Abstract
With the increasing and diversified Internet of Things (IoT) devices, more IoT heterogeneous wireless networks have emerged, providing more network services for IoT devices, especially mobile phones and other roaming devices. However, there are also some malicious users who use different means to attack the security of the network, so that more users begin to pay attention to the identity authentication and privacy protection of the Internet of Things. This paper designs an IoT node roaming authentication model, which is used to enhance the security authentication capability of the Internet of Things to roaming devices. In order to effectively prevent malicious nodes from connecting to the network, this paper proposes a roaming authentication protocol based on heterogeneous fusion mechanism (HFM-IoT). The authentication protocol uses the remote authentication server in the local and remote areas to perform interactive authentication on the roaming device, which increases the difficulty of attacking or infecting multiple network areas by malicious nodes. According to the security analysis, the protocol can protect against multiple network attacks, and it can be seen from the experimental simulation results that the protocol has lower energy burden and authentication delay.
Highlights
Internet of Things (IoT) mobile nodes with the development of mobile communication technologies and embedded technologies, IoT devices such as handheld mobile communication devices and wireless in-vehicle devices are widely used
Safkhani et al proposes an Internet of Things ultra-light authentication protocol, which protects against the privacy protection of IoT devices during communication and prevents passive privacy breach attacks [16]
DESIGN OF IOT NODE ROAMING AUTHENTICATION MODEL The security strategy of the IoT node roaming authentication model designed in this paper is: when the roaming node moves to a certain area, if the node needs to access the network service, the remote authentication server detects the identity legality of the roaming node, and the detected roaming node can access the network service in the area
Summary
IoT mobile nodes with the development of mobile communication technologies and embedded technologies, IoT devices such as handheld mobile communication devices and wireless in-vehicle devices are widely used. In the IoT environment, mobile devices can roam between different networks. The design of roaming authentication protocols in the IoT network environment is faced with higher security requirements [9], [10]. In today’s IoT communication system, due to the popularity of mobile communication devices, more wireless roaming requirements are proposed for the Internet of Things. In order to ensure the security of the Internet of Things while satisfying the wireless roaming requirements of legitimate mobile communication devices, it is necessary to use an authentication protocol in the Internet of Things to verify the identity information of the device requesting communication. Safkhani et al proposes an Internet of Things ultra-light authentication protocol, which protects against the privacy protection of IoT devices during communication and prevents passive privacy breach attacks [16]. The experimental simulation is introduced, and the experimental results are compared with other protocols
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have