Abstract

With the rapid development of internet of things (IoT), the credible identity authentications among the connected devices are widely investigated by researchers and institutes. Traditional identity authentication protocols issues exist in terms of security, complexity and authentication efficiency. To address these problems, this work introduces chaotic mapping technique into identity authentication. Besides, anonymity and interactivity are also considered to realise a high-efficient and secure IoT device authentication. Firstly, Kent chaotic mapping technique is used to generate the chaotic sequence as the authentication key, after that, the interactive authentication is established among the server, reader and tag. The authentication information is encrypted in the transmitted channel. The identity information is anonymous in the proposed protocol. Finally, the security, complexity and efficiency are analysed and discussed. The comparison results show that the proposed protocol is superior to other protocols.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.