC generates a table in which group information < GID, g >, and each member information < IDi,VIDi,yi,pi,GPWi > are recorded. The SC sends < Wi > to Ni over the secure channel.
(2E) With continued reference to FIG. 2, Ni, upon receipt of Wi, calculatesB2=H(VIDi||IDi||xi||Ri||Wi GID). Then store < B1,B2,VIDi,Wi > into the smart card SMCi. So far, the terminal group of the Internet of things completes the registration process.
(3) And in the login stage, when one Internet of things terminal group needs to be accessed to the 5G network, each member firstly executes a login step, decrypts and verifies the security parameters in the smart card. Ni reads the identity IDi and PUF input stimulus Ci from the local storage, reads the parameters stored at enrolment from the smart card < B1,B2,VIDi,Wi>.Ni calculates Ri=PUF(Ci),GPWi=H(IDi||Ri),And verifies whether B2 is equal to the calculation of H (VIDi||IDi||xi||Ri||Wi GID). If the parameters are equal, the parameters are legal, the terminal of the Internet of things is safe and reliable, and the next flow can be executed. Otherwise, the login will stop, re-reading the parameters and computing the verification.
(4) Referring to fig. 3, the process of negotiating the identity authentication and the session key of the terminal of the internet of things comprises the following steps:
(4a) Referring to fig. 3, a member is selected in a group according to the factors of computing power, signal quality, energy storage and the like to be the group leader of the group, and an authentication request is initiated by the group leader (NGL). NGL generates a time stamp T1 and calculates AUTHGL=H(GID||VIDGL||IDGL||T1). Subsequently, NGL sends an authentication message M1=<VIDGL,AUTHGL,T1 > to the ITG.
(4B) Referring to fig. 3, when message M1 is received, the ITG does nothing else but forwards the message to the SC.
(4C) Referring to fig. 3, after receiving the forwarding message of the ITG, the SC first verifies the validity of T1 to ensure the freshness of the message. Then, the SC performs a lookup table according to VIDGL to obtain the identity GID of the group and the true identity IDGL of NGL, and verifies whether AUTHGL is equal to the calculation result of H (gid||vidGL||IDGL||T1). If not, terminating the authentication flow and sending authentication failure information. Otherwise, the SC retrieves all members of the group according to GID and calculates Ki=H(VIDi||GID||GPWi). The SC generates a random number r, and then sends the message M2=<{VIDi,Ki, r, GID > encrypted to the ITG.
(4D) Referring to FIG. 3, the ITG decrypts the message M2 to obtain < { VIDi,Ki }, r, GID >. Subsequently, the ITG calculates for each member NiSKi=H(VIDi||GID||r||Ki),AUTHi-ITG=H(VIDi||GID||r||SKi||Ki||Di).ITG Message M3=<VIDi,Di,AUTHi-ITG > is sent to NGL.
(4E) Referring to fig. 3, NGL receives message M3 and broadcasts it in the group. Ni within the group calculates Ki=H(VIDi||GID||GPWi based on VIDi receiving the corresponding message < VIDi,Di,AUTHi-ITG>.Ni in combination with the parameters acquired at login),SKi=H(VIDi||GID||r||Ki), the group key SKG =h (r||gid), verifies whether AUTHi-ITG is equal to the calculation result of H (VIDi||GID||r||SKi||Ki||Di). If equal, Ni authenticates the SC successfully. Otherwise, authentication fails. Ni calculates AUTHi-N=H(VIDi||GID||Di||r||SKi||SKG||Ki), update the pseudo-identity VIDinew=H(r||VIDi||IDi). Subsequently, Ni sends a message M4=<VIDi,AUTHi-N > to NGL.
(4F) Referring to FIG. 3, upon receipt of each Ni sent message, NGL calculates
Subsequently, NGL sends a message M5=<VIDGL,AUTHt > to the ITG.
(4G) Referring to FIG. 3, upon receipt of message M5, the ITG calculates SKG=H(r||GID),AUTHi-N and verifies if AUTHt is compatible withIs equal to the calculated result of (a). If not, authentication fails and the message M5 is retrieved. Otherwise, the access authentication and the session key negotiation are successful. ITG sends authentication success message to SC, SC calculates SKi=H(VIDi||GID||r||Ki),SKG=H(r||GID),VIDinew=H(r||VIDi||IDi).
(5) And dynamically joining the terminal, namely if a new member is to be added into a certain terminal group, the group key SKG needs to be updated besides necessary authentication so as to ensure forward security and ensure that the new terminal cannot acquire the previous encrypted message. Since the new member is unaware of the current group key, broadcasting the new group key calculation parameters through current group key encryption typically has minimal cost after authenticating the new member is successful. The dynamic joining process of the terminal of the Internet of things comprises the following steps:
(5a) First, new member Nk+1 generates a time stamp T2 and calculates
AUTHk+1=H(GID'||VIDk+1||IDk+1||GPWk+1||T2). Subsequently, Nk+1 sends a message M1=>VIDk+1,AUTHk+1,T2 > to the group leader NGL of the group.
(5B) When NGL receives the message, a message M2=<VIDGL,M1 > is generated and sent to the ITG. The ITG forwards the message to the SC.
(5C) After receiving the message M2, the SC verifies the validity of the T2 a priori, and ensures the freshness of the message. The SC calculation verifies whether AUTHk+1 is equal to the calculation result of H (GID' |vidk+1||IDk+1||GPWk+1||T2). If not, authentication fails, otherwise, the SC authentication Nk+1 succeeds. The SC retrieves the relevant information for the group based on VIDGL in the message, and reconstructs the same as the system of equations in combination with the parameter < yk+1,pk+1 > at registration of Nk+1,
The SC generates a new random number rnew and calculates K'k+1=H(VIDk+1||GID'||GPWk+1),Kk+1=H(VIDk+1||GIDnew||GPWk+1). and then the SC sends the message M3=<{VIDk+1,K'k+1,Kk+1},rnew,GIDnew > encrypted to the ITG.
(5D) When ITG receives message M3, calculate
SKk+1=H(VIDk+1||GIDnew||rnew||Kk+1);
AUTH(k+1)-ITG=H(VIDk+1||GIDnew||rnew||SKk+1||K'k+1||Kk+1||D'k+1||Dk+1)
Subsequently, the ITG sends a message M4=<VIDk+1,D'k+1,Dk+1,AUTH(k+1)-ITG > to Nk+1. At the same time, the ITG sends < rnew,GIDnew > to the original members of the group via the original group key SKG.
(5E) Calculate K'k+1=H(VIDk+1||GID'||GPWk+1 when Nk+1 receives the message),SKk+1=H(VIDk+1||GIDnew||rnew||Kk+1),SKGnew=H(rnew||GIDnew), And verifies whether AUTH(k+1)-ITG is equal to the calculation of H(VIDk+1||GIDnew||rnew||SKk+1||K'k+1||Kk+1||D'k+1||Dk+1). If equal then Nk+1 succeeds in authenticating the SC, otherwise, failure occurs. Nk+1 calculation
AUTH(k+1)-N=H(VIDk+1||GIDnew||D'k+1||Dk+1||rnew||SKk+1||SKGnew||K'k+1||Kk+1), Update pseudo-identity VIDk+1new=H(r||VIDk+1||IDk+1). Subsequently, Nk+1 sends a message M5=<VIDk+1,AUTH(k+1)-N > to the ITG. At the same time, after receiving < rnew,GIDnew >, other members update < SKi,SKG,Wi >.
(5F) When the ITG receives the message, SKGnew=H(rnew||GIDnew is calculated) and verifies that AUTH(k+1)-N is equal to the result of H(VIDk+1||GIDnew||D'k+1||Dk+1||rnew||SKk+1||SKGnew||K'k+1||Kk+1). If the authentication information is equal, the ITG sends an authentication success message to the SC, and the SC updates the < SKi,SKG >. Otherwise, the verification fails, and the M5 needs to be acquired again.
(6) The dynamic removal terminal stage is that when a member in a group is found to have malicious behaviors, the member needs to be evicted from the group. And the group key SKG should be updated as soon as possible to ensure backward security, ensuring that no malicious members can obtain the encrypted message afterwards. Since the current group key is not already secure, the SDN controller needs to update the group identity GID and transmit new security parameters through the session key with each member. The dynamic removal process of the terminal of the Internet of things comprises the following steps:
(6a) First the SC retrieves malicious member Nk, obtaining all relevant record information for its group in the registered table. The SC revokes the legal identity of Nk, modifies its yk to other values y'k, reconstructs the set of congruence equations,
The SC generates a new random number rnew and sends message Mi=<rnew,GIDnew > encrypted over SKi to group members other than malicious member Nk.
(6B) After other members receive < rnew,GIDnew >, < SKi,SKG,Wi > is updated. The SC also recalculates < SKi,SKG > and synchronizes with the ITG through encryption.
(7) The timing update group identity and PUF challenge-response phase requires updating the CRP (Ci,Ri) with the group identity identification GID and PUF challenge-response after a certain period of time. Ni generates a new Cinew and calculates Rinew=PUF(Cinew),GPWinew=H(IDi||Rinew).Ni re-selects the private key xinew∈Z*pi for itself and calculatesNi sends the SC an encrypted message < GPWinew,yinew > over SKi. The SC receives the message and decrypts it, and then reconstructs the congruence equation set to obtain GIDnew. The SC generates a new random number rnew and broadcasts < rnew,GIDnew > to all members by encryption with the group key SKG. Ni decrypts the message and updates < SKi,SKG,Wi,B1,B2 > immediately after it receives the message. After the update, the new session key can be used to exchange data, and the SC and ITG can update the < SKi,SKG > synchronously after receiving the new message.
Finally, it is noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made thereto without departing from the spirit and scope of the present invention, which is intended to be covered by the claims of the present invention.

Claims (8)

Translated fromChinese
1.一种多因子物联网终端动态群组接入认证方法,其特征在于:包括以下步骤:1. A multi-factor Internet of Things terminal dynamic group access authentication method, characterized in that it includes the following steps:S1:系统初始化阶段:SDN控制器与物联网网关建立安全连接,SDN控制器进行系统初始化,生成一个安全私钥,并选择一个安全单项哈希函数;S1: System initialization phase: The SDN controller establishes a secure connection with the IoT gateway, the SDN controller initializes the system, generates a secure private key, and selects a secure one-way hash function;S2:物联网终端注册阶段:将物联网终端按群组进行划分,在安全信道下统一注册;S2: IoT terminal registration phase: IoT terminals are divided into groups and registered uniformly in a secure channel;S3:登录阶段:物联网终端通过PUF解密智能卡中的秘密参数,并对物联网终端的安全性、可靠性进行验证;S3: Login stage: The IoT terminal decrypts the secret parameters in the smart card through PUF and verifies the security and reliability of the IoT terminal;S4:身份认证与会话密钥协商阶段:在一个待认证的群组中,首先组长向SDN控制器发起接入认证请求;SDN控制器通过注册时的信息与认证请求中的参数,验证组长的身份后,生成一个随机数并为群组中每一位成员计算加密密钥,然后发送给物联网网关;物联网网关为每个终端成员计算会话密钥,并通过加密密钥保护随机数,然后向群组成员广播认证消息;群组成员根据登录时的参数与认证消息在本地计算加密密钥、会话密钥、组密钥,然后验证认证消息并更新伪身份,随后计算认证成功消息发送给组长;组长将各个成员的验证成功消息进行融合发送给物联网网关;物联网网关对融合消息验证成功后,向SDN控制器发送认证成功消息,随后SDN控制器同步计算会话密钥与组密钥;S4: Identity authentication and session key negotiation phase: In a group to be authenticated, the group leader first initiates an access authentication request to the SDN controller; the SDN controller verifies the identity of the group leader through the information at the time of registration and the parameters in the authentication request, generates a random number and calculates the encryption key for each member in the group, and then sends it to the IoT gateway; the IoT gateway calculates the session key for each terminal member, protects the random number with the encryption key, and then broadcasts the authentication message to the group members; the group members calculate the encryption key, session key, and group key locally according to the parameters at the time of login and the authentication message, then verify the authentication message and update the pseudo-identity, and then calculate the authentication success message and send it to the group leader; the group leader merges the authentication success messages of each member and sends them to the IoT gateway; after the IoT gateway successfully verifies the merged message, it sends the authentication success message to the SDN controller, and then the SDN controller synchronously calculates the session key and group key;S5:动态加入终端阶段:当要向某一终端群组中添加新成员时,更新组密钥以保证前向安全;S5: Dynamic terminal joining stage: When adding a new member to a terminal group, the group key is updated to ensure forward security;S6:动态移除终端阶段:当发现一个群组中的某个成员存在恶意行为时,将该成员逐出群组,并更新组密钥SKG以保证后向安全;S6: Dynamic terminal removal phase: When a member in a group is found to have malicious behavior, the member is expelled from the group and the group key SKG is updated to ensure backward security;S7:定时更新组身份与PUF激励响应对阶段:当一定时间段后,为防止跟踪攻击,对组身份标识和PUF激励响应对进行更新;各个物联网终端重新选择私钥与PUF输入激励,并计算相应注册参数发送给SDN控制器;SDN控制器根据新的参数,重新计算组身份标识与选择随机数,并通过原有会话密钥发送给各个物联网终端;随后各个终端与SDN控制器同步计算更新会话密钥与组密钥。S7: Periodic update of group identity and PUF stimulus response pair: After a certain period of time, in order to prevent tracking attacks, the group identity and PUF stimulus response pair are updated; each IoT terminal reselects the private key and PUF input stimulus, and calculates the corresponding registration parameters and sends them to the SDN controller; the SDN controller recalculates the group identity and selects the random number based on the new parameters, and sends them to each IoT terminal through the original session key; then each terminal and the SDN controller synchronously calculate and update the session key and group key.2.根据权利要求1所述的多因子物联网终端动态群组接入认证方法,其特征在于:所述步骤S1具体包括:SDN控制器与物联网网关建立安全连接,然后生成一个安全私钥δsc,并选择一个安全单项哈希函数H():{0,1}*→{0,1}n,n是哈希函数消息摘要输出的位宽。2. The multi-factor IoT terminal dynamic group access authentication method according to claim 1 is characterized in that: the step S1 specifically comprises: the SDN controller establishes a secure connection with the IoT gateway, then generates a secure private key δsc , and selects a secure one-way hash function H():{0,1}* →{0,1}n , where n is the bit width of the hash function message digest output.3.根据权利要求1所述的多因子物联网终端动态群组接入认证方法,其特征在于:3. The multi-factor Internet of Things terminal dynamic group access authentication method according to claim 1, characterized in that:所述步骤S2中,群组中的k个终端成员都默认配备一个物理不可克隆函数PUF,并初始化一个激励响应对CRP(Ci,Ri),物联网终端注册具体包括以下步骤:In step S2, each of the k terminal members in the group is equipped with a physical unclonable function PUF by default, and a stimulus response pair CRP (Ci, Ri) is initialized. The IoT terminal registration specifically includes the following steps:S21:物联网终端通过身份标识IDi与PUF输出计算注册参数GPWi,向SDN控制器发送<IDi,GPWi>注册信息;S21: The IoT terminal calculates the registration parameter GPWi through the identity IDi and the PUF output, and sends the registration information <IDi ,GPWi > to the SDN controller;Ri=PUF(Ci)Ri =PUF(Ci )GPWi=H(IDi||Ri)GPWi =H(IDi || Ri )其中,Ri表示物理不可克隆函数PUF的输出响应,Ci表示物理不可克隆函数的输入激励,GPWi表示注册参数,H表示哈希函数;Where Ri represents the output response of the physical unclonable function PUF, Ci represents the input stimulus of the physical unclonable function, GPWi represents the registration parameter, and H represents the hash function;S22:SDN控制器为物联网终端计算伪身份VIDi,选择大素数pi和指数运算的原根g,SDN控制器发送注册信息<VIDi,pi,g>到物联网终端;VIDi的计算公式如下:S22: The SDN controller calculates a pseudo identity VIDi for the IoT terminal, selects a large prime numberpi and a primitive root g of the exponential operation, and sends registration information <VIDi ,pi ,g> to the IoT terminal; the calculation formula of VIDi is as follows:VIDi=H(IDi||δsc)VIDi =H(IDi || δsc )δsc表示SDN控制器的安全私钥;δsc represents the security private key of the SDN controller;S22:物联网终端选择私钥xi,计算注册信息yi≡gximod pi,并向SDN发送注册信息<yi>;S22: The IoT terminal selects a private key xi , calculates the registration information yi ≡gxi modpi , and sends the registration information <yi > to the SDN;S24:SDN控制器根据注册信息构建同余方程组计算得到组身份标识GID,通过注册信息加密组身份标识计算得Wi,SDN控制器发送注册信息<Wi>到物联网终端;GID是同余方程的计算结果,公式如下:S24: The SDN controller constructs a group of congruence equations according to the registration information to calculate the group identity GID, encrypts the group identity through the registration information to calculateWi , and the SDN controller sends the registration information<Wi> to the IoT terminal; GID is the calculation result of the congruence equation, and the formula is as follows:S25:物联网终端为加密私钥和参数完整性验证计算B1和B2,并将<B1,B2,VIDi,Wi>存储到智能卡SMCi中,其中Wi用于保护GID的参数:S25: The IoT terminal calculates B1 and B2 for encryption private key and parameter integrity verification, and stores <B1 ,B2 ,VIDi ,Wi > in the smart card SMCi , whereWi is used to protect the parameters of GID:Wi=GID⊕GPWiWiGID⊕GPWiB1和B2用于保护物联网终端的私钥和完整性验证,其计算过程如下所示:B1 andB2 are used to protect the private key and integrity verification of the IoT terminal. The calculation process is as follows:B1=xi⊕H(VIDi||GPWi)B1 =xi ⊕H(VIDi ||GPWi )B2=H(VIDi||IDi||xi||Ri||Wi||GID)。B2 =H(VIDi ||IDi ||xi ||Ri ||Wi ||GID).4.根据权利要求1所述的多因子物联网终端动态群组接入认证方法,其特征在于:步骤S3具体包括:物联网终端读取身份标识IDi和PUF输入激励Ci,以及智能卡中的参数<B1,B2,VIDi,Wi>,计算GPWi,解密B1保护的私钥并对参数进行完整性验证。4. The multi-factor Internet of Things terminal dynamic group access authentication method according to claim 1 is characterized in that: step S3 specifically includes: the Internet of Things terminal reads the identity identifier IDi and the PUF input stimulus Ci , as well as the parameters <B1 , B2 , VIDi , Wi > in the smart card, calculates GPWi , decrypts the private key protected by B1 and verifies the integrity of the parameters.5.根据权利要求1所述的多因子物联网终端动态群组接入认证方法,其特征在于:所述步骤S4具体包括:5. The multi-factor Internet of Things terminal dynamic group access authentication method according to claim 1, characterized in that: the step S4 specifically comprises:S41:群组组长生成时间戳T1,计算认证请求验证参数AUTHGL=H(GID||VIDGL||IDGL||T1),并将认证请求消息<VIDGL,AUTHGL,T1>发送到物联网网关;S41: The group leader generates a timestamp T1 , calculates the authentication request verification parameter AUTHGL =H(GID||VIDGL ||IDGL ||T1 ), and sends an authentication request message <VIDGL ,AUTHGL ,T1 > to the IoT gateway;S42:物联网网关将认证请求消息转发给SDN控制器;S42: The IoT gateway forwards the authentication request message to the SDN controller;S43:SDN控制器验证消息新鲜性后验证AUTHGL,为每个终端成员计算加密密钥Ki=H(VIDi||GID||GPWi),选择随机数r,将消息<{VIDi,Ki},r,GID>发送到物联网终端;S43: The SDN controller verifies the freshness of the message and then verifies AUTHGL , calculates the encryption key Ki =H(VIDi||GID||GPWi ) for each terminal member, selects a random number r, and sends the message 〈{VIDi ,Ki },r,GID> to the IoT terminal;S44:物联网网关为保护随机数r计算Di,计算会话密钥SKi,以及完整性验证参数AUTHi-ITG,将消息<VIDi,Di,AUTHi-ITG>发送到群组组长,公式如下:S44: The IoT gateway calculatesDi to protect the random number r, calculates the session keySKi , and the integrity verification parameter AUTHi-ITG , and sends the message <VIDi ,Di , AUTHi-ITG > to the group leader. The formula is as follows:Di=r⊕H(VIDi||Ki)Di = r ⊕ H ( VIDi || Ki )SKi=H(VIDi||GID||r||Ki)SKi =H(VIDi ||GID||r||Ki )AUTHi-ITG=H(VIDi||GID||r||SKi||Ki||Di)AUTHi-ITG =H(VIDi ||GID||r||SKi ||Ki ||Di )S45:组长将消息在组内进行广播,终端成员计算加密密钥Ki,解密Di得到随机数r,计算会话密钥SKi,计算组密钥SKG,并进行完整性验证计算AUTHi-ITG,更新伪身份计算VIDinew,计算认证成功参数AUTHi-N,将消息<VIDi,AUTHi-N>发送给群组组长;公式如下:S45: The group leader broadcasts the message within the group. The terminal members calculate the encryption key Ki , decrypt Di to obtain the random number r, calculate the session key SKi , calculate the group key SKG , and perform integrity verification to calculate AUTHi-ITG , update the pseudo identity to calculate VIDinew , calculate the authentication success parameter AUTHiN , and send the message <VIDi ,AUTHiN > to the group leader. The formula is as follows:SKG=H(r||GID)SKG =H(r||GID)VIDinew=H(r||VIDi||IDi)VIDinew =H(r||VIDi ||IDi )AUTHi-N=H(VIDi||GID||Di||r||SKi||SKG||Ki)AUTHiN =H(VIDi ||GID||Di ||r||SKi ||SKG ||Ki )S46:群组组长将各个成员的消息进行融合计算得到融合认证参数AUTHt,将消息<VIDGL,AUTHt>发送到物联网网关;其中:S46: The group leader integrates the messages of each member to obtain the integrated authentication parameter AUTHt , and sends the message <VIDGL ,AUTHt > to the IoT gateway; wherein:AUTHt=AUTH1-N⊕AUTH2-N⊕...⊕AUTHk-NAUTHt =AUTH1-N ⊕AUTH2-N ⊕...⊕AUTHkNS47:物联网网关计算SKG,并验证AUTHt,向SDN控制器发送认证成功消息,SDN控制器同步计算<SKi,SKG,VIDinew>。S47: The IoT gateway calculates SKG , verifies AUTHt , and sends an authentication success message to the SDN controller. The SDN controller synchronously calculates <SKi , SKG , VIDinew >.6.根据权利要求1所述的多因子物联网终端动态群组接入认证方法,其特征在于:步骤S5具体包括以下步骤:6. The multi-factor Internet of Things terminal dynamic group access authentication method according to claim 1, characterized in that: step S5 specifically includes the following steps:S51:新成员Nk+1生成一个时间戳T2,并计算认证请求验证参数AUTHk+1,将消息<VIDk+1,AUTHk+1,T2>发送到该群组的组长,具体公式如下:S51: The new member Nk+1 generates a timestamp T2 , calculates the authentication request verification parameter AUTHk+1 , and sends a message <VIDk+1 ,AUTHk+1 ,T2 > to the leader of the group. The specific formula is as follows:AUTHk+1=H(GID’||VIDk+1||IDk+1||GPWk+1||T2)AUTHk+1 =H(GID'||VIDk+1 ||IDk+1 ||GPWk+1 ||T2 )S52:群组组长向消息中添加组身份标识,将消息<VIDGL,VIDk+1,AUTHk+1,T2>发送到SDN控制器;S52: The group leader adds the group identity to the message, and sends the message <VIDGL , VIDk+1 , AUTHk+1 , T2 > to the SDN controller;S53:SDN控制器验证消息的新鲜性,验证计算AUTHk+1,重新构建同余方程组计算新的组身份标识GIDnew,选择新的随机数rnew,计算加密密钥K’k+1和Kk+1,将消息<{VIDk+1,K’k+1,Kk+1},rnew,GIDnew>发送给物联网网关;计算公式如下:S53: The SDN controller verifies the freshness of the message, verifies and calculates AUTHk+1 , reconstructs the congruence equation group to calculate the new group identity GIDnew , selects a new random number rnew , calculates the encryption keys K'k+1 and Kk+1 , and sends the message <{VIDk+1 , K'k+1 , Kk+1 }, rnew , GIDnew > to the IoT gateway; the calculation formula is as follows:K’k+1=H(VIDk+1||GID’||GPWk+1)K'k+1 =H(VIDk+1 ||GID'||GPWk+1 )Kk+1=H(VIDk+1||GIDnew||GPWk+1)Kk+1 =H(VIDk+1 ||GIDnew ||GPWk+1 )S54:物联网网关为加密新的组身份标识和随机数计算D’k+1和Dk+1,计算会话密钥SKk+1和完整性验证参数AUTH(k+1)-ITG,将消息<VIDk+1,D’k+1,Dk+1,AUTH(k+1)-ITG>发送到新成员,并将<rnew,GIDnew>通过原有组密钥广播给原有组成员;计算公式如下:S54: The IoT gateway calculates D'k+1 and Dk+1 to encrypt the new group identity and random number, calculates the session key SKk+1 and the integrity verification parameter AUTH(k+1)-ITG , sends the message <VIDk+1 ,D'k+1 ,Dk+1 ,AUTH(k+1)-ITG > to the new member, and broadcasts <rnew ,GIDnew > to the original group members using the original group key; the calculation formula is as follows:D’k+1=GIDnew⊕H(VIDk+1||K’k+1)D'k+1 =GIDnew ⊕H(VIDk+1 ||K'k+1 )Dk+1=rnew⊕H(VIDk+1||Kk+1)Dk+1 =rnew ⊕H(VIDk+1 ||Kk+1 )SKk+1=H(VIDk+1||GIDnew||rnew||Kk+1)SKk+1 =H(VIDk+1 ||GIDnew ||rnew ||Kk+1 )AUTH(k+1)-ITG=H(VIDk+1||GIDnew||rnew||SKk+1||K’k+1||Kk+1||D’k+1||Dk+1)AUTH(k+1)-ITG =H(VIDk+1 ||GIDnew ||rnew ||SKk+1 ||K'k+1 ||Kk+1 ||D'k+1 ||Dk+1 )S55:新成员计算加密密钥K’k+1和Kk+1解密D’k+1和Dk+1得到新的组身份标识和随机数,计算会话密钥SKk+1和组密钥SKGnew,计算验证AUTH(k+1)-ITG,更新伪身份VIDk+1new,计算认证成功参数AUTH(k+1)-N,将消息<VIDk+1,AUTH(k+1)-N>发送到物联网网关;于此同时,其它成员收到<rnew,GIDnew>后,也将<SKi,SKG,Wi>进行更新;计算公式如下:S55: The new member calculates the encryption keys K'k+1 and Kk+1 , decrypts D'k+1 and Dk+1 to obtain a new group identity and random number, calculates the session key SKk+1 and the group keySKGnew, calculates the verification AUTH(k+1)-ITG , updates the pseudo identity VIDk+1new, calculates the authentication success parameter AUTH(k+1)-N , and sends the message <VIDk+1 , AUTH(k+1)-N > to the IoT gateway; at the same time, after receiving <rnew ,GIDnew >, other members also update <SKi ,SKG , Wi >; the calculation formula is as follows:VIDk+1new=H(r||VIDk+1||IDk+1)VIDk+1new =H(r||VIDk+1 ||IDk+1 )AUTH(k+1)-N=H(VIDk+1||GIDnew||D’k+1||Dk+1||rnew||SKk+1||SKGnew||K’k+1||Kk+1)AUTH(k+1)-N =H(VIDk+1 ||GIDnew ||D'k+1 ||Dk+1 ||rnew ||SKk+1 ||SKGnew ||K'k+1 ||Kk+1 )S56:物联网网关计算SKGnew并验证计算AUTH(k+1)-N,向SDN控制器发送认证成功消息;SDN控制器同步对<SKi,SKG>进行更新。S56: The IoT gateway calculates SKGnew and verifies AUTH(k+1)-N , and sends an authentication success message to the SDN controller; the SDN controller synchronously updates <SKi ,SKG >.7.根据权利要求1所述的多因子物联网终端动态群组接入认证方法,其特征在于:步骤S6具体包括以下步骤:7. The multi-factor Internet of Things terminal dynamic group access authentication method according to claim 1, characterized in that: step S6 specifically includes the following steps:S61:首先SDN控制器检索恶意成员Nk,并撤销Nk的合法身份,将其yk修改成其它值y’k,并重新构建同余方程组计算得GIDnewS61: First, the SDN controller retrieves the malicious member Nk and revokes the legal identity of Nk , modifies its yk to another value y'k , and reconstructs the congruence equation group to calculate GIDnew :SDN生成新的随机数rnew,并将消息<rnew,GIDnew>通过SKi加密发送给除去恶意成员Nk之外的群组成员;SDN generates a new random number rnew , and encrypts the message <rnew , GIDnew > through SKi and sends it to group members except the malicious member Nk ;S62:其它成员将<SKi,SKG,Wi>进行更新,SC也重新计算<SKi,SKG>并通过加密与ITG同步。S62: Other members update <SKi , SKG , Wi >, and the SC also recalculates <SKi , SKG > and synchronizes it with the ITG through encryption.8.根据权利要求1所述的多因子物联网终端动态群组接入认证方法,其特征在于:步骤S7包括:物联网终端生成新的PUF输入激励Cinew,计算Rinew,GPWinew,选择新的私钥xinew计算yinew,将消息<GPWinew,yinew>发送到SDN控制器;SDN控制器重新构建同余方程组得到GIDnew,生成新的随机数rnew,并将消息<rnew,GIDnew>广播给所有群组成员;群组成员、SDN控制器和物联网网关,更新<SKi,SKG,Wi,B1,B2>参数。8. The multi-factorInternet of Things terminal dynamic group access authentication method according to claim 1 is characterized in that: stepS7 comprises:the Internet of Things terminal generates anew PUF input stimulusCinew , calculatesRinew,GPWinew , selects anew private keyxinewto calculateyinew , and sends a message <GPWinew ,yinew > to the SDN controller; the SDN controller reconstructs the congruence equation group to obtainGIDnew , generates a new random numberrnew , and broadcasts the message <rnew ,GIDnew > to all group members; the group members, the SDN controller and the Internet of Things gateway update the <SKi ,SKG ,Wi ,B1 ,B2 > parameters.
CN202310311718.1A2023-03-282023-03-28 A multi-factor Internet of Things terminal dynamic group access authentication methodActiveCN116318678B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202310311718.1ACN116318678B (en)2023-03-282023-03-28 A multi-factor Internet of Things terminal dynamic group access authentication method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202310311718.1ACN116318678B (en)2023-03-282023-03-28 A multi-factor Internet of Things terminal dynamic group access authentication method

Publications (2)

Publication NumberPublication Date
CN116318678A CN116318678A (en)2023-06-23
CN116318678Btrue CN116318678B (en)2025-04-29

Family

ID=86788547

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202310311718.1AActiveCN116318678B (en)2023-03-282023-03-28 A multi-factor Internet of Things terminal dynamic group access authentication method

Country Status (1)

CountryLink
CN (1)CN116318678B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116709316B (en)*2023-07-062024-01-26云南大学Stateless group key updating method for large-scale dynamic group based on smart card
CN117097489B (en)*2023-10-202024-01-30华东交通大学 A lightweight two-factor continuous authentication method and system for agricultural Internet of Things equipment
CN117896064B (en)*2024-03-142024-05-31中国人民解放军火箭军工程大学 A low computational overhead superlattice twin PUF key synchronization method and system
CN119325088B (en)*2024-10-162025-09-12西安电子科技大学 UAV-assisted multi-cluster concurrent access and switching authentication method for IoT devices
CN119233252B (en)*2024-11-292025-03-11西安电子科技大学 Ultra-high-speed terminal secure access and intra-group secure communication method in satellite network scenario
CN120223435B (en)*2025-05-232025-09-02三未信安科技股份有限公司Lightweight identity authentication and secret communication method based on Internet of things security

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105897518A (en)*2016-06-302016-08-24电子科技大学Method for measuring link performance parameters of full SDN network
US10742421B1 (en)*2019-03-082020-08-11Ares Technologies, Inc.Methods and systems for anonymous hardware attestation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105897518A (en)*2016-06-302016-08-24电子科技大学Method for measuring link performance parameters of full SDN network
US10742421B1 (en)*2019-03-082020-08-11Ares Technologies, Inc.Methods and systems for anonymous hardware attestation

Also Published As

Publication numberPublication date
CN116318678A (en)2023-06-23

Similar Documents

PublicationPublication DateTitle
CN116318678B (en) A multi-factor Internet of Things terminal dynamic group access authentication method
Zhang et al.Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT
CN110971415B (en) An anonymous access authentication method and system for a space-earth integrated spatial information network
Li et al.Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks
KR101350538B1 (en)Enhanced security for direct link communications
CN111052672B (en)Secure key transfer protocol without certificate or pre-shared symmetric key
WO2017185999A1 (en)Method, apparatus and system for encryption key distribution and authentication
CN101119196A (en) A two-way authentication method and system
JP2011139457A (en)System and method for secure transaction of data between wireless communication device and server
US20200195446A1 (en)System and method for ensuring forward &amp; backward secrecy using physically unclonable functions
Rabiah et al.A lightweight authentication and key exchange protocol for IoT
Fan et al.Complete EAP method: User efficient and forward secure authentication protocol for IEEE 802.11 wireless LANs
De Smet et al.Lightweight PUF based authentication scheme for fog architecture
CN105075175A (en) Method and device for establishing session key
Flood et al.Peer to peer authentication for small embedded systems: A zero-knowledge-based approach to security for the Internet of Things
Anggorojati et al.Securing communication in inter domains Internet of Things using identity-based cryptography
Maccari et al.Security analysis of IEEE 802.16
US20070055870A1 (en)Process for secure communication over a wireless network, related network and computer program product
Rossi Figlarz et al.Enhancing the 5G-aka protocol with post-quantum digital signature method
CN116233843B (en)B5G/6G network slice authentication method for industrial Internet
Sarbini et al.A lightweight multifactor authentication scheme for wireless sensor networks in the Internet of Things
Elhabrush et al.Authentication protocol for wireless sensor network in the internet of things
KR20080056055A (en) Roaming authentication method and key setting method between communication providers and recording medium storing program including the method
Wu et al.GROSS: One-time Secret Sharing Can Make Group-based Authentication More Efficient
Kwon et al.One-round protocol for two-party verifier-based password-authenticated key exchange

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp