Research on Security Authentication Mechanism for IoT Devices: A Digital Identity Authentication-Based Solution
DOI:
https://doi.org/10.62051/ijcsit.v5n2.06Keywords:
Lightweight Authentication Protocol, ECC Key Agreement, Device Behavior Trust Evaluation, Distributed Key ManagementAbstract
This paper proposes a lightweight authentication scheme for IoT devices based on an improved ECC algorithm. By optimizing the key agreement process and introducing a temporary session key generation mechanism, the scheme significantly reduces authentication overhead and resource consumption for terminal devices. A weighted trust evaluation model based on device behavior characteristics is designed to enhance anomaly detection capabilities. A distributed key management architecture is adopted to address key management challenges in large-scale device authentication scenarios. The proposed scheme has been validated in the large-scale deployment of smart meter terminals, demonstrating its ability to ensure security while maintaining lightweight characteristics and scalability.
Downloads
References
[1] Wang L, Cheng Y, Gong H, et al. Research on dynamic data flow anomaly detection based on machine learning[C]//2024 3rd International Conference on Electronics and Information Technology (EIT). IEEE, 2024: 953-956.
[2] Ma, K. (2024). Employee Satisfaction and Firm Performance: Evidence from a Company Review Website. International Journal of Global Economics and Management, 4(2), 407-416.
[3] Ma, K. (2024). Relationship Between Return to Experience and Initial Wage Level in United States. Frontiers in Business, Economics and Management, 16(2), 282-286.
[4] Siddiqui Z, Gao J, Khan M K. An improved lightweight PUF–PKI digital certificate authentication scheme for the Internet of Things[J]. IEEE Internet of Things Journal, 2022, 9(20): 19744-19756.
[5] Badhib A, Alshehri S, Cherif A. A robust device-to-device continuous authentication protocol for the internet of things[J]. IEEE Access, 2021, 9: 124768-124792.
[6] Alzahrani B A, Mahmood K. Provable privacy preserving authentication solution for internet of things environment[J]. IEEE Access, 2021, 9: 82857-82865.
[7] Klimushyn P, Solianyk T, Mozhaev O, et al. Hardware support procedures for asymmetric authentication of the internet of things[J]. Innovative Technologies and Scientific Solutions for Industries, 2021 (4 (18)): 31-39.
[8] Azrour M, Mabrouki J, Guezzaz A, et al. New enhanced authentication protocol for internet of things[J]. Big Data Mining and Analytics, 2021, 4(1): 1-9.
[9] Ahvanooey M T, Zhu M X, Li Q, et al. Modern authentication schemes in smartphones and IoT devices: An empirical survey[J]. IEEE Internet of Things Journal, 2021, 9(10): 7639-7663.
[10] Al-Naji F H, Zagrouba R. CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things[J]. Journal of King Saud University-Computer and Information Sciences, 2022, 34(6): 2497-2514.
[11] Li R, Wu J, Li Y, et al. Periodnet: Noise-robust fault diagnosis method under varying speed conditions[J]. IEEE Transactions on Neural Networks and Learning Systems, 2023.
[12] Cheng Y, Wei Y, Liao H. Optimal sampling-based sequential inspection and maintenance plans for a heterogeneous product with competing failure modes[J]. Reliability Engineering & System Safety, 2022, 218: 108181.
[13] Tian Z, Zhao D, Lin Z, Flynn D, Zhao W, Tian D. Balanced reward-inspired reinforcement learning for autonomous vehicle racing[C]//Proceedings of the 6th Annual Learning for Dynamics & Control Conference. PMLR, 2024, 242: 628-640.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Computer Science and Information Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







