Title: Anonymous chaotic-based identity authentication protocol in IoT

Authors: Jing Long; Xin Su

Addresses: Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Hunan Normal University, Changsha 410081, China ' Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha 410138, China

Abstract: With the rapid development of internet of things (IoT), the credible identity authentications among the connected devices are widely investigated by researchers and institutes. Traditional identity authentication protocols issues exist in terms of security, complexity and authentication efficiency. To address these problems, this work introduces chaotic mapping technique into identity authentication. Besides, anonymity and interactivity are also considered to realise a high-efficient and secure IoT device authentication. Firstly, Kent chaotic mapping technique is used to generate the chaotic sequence as the authentication key, after that, the interactive authentication is established among the server, reader and tag. The authentication information is encrypted in the transmitted channel. The identity information is anonymous in the proposed protocol. Finally, the security, complexity and efficiency are analysed and discussed. The comparison results show that the proposed protocol is superior to other protocols.

Keywords: internet of things; IoT; identity authentication; chaotic mapping; anonymity.

DOI: 10.1504/IJES.2021.10036383

International Journal of Embedded Systems, 2021 Vol.14 No.2, pp.194 - 200

Received: 19 Dec 2019
Accepted: 05 Feb 2020

Published online: 31 Mar 2021 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article