Design of L-IDAKA Protocol for Lightweight Access Authentication and Encrypted Transmission of New Power System-Aware Terminals Based on Hash Pre-authentication.

Yun Feng,Feng Zhai,Xiaobing Liang, Liang Zhang

EITCE(2022)

引用 0|浏览0
暂无评分
摘要
The introduction of massive heterogeneous IoT terminals poses new challenges to the access security of the edge-aware side of the power IoT. Marked cipher technology can realize direct authentication based on device identity without relying on digital certificates, which significantly simplifies the difficulty of key management and authentication process and has natural advantages in the large-scale deployment of power IoT terminal scenario. However, identification cryptography is based on bilinear pair operation, which has high operational overhead and is difficult to apply to resource-constrained terminals. In this paper, we design a lightweight authentication key negotiation protocol based on hash pre-certification based on the four-layer architecture of power IoT application-platform-network-awareness for the characteristics of huge scale and resource-constrained power IoT devices, which reduces the number of bilinear pairs in the traditional SM9 algorithm from two to one and improves the protocol efficiency by more than 50%. Meanwhile, a security analysis of the protocol based on the classical Dolev-Yao threat model shows that this scheme can achieve efficient and secure applications in resource-constrained terminals of power IoT.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要