4.6 Article

Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios

期刊

ELECTRONICS
卷 12, 期 8, 页码 -

出版社

MDPI
DOI: 10.3390/electronics12081812

关键词

Internet of Things (IoT); blockchain; privacy protection; cloud computing; Internet of Vehicles (IoV); encryption; cryptography; security authentication

向作者/读者索取更多资源

This paper mainly summarizes three aspects of information security: IoT authentication technology, IoV trust management, and IoV privacy protection. It proposes an innovative user and device authentication model for industrial IoT, introduces a trust management model for mobile IoT applications, and proposes a cross-domain anonymous authentication system model based on blockchain for IoV privacy protection. The paper also discusses future research directions and potential improvements for each aspect.
This paper mainly summarizes three aspects of information security: Internet of Things (IoT) authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy protection. Firstly, in an industrial IoT environment, when a user wants to securely access data from IoT sensors in real-time, they may face network attacks due to the data being transmitted through an open channel. In order to solve this problem, we innovatively propose a user and device authentication model integrated with cloud computing, introduce an algorithm related to protocol design, and summarize the research direction of developing a more lightweight algorithm when designing security protocols in the future. Secondly, for mobile IoT applications, such as IoV, information collection and distribution is realized by establishing a network between vehicles and infrastructure. IoV will face security threats such as information insecurity and privacy disclosure. We introduce a typical trust management model for the IoV, which solves the problem of information unreliability by storing vehicle trust values. In the future, we are committed to making the process of computing node credibility using a trust model more robust. Finally, aiming at the privacy protection of the IoV, we propose a cross-domain anonymous authentication system model based on blockchain. The user's auxiliary authentication information is stored in the blockchain, and the auxiliary authentication information of any registered user can be obtained from the blockchain. The privacy protection of cross-domain authentication can be realized through anonymous authentication, which greatly saves the communication cost of cross-domain authentication. In the future, we will try to use deep learning or federated learning to integrate with blockchain for actual deployment.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据