Identity Authentication Protocol of Smart Home IoT based on Chebyshev Chaotic Mapping

被引:0
作者
Sun, Jingjing [1 ,2 ]
Zhang, Peng [1 ,3 ]
Kong, Xiaohong [2 ]
机构
[1] Henan Polytech Univ, Hebi Inst Engn & Technol, Hebi 458000, Peoples R China
[2] Henan Inst Sci & Technol, Sch Mech & Elect Engn, Xinxiang 453003, Peoples R China
[3] Tianjin Univ Technol & Educ, Sch Automobile & Transportat, Tianjin 300222, Peoples R China
关键词
Chebyshev; chaotic map; internet of things; identity authentication; LAoCCM protocol; key agreement; EDHOC protocol; INTERNET;
D O I
10.14569/IJACSA.2023.0140461
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of the Internet of Things technology, the security of the Internet of Things is becoming increasingly important. Internet of Things (IoT) identity authentication is an important means to ensure network security. However, common identity authentication protocols have problems such as insufficient security factor and low efficiency. A smart home IoT identity authentication protocol based on Chebyshev chaotic map is proposed to improve the security of identity authentication. To solve the problem of low security of session key, the LAoCCM identity authentication protocol based on Chebyshev chaotic map is proposed to update session key. To solve the problem that the number of chaotic maps is too high, AEAD algorithm is introduced to reduce the number of chaotic maps. The results show that the average authentication error of LAoCCM authentication protocol is 0.00085, which is significantly smaller than that of EDHOC and ZKOP authentication protocols. Therefore, the proposed LAoCCM identity authentication protocol based on Chebyshev chaotic map has higher security performance and authentication efficiency, which can effectively meet people's needs for information security of smart furniture.
引用
收藏
页码:557 / 565
页数:9
相关论文
共 18 条
  • [1] Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection
    Abbasinezhad-Mood, Dariush
    Ostad-Sharif, Arezou
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (12) : 7287 - 7294
  • [2] A survey on continuous authentication methods in Internet of Things environment
    Al-Naji, Fatimah Hussain
    Zagrouba, Rachid
    [J]. COMPUTER COMMUNICATIONS, 2020, 163 : 109 - 133
  • [3] Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption
    Attaullah
    Javeed, Adnan
    Shah, Tariq
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31467 - 31484
  • [4] Chebyshev spectral collocation method for MHD duct flow under slip condition
    Bozkaya, Canan
    Turk, Onder
    [J]. PROGRESS IN COMPUTATIONAL FLUID DYNAMICS, 2022, 22 (02): : 118 - 129
  • [5] [陈书仪 Chen Shuyi], 2022, [电子学报, Acta Electronica Sinica], V50, P990
  • [6] Nonlinear dynamics and dynamic instability of smart structural cross-ply laminated cantilever plates with MFC layer using zigzag theory
    Hao, Y. X.
    Zhao, K. F.
    Zhang, W.
    Yang, S. W.
    [J]. APPLIED MATHEMATICAL MODELLING, 2020, 79 : 639 - 671
  • [7] Stable method for solving the Cauchy problem with the use of Chebyshev polynomials
    Joachimiak, Magda
    Cialkowski, Michal
    Frackowiak, Andrzej
    [J]. INTERNATIONAL JOURNAL OF NUMERICAL METHODS FOR HEAT & FLUID FLOW, 2020, 30 (03) : 1441 - 1456
  • [8] Kumar A., 2021, INT J ADV RES IDEAS, V7, P126
  • [9] A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
    Liang, Wei
    Xie, Songyou
    Long, Jing
    Li, Kuan-Ching
    Zhang, Dafang
    Li, Keqin
    [J]. INFORMATION SCIENCES, 2019, 503 (129-147) : 129 - 147
  • [10] Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level
    Nath, Kaushik
    Sarkar, Palash
    [J]. IET INFORMATION SECURITY, 2020, 14 (06) : 633 - 640