The Protectable Privacy Preserving Authentication for IoT Devices Access

2020 
With the development of Internet of Things technology, the popularization of mobile smart terminals and the improvement of smart city construction, it has laid the foundation for the development of the economy. To provide protectable privacy preserving authentication mechanism for IoT devices accessing, an anonymous authentication mechanism based on the proxy signature and knowledge signature technology is proposed for the protection of user’s identity. In this mechanism, firstly, the IoT facility authenticates the identity of the middle agent through the proxy signature and then verifies whether the user is authorized by the middle agent through the knowledge signature submitted by the user. And the user doesn’t need to offer his identity information. The Canetti-Krawczyk model is used to prove the authentication security of the mechanism. The result of analysis shows that the mechanism could resist replay attacks and camouflage attacks.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    5
    References
    0
    Citations
    NaN
    KQI
    []