Abstract

IoT applications play an important role in today's society, where devices from different domains collaborate on the same task, and device authentication technologies are urgently needed to ensure the security of IoT applications. In addition, due to the wide distribution of IoT devices, complex application scenarios, and large differences in node performance, their identity authentication efficiency is low. The existing authentication methods have problems such as high key management overhead and reliance on trusted third parties. Therefore, an overall architecture of distributed storage for IoT device identity authentication is proposed. It mainly includes the distributed IoT device identity authentication mechanism and the detailed process of device registration consortium chain and consortium chain verification device. The performance analysis of the identity authentication method shows that the block creation time of different devices is less than 0.55 s, the IoT devices can join the alliance chain, and the identity authentication mechanism is real and effective.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.