Authors: Jing Long; Xin Su
Addresses: Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha 410081, China ' Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha 410138, China
Abstract: With the rapid development of internet of things (IoT), the credible identity authentications among the connected devices are widely investigated by researchers and institutes. Traditional identity authentication protocols issues exist in terms of security, complexity and authentication efficiency. To address these problems, this work introduces chaotic mapping technique into identity authentication. Besides, anonymity and interactivity are also considered to realise a high-efficient and secure IoT device authentication. Firstly, Kent chaotic mapping technique is used to generate the chaotic sequence as the authentication key, after that, the interactive authentication is established among the server, reader and tag. The authentication information is encrypted in the transmitted channel. The identity information is anonymous in the proposed protocol. Finally, the security, complexity and efficiency are analysed and discussed. The comparison results show that the proposed protocol is superior to other protocols.
Keywords: internet of things; IoT; identity authentication; chaotic mapping; anonymity.
International Journal of Embedded Systems, 2021 Vol.14 No.2, pp.194 - 200
Received: 19 Dec 2019
Accepted: 05 Feb 2020
Published online: 31 Mar 2021 *