Multi-attribute Authentication Method Based on Continuous Trust Evaluation

Jing Guo,Bingsen Li, Ping Du, Ziyi Xin, Jianjun Zhang, Jiawei Chen

SMART COMPUTING AND COMMUNICATION(2022)

Cited 0|Views0
No score
Abstract
In order to solve the data security problems faced by the power Internet of Things, this article combines the trust evaluation technology and the token authentication method to propose a multi-attribute identity authentication method based on continuous trust evaluation. This method embeds the trust evaluation value into the token, and authenticate the user's identity through the real-time update of the token, thereby granting the corresponding authority. At the same time, the authentication process is encrypted and decrypted by mixing the random generation matrix encryption algorithm based on chaotic mapping and the RSA digital signature algorithm to improve the security of authentication. The experimental results show that the trust evaluation value obtained by the continuous trust evaluation algorithm for users with different identities are different, so the resource permissions obtained are also different. Therefore, the multi-attribute authentication method combined with trust evaluation in this paper has higher security and confidentiality than previous authentication methods.
More
Translated text
Key words
Multi-attribute authentication, Continuous trust assessment, Power Internet of Things, Mobile Internet
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined