A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things
Trusted access to the Internet of Things sensing layer node is the precondition for the trusted operation of the Internet of Things. How to quickly and accurately implement identity authentication of a sensing node is currently a research hotspot. After comprehensive consideration of the security requirements and functional requirements of the sensing Node Identity Authentication, this paper proposes a fast identity authentication scheme for sensing nodes. In the identification process of sensing nodes, the data aggregation node is responsible for the selection of system parameters and the registration of sensing nodes. It does not directly participate in the authentication process and simplifies the authentication process. The computational efficiency is high, and the security analysis shows that the scheme has forward security and can resist malicious attacks such as replay attacks, key information disclosure attacks, and forgery attacks. Also, the solution supports key updates. Computational complexity analysis shows that this protocol uses only a small amount of computational complexity in exchange for higher security and more features.
KeywordsInternet of Things Trusted access The sensing layer Authentication
This work was supported by the National Natural Science Foundation of China The key trusted running technologies for the sensing nodes in Internet of things: 61501007, The research of the trusted and security environment for high energy physics scientific computing system: 11675199. General Project of science and technology project of Beijing Municipal Education Commission: KM201610005023.
- 8.Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., Wehrle, K.: Towards viable certificate-based authentication for the Internet of Things. In: Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, HotWiSec 2013, pp. 37–42 (2013)Google Scholar
- 9.Crescenzo, G., Zhang, T., Pietrowicz, S.: Anonymity notions for public-key infrastructures in mobile vehicular networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–6 (2007)Google Scholar
- 11.Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129–141. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73275-4_10CrossRefGoogle Scholar
- 12.Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of anonymity in VANETs-putting pseudonymity into practice. In: IEEE Wireless Communications and Networking Conference, pp. 3400–3405 (2007)Google Scholar
- 14.Juels, A., Rivest, R.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 103–111 (2003)Google Scholar
- 15.Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in Internet of Things. In: Wireless VITAE 2013, pp. 1–5 (2013)Google Scholar
- 21.Liang, T., Chen, J.: Remote attestation project of the running environment of the trusted terminal. J. Softw. 25(6), 1273–1290 (2014)Google Scholar