A lightweight IoT terminal authentication method based on the SM algorithm

Chuan He,Bo Zhang, Liang Zhang,Zesheng Xi, Yuan Fang,Yunfan Wang

2024 4th International Conference on Neural Networks, Information and Communication (NNICE)(2024)

Cited 0|Views0
No score
Abstract
In the distributed power network, the secure access of terminal equipment is closely related to the security of the power grid system. Usually, the terminal can achieve device access through two-way authentication with the edge-side device under the distributed architecture. Therefore, aiming at the security problem of the power network, a two-way authentication method between the edge side device and the terminal of the physical network based on the national secret encryption algorithm was designed, in which digital signature technology was used to exchange secret key information. The shared key is generated based on the Diffie-Hellman protocol. In addition, considering the problem of insufficient performance of IoT terminals, the authentication method was lightweight from the perspective of computational overhead and transmission overhead. Through theoretical verification, this method can fully resist reusing, eavesdropping, tampering, and other network attacks to achieve mutual authentication between devices.
More
Translated text
Key words
Mutual authentication,Digital signature,SM2,SM3,Diffie-Hellman protocol
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined