Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

被引:0
|
作者
Yang, Lin [1 ]
机构
[1] Zibo Vocat Inst, Coll Artificial Intelligence & Big Data, Zibo 255000, Peoples R China
关键词
Intelligence; Internet of things; Fault-tolerant learning algorithms on the ring; Polynomials; Costs; PROTOCOL; SCHEME;
D O I
10.1186/s13635-024-00153-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly challenging. To tackle the increasing security challenges caused by the proliferation of IoT devices, this research proposes an innovative method for IoT identity authentication. The method is based on an improved ring-learning with errors (R-LWE) algorithm, which encrypts and decrypts communication between devices and servers effectively using polynomial modular multiplication and modular addition operations. The main innovation of this study is the improvement of the traditional R-LWE algorithm, enhancing its efficiency and security. Experimental results demonstrated that, when compared to number theory-based algorithms and elliptic curve cryptography algorithms at a 256-bit security level, the enhanced algorithm achieves significant advantages. The improved algorithm encrypted 20 data points with an average runtime of only 3.6 ms, compared to 7.3 ms and 7.7 ms for the other algorithms. Similarly, decrypting the same amount of data had an average runtime of 2.9 ms, as opposed to 7.3 ms and 8 ms for the other algorithms. Additionally, the improved R-LWE algorithm had significant advantages in terms of communication and storage costs. Compared to the number theory-based algorithm, the R-LWE algorithm reduced communication and storage costs by 3 degrees C each, and compared to elliptic curve cryptography, it reduced them by 4 degrees C each. This achievement not only enhances the efficiency of encryption and decryption but also lowers the overall operational costs of the algorithm. The research has made significant strides in improving the security and efficiency of IoT device identity authentication by enhancing the R-LWE algorithm. This study provides theoretical and practical foundations for the development and application of related technologies, as well as new solutions for IoT security.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] An Efficient Dual Encryption of IoMT data Using Lightweight Security Scheme for Cloud Based IoT Environment
    Kumar, Sanjay
    Abhishek, Kumar
    Jhaveri, Rutvij H.
    Alabdulatif, Abdulatif
    Gaur, Rajkumar
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1782 - 1788
  • [42] An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
    Sen, Nilanjan
    APPLIED ALGORITHMS, 2014, 8321 : 110 - 121
  • [43] A Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards
    Xu, Chengbo
    Jia, Zhongtian
    Wen, Fengtong
    Ma, Yan
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (03): : 25 - 39
  • [44] A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security
    Attkan, Ankit
    Ranga, Virender
    Ahlawat, Priyanka
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2023, 4 (02):
  • [45] A secure and efficient dynamic identity based authentication scheme for multi-server environment using smart cards
    Institute of Network Technology Research, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Int. J. Future Gener. Commun. Networking, 2013, 3 (25-40):
  • [46] An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments
    Jasmine, R. Megiba
    Jasper, J.
    Geetha, M. R.
    WIRELESS NETWORKS, 2025, 31 (01) : 545 - 565
  • [47] Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certificates and Datagram Transport Layer Security Protocol
    Duy An Ha
    Kha Tho Nguyen
    Zao, John K.
    PROCEEDINGS OF THE SEVENTH SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2016), 2016, : 173 - 179
  • [48] Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment
    Dash, Pandit Byomokesha
    Senapati, Manas Ranjan
    Behera, H. S.
    Nayak, Janmenjoy
    Vimal, S.
    JOURNAL OF ENGINEERING MATHEMATICS, 2024, 144 (01)
  • [49] Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment
    Pandit Byomokesha Dash
    Manas Ranjan Senapati
    H. S. Behera
    Janmenjoy Nayak
    S. Vimal
    Journal of Engineering Mathematics, 2024, 144
  • [50] Route planning method for UAV in unknown environment based on improved SAS algorithm
    Song, Yuanjie
    Xing, Xiaojun
    Xi, Qingbiao
    Yang, Bing
    Yu, Ziquan
    PROCEEDINGS OF THE 32ND 2020 CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2020), 2020, : 3163 - 3168