Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

被引:0
|
作者
Yang, Lin [1 ]
机构
[1] Zibo Vocat Inst, Coll Artificial Intelligence & Big Data, Zibo 255000, Peoples R China
关键词
Intelligence; Internet of things; Fault-tolerant learning algorithms on the ring; Polynomials; Costs; PROTOCOL; SCHEME;
D O I
10.1186/s13635-024-00153-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly challenging. To tackle the increasing security challenges caused by the proliferation of IoT devices, this research proposes an innovative method for IoT identity authentication. The method is based on an improved ring-learning with errors (R-LWE) algorithm, which encrypts and decrypts communication between devices and servers effectively using polynomial modular multiplication and modular addition operations. The main innovation of this study is the improvement of the traditional R-LWE algorithm, enhancing its efficiency and security. Experimental results demonstrated that, when compared to number theory-based algorithms and elliptic curve cryptography algorithms at a 256-bit security level, the enhanced algorithm achieves significant advantages. The improved algorithm encrypted 20 data points with an average runtime of only 3.6 ms, compared to 7.3 ms and 7.7 ms for the other algorithms. Similarly, decrypting the same amount of data had an average runtime of 2.9 ms, as opposed to 7.3 ms and 8 ms for the other algorithms. Additionally, the improved R-LWE algorithm had significant advantages in terms of communication and storage costs. Compared to the number theory-based algorithm, the R-LWE algorithm reduced communication and storage costs by 3 degrees C each, and compared to elliptic curve cryptography, it reduced them by 4 degrees C each. This achievement not only enhances the efficiency of encryption and decryption but also lowers the overall operational costs of the algorithm. The research has made significant strides in improving the security and efficiency of IoT device identity authentication by enhancing the R-LWE algorithm. This study provides theoretical and practical foundations for the development and application of related technologies, as well as new solutions for IoT security.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
    Lin Yang
    EURASIP Journal on Information Security, 2024
  • [2] Better Security Estimates for Approximate, IoT-Friendly R-LWE Cryptosystems
    O'Connor, Ruth
    Khalid, Ayesha
    O'Neill, M.
    Liu, Weiqiang
    2022 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2022, : 611 - 615
  • [3] Efficient Attribute-Based Encryption from R-LWE
    ZHU Weiling
    YU Jianping
    WANG Ting
    ZHANG Peng
    XIE Weixin
    Chinese Journal of Electronics, 2014, 23 (04) : 778 - 782
  • [4] Efficient Attribute-Based Encryption from R-LWE
    Zhu Weiling
    Yu Jianping
    Wang Ting
    Zhang Peng
    Xie Weixin
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 778 - 782
  • [5] Chosen-ciphertext secure hierarchical identity-based encryption from R-LWE
    Jiang, Xue-Feng
    Wang, Ting
    Sun, Zhi-Wei
    Journal of Computers (Taiwan), 2020, 31 (01) : 320 - 331
  • [6] IoT Security Access Authentication Method Based on Blockchain
    Cheng, Yang
    Lei, Min
    Chen, Shiyou
    Fang, Zigang
    Yang, Shuaipeng
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT II, 2019, 302 : 229 - 238
  • [7] An efficient identity authentication protocol for layer 2 security sourced on ECC for IoT communications
    Hussain, Iqra
    Pandey, Nitin
    Negi, Mukesh Chandra
    Test Engineering and Management, 2019, 81 (11-12): : 1799 - 1810
  • [8] An Efficient NTRU-Based Authentication Protocol in IoT Environment
    Jeong, SeongHa
    Park, KiSung
    Park, YoHan
    Park, YoungHo
    INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 1262 - 1268
  • [9] An efficient user authentication model for IOT-based healthcare environment
    Elngar A.A.
    International Journal of Information and Computer Security, 2019, 11 (4-5): : 431 - 446
  • [10] Research on dynamic bidirectional security authentication of user identity in wireless sensor network based on improved DES algorithm
    Mao X.
    Li H.
    Sun S.
    International Journal of Information and Communication Technology, 2023, 23 (01) : 74 - 90