Font Size: a A A

Research On Identity Authentication Scheme For The Internet Of Things

Posted on:2021-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y B HanFull Text:PDF
GTID:2518306494496434Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The Internet of Things(IoT)is a collection of heterogeneous devices such as sensors and actuators.They form a huge network that enables the hardware components in the network to form a better and more convenient world,such as smart homes,smart cities,smart transportation,and Intelligent industry.On the other hand,security and privacy are the most important aspects of the Internet of Things,including authentication,authorization,data protection,network security,and access control.In addition,traditional network security solutions cannot be directly used in the Internet of Things due to their computing power and storage capacity limitations.With the development of cloud computing and communication technology,users can access IoT services provided in various environments,including smart homes,smart factories,and smart medical care.However,because sensitive information is usually transmitted through public channels,users' communications on public channels are subject to serious security threats.In addition,identity authentication technology is the main component of the network.Before establishing communication,identity authentication is an important part of all components.Therefore,it is very important to ensure the security of identity authentication on public channels in the Internet of Things environment.This article mainly studies the identity authentication scheme of the Internet of Things.Rajaram et al.proposed an enhanced user authentication scheme based on bilinear mapping.Through analysis and research,we have found that the solution cannot resist the smart card loss attack.In order to overcome the security flaws of Rajaram et al.'s scheme,this paper proposes an improved scheme.The scheme in this paper improves the registration phase,overcomes the shortcomings of the original scheme that cannot resist smart card loss attacks,and optimizes the algorithm in the identity authentication phase to make it more secure and effective.Yu et al.proposed a lightweight IoT authentication scheme in a cloud computing environment.Yu et al.claimed that their scheme can resist various attacks.However,through research and analysis,we have proposed two attacks.One is an attack by a malicious user posing as a legitimate cloud server,and the other is an attack by a malicious cloud server.Then we proposed an improvement plan.The improvement plan we proposed can overcome the above two attacks and improve the security and efficiency of the plan.And we carried out logical analysis and simulation analysis on the improvement plan,which further proved the safety of the improvement plan.Finally,we compared the performance and safety of this scheme with the existing scheme.
Keywords/Search Tags:Cryptography, Authentication, Information Security, Internet of Things
PDF Full Text Request
Related items