Abstract

AbstractWith the continuous integration and application of the Internet of Things and cloud computing, more and more devices need to connect to the Internet of Things cloud platform for remote access and control. At the same time, the access of illegal devices and abuse of access rights have brought many data security problems. IoT devices have application characteristics such as low power consumption, low cost, small storage, and heterogeneity, which are different from the structure of terminal devices in computer networks. Therefore, applying traditional identity authentication technology to IoT devices will no longer be applicable. This paper adopts the digital identity certificate and public key encryption technical scheme based on cryptographic technology to construct a credible security architecture for identity authentication of Internet of Things devices. Design the initial identity registration and activation process and technical route of IoT devices centered on the trusted identity registration agency, and then propose the network access verification process and security management of IoT devices based on the challenge-response mechanism. This solution uses cryptographic technology to ensure the confidentiality and non-repudiation of information during the identity verification process, which can better meet the actual needs of Internet of Things devices to access the network, and ensure secure device authentication connections, authorized access and identity management.KeywordsDigital identity certificatePublic key encryptionInternet of Things equipmentIdentity authenticationSecurity model

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call