| With the rapid development of the Internet of Things technology,the privacy and security of sensitive data become more and more noticeable.As a system connecting various intelligent devices,wireless sensors,etc.,the Internet of Things transmits and shares data.At present,the Internet of Things has been applied in various environments,such as medical Internet,intelligent wearable devices,etc.In the complex Internet of Things system,there is a special resource-asymmetric environment,such as smart agriculture,smart home and other scenarios.The resource-asymmetric environment refers to the scenario where the resources of different devices are unevenly distributed.It is generally manifested as the abundant resource at the gateway node,and the limited resource shortage at the user node and the intelligent device node.In recent years,many experts and scholars have designed authentication and key establishment schemes for security purposes,but most scholars have ignored the characteristics of rich resources of gateway node and limited resources at the device node.The resource-constrained entity does not use enough lightweight computing.Such schemes also do not fully utilize the resources of gateway node.At the same time,user anonymity should be considered in the authentication process.Therefore,the existing schemes are not suitable for authentication and key establishment in the resource-asymmetric smart environment.It is necessary to design a secure and practical authentication and key establishment scheme for such smart scenarios based on the resource-asymmetry.The calculation cost and resource consumption of Rabin algorithm are very different between encryption phase and decryption phase.This is a cryptographic algorithm that encryption and decryption are not completely equal in resource utilization.Therefore,it is very suitable for constructing authentication and key establishment schemes under resource-asymmetric environment.Putting complex and resource-consuming operations on resource-rich gateway node for computing can greatly reduce the pressure on users and devices,thus achieving real lightweight computing.The authentication and key establishment scheme based on Rabin algorithm in this paper can not only give full play to the advantages of rich gateway resources,but also realize the lightweight operation of user and intelligent device,and ensure the anonymity of users.The main work of this paper is summarized as follows:(1)In this paper,we propose a lightweight and anonymous authentication and key establishment scheme based on Rabin encryption algorithm,which is suitable for asymmetric-resource environment.This scheme can not only provide user anonymity,but also realize real lightweight operation on the user side and intelligent device side,so as to give full play to the advantages of rich resources of the gateway node.(2)The prominent feature of the proposed scheme in this paper is to combine the asymmetric encryption and decryption features of Rabin algorithm with the features of the resources-asymmetry.In the resource-asymmetric environment,the resource allocation of different entities is different,and Rabin algorithm has huge differences in the consumption of resources between encryption and decryption.This innovative application can not only relieve the pressure on the user side and the intelligent device side,but also realize the real lightweight operation on the user side and the device side under the same security.(3)The formal security analysis method BAN logic and security protocol analysis tool Proverif are used to analyze the proposed scheme.The analysis results show that this scheme can provide user anonymity and can resist internal and external attacks.Compared with the similar schemes proposed recently,the results show that the scheme proposed in this paper is more attractive.To sum up,the scheme proposed in this paper has unique advantages in the resourceasymmetric environment of the Internet of Things system and is very attractive. |