Abstract

With the rapid development of internet of things (IoT), the credible identity authentications among the connected devices are widely investigated by researchers and institutes. Traditional identity authentication protocols issues exist in terms of security, complexity and authentication efficiency. To address these problems, this work introduces chaotic mapping technique into identity authentication. Besides, anonymity and interactivity are also considered to realise a high-efficient and secure IoT device authentication. Firstly, Kent chaotic mapping technique is used to generate the chaotic sequence as the authentication key, after that, the interactive authentication is established among the server, reader and tag. The authentication information is encrypted in the transmitted channel. The identity information is anonymous in the proposed protocol. Finally, the security, complexity and efficiency are analysed and discussed. The comparison results show that the proposed protocol is superior to other protocols.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call