MUTUAL AUTHENTICATION PROTOCOL FOR IoT-BASED ENVIRONMENT MONITORING SYSTEM

被引:0
作者
Wang, Zhihui [1 ]
Zhao, Jianli [2 ]
GUo, Benzhen [1 ]
Jingjingyang [1 ]
Zhang, Xiao [1 ]
机构
[1] Hebei North Univ, Sch Informat Sci & Engn, Zhangjiakou 07500, Hebei, Peoples R China
[2] State Grid Hebei Elect Power Res Inst, Shijiazhuang 050000, Hebei, Peoples R China
来源
JOURNAL OF ENVIRONMENTAL PROTECTION AND ECOLOGY | 2019年 / 20卷 / 02期
关键词
Internet of things (IoT); network security; user authentication; key negotiation; elliptic curve;
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
In a rabbit breeding environment monitoring system designed based on the Internet of things (IoT) technology, a safety policy that can realise mutual authentication between client-side APP and IoT data acquisition as well as equipment control is required to ensure the safety of system equipment and message command. Due to the high requirement on the computing power and storage capacity of CPU used for information acquisition and equipment control under the IoT, traditional server/client authentication policy would affect the system development cost. Therefore, a mutual authentication policy was designed in this paper based on elliptic curve cryptography (ECC) with the aid of the system authorised support centre. The experiment proved that this policy could satisfy the requirement of mutual authentication raised by the breeding environment monitoring system under the IoT at a low system development cost.
引用
收藏
页码:934 / 944
页数:11
相关论文
共 14 条
[1]  
Apori S. O., 2014, Online Journal of Animal and Feed Research (OJAFR), V4, P51
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[4]   ECONOMIC WEIGHTS IN RABBIT MEAT PRODUCTION [J].
Cartuche, L. ;
Pascual, M. ;
Gomez, E. A. ;
Blasco, A. .
WORLD RABBIT SCIENCE, 2014, 22 (03) :165-177
[5]  
Gao Q., 2012, INT ENERGY SUSTAINAB, P1, DOI DOI 10.1109/IESC.2012.6217197
[6]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[7]   Efficient and fault-diagnosable authentication architecture for AMI in smart grid [J].
Li, Depeng ;
Aung, Zeyar ;
Williams, John R. ;
Sanchez, Abel .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) :598-616
[8]   Multicast Authentication in the Smart Grid With One-Time Signature [J].
Li, Qinghua ;
Cao, Guohong .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :686-696
[9]   An elliptic curve cryptography based lightweight authentication scheme for smart grid communication [J].
Mahmood, Khalid ;
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Kumari, Saru ;
Li, Xiong ;
Sangaiah, Arun Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 81 :557-565
[10]   Password-authenticated cluster-based group key agreement for smart grid communication [J].
Nicanfar, Hasen ;
Leung, Victor C. M. .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) :221-233