Abstract

With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices is transmitted in the system under the actual wireless network environment will cause a series of security issues and will become inefficient in the scenario where a large number of devices are concurrently accessed. If each device is individually authenticated, the authentication overhead is huge, and the network burden is excessive. Aiming at these problems, we propose a protocol that is efficient authentication for Internet of Things devices in information management systems. In the proposed scheme, aggregated certificateless signcryption is used to complete mutual authentication and encrypted transmission of data, and a cloud server is introduced to ensure service continuity and stability. This scheme is suitable for scenarios where large‐scale IoT terminal devices are simultaneously connected to the information management system. It not only reduces the authentication overhead but also ensures the user privacy and data integrity. Through the experimental results and security analysis, it is indicated that the proposed scheme is suitable for information management systems.

Highlights

  • With the advancement of various wireless mobile network technologies, the field of Internet of Things (IoT) has developed rapidly

  • AMF is used as the authentication server, the security server is assumed by Key Generation Center (KGC), a Cloud Sever (CS) is introduced to complete the work related to the file server, and there are multiple groups (i:e:groupi, i = 1, 2, 3, ⋯, n) of IoT devices that make up the information management systems (IMS) client

  • In order to perform authentication and data transmission safely and efficiently in IMS, we propose an efficient and secure authentication for IoT device in information management systems

Read more

Summary

Introduction

With the advancement of various wireless mobile network technologies, the field of Internet of Things (IoT) has developed rapidly. In an IMS, users, IoT devices, computers, and servers make up the various parts of the system These components are used to complete information processing operations such as access, collection, storage, and transmission of information. Users’ operations such as accessing data information in the IMS are usually performed by connecting smart terminal devices to the network, such as mobile phones, computers, and other IoT devices. The 5G security mechanism should ensure the security of massive access devices and ensure that the information of users will not be leaked when they interact with the network in the scenario of IoT device access The function of these IoT terminals is generally to collect sensitive data and usually to transmit it. On the premise of ensuring communication performance, considering the massive access terminals of 5G network and the diversification of security threats, different security access authentication schemes should be adopted

Related Work
Model and Security Requirements
The Proposed Authentication Scheme
Security Analysis
Performance Analysis
Conclusions and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.