Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

被引:0
|
作者
Yang, Lin [1 ]
机构
[1] Zibo Vocat Inst, Coll Artificial Intelligence & Big Data, Zibo 255000, Peoples R China
关键词
Intelligence; Internet of things; Fault-tolerant learning algorithms on the ring; Polynomials; Costs; PROTOCOL; SCHEME;
D O I
10.1186/s13635-024-00153-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly challenging. To tackle the increasing security challenges caused by the proliferation of IoT devices, this research proposes an innovative method for IoT identity authentication. The method is based on an improved ring-learning with errors (R-LWE) algorithm, which encrypts and decrypts communication between devices and servers effectively using polynomial modular multiplication and modular addition operations. The main innovation of this study is the improvement of the traditional R-LWE algorithm, enhancing its efficiency and security. Experimental results demonstrated that, when compared to number theory-based algorithms and elliptic curve cryptography algorithms at a 256-bit security level, the enhanced algorithm achieves significant advantages. The improved algorithm encrypted 20 data points with an average runtime of only 3.6 ms, compared to 7.3 ms and 7.7 ms for the other algorithms. Similarly, decrypting the same amount of data had an average runtime of 2.9 ms, as opposed to 7.3 ms and 8 ms for the other algorithms. Additionally, the improved R-LWE algorithm had significant advantages in terms of communication and storage costs. Compared to the number theory-based algorithm, the R-LWE algorithm reduced communication and storage costs by 3 degrees C each, and compared to elliptic curve cryptography, it reduced them by 4 degrees C each. This achievement not only enhances the efficiency of encryption and decryption but also lowers the overall operational costs of the algorithm. The research has made significant strides in improving the security and efficiency of IoT device identity authentication by enhancing the R-LWE algorithm. This study provides theoretical and practical foundations for the development and application of related technologies, as well as new solutions for IoT security.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment
    Sagu, Amit
    Gill, Nasib Singh
    Gulia, Preeti
    Chatterjee, Jyotir Moy
    Priyadarshini, Ishaani
    FUTURE INTERNET, 2022, 14 (10):
  • [32] Access control method of network security authentication information based on fuzzy reasoning algorithm
    Zhang, Ruihong
    Hu, Zhihua
    MEASUREMENT, 2021, 185
  • [33] Scheduling Method for Agricultural IOT Business Based on Improved Multiobjective Evolutionary Algorithm
    Zhang, Kewang
    Shu, Zhixu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [34] An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System
    Kavitha, S.
    Alphonse, P. J. A.
    Reddy, Y. Venkataramana
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (08)
  • [35] An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System
    S. Kavitha
    P. J. A. Alphonse
    Y. Venkataramana Reddy
    Journal of Medical Systems, 2019, 43
  • [36] An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    Li, Xiong
    Xiong, Yongping
    Ma, Jian
    Wang, Wendong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) : 763 - 769
  • [37] SDN-IoT: SDN-based efficient clustering scheme for IoT using improved Sailfish optimization algorithm
    Mohammadi, Ramin
    Akleylek, Sedat
    Ghaffari, Ali
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [38] An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment
    M. Roshni Thanka
    P. Uma Maheswari
    E. Bijolin Edwin
    Cluster Computing, 2019, 22 : 10905 - 10913
  • [39] An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment
    Thanka, M. Roshni
    Maheswari, P. Uma
    Edwin, E. Bijolin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10905 - 10913
  • [40] RETRACTED: IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security (Retracted Article)
    Cao, ChunHua
    Tang, YaNa
    Huang, DeYan
    Gan, WeiMin
    Zhang, Chunjiong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021