Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

被引:0
|
作者
Yang, Lin [1 ]
机构
[1] Zibo Vocat Inst, Coll Artificial Intelligence & Big Data, Zibo 255000, Peoples R China
关键词
Intelligence; Internet of things; Fault-tolerant learning algorithms on the ring; Polynomials; Costs; PROTOCOL; SCHEME;
D O I
10.1186/s13635-024-00153-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly challenging. To tackle the increasing security challenges caused by the proliferation of IoT devices, this research proposes an innovative method for IoT identity authentication. The method is based on an improved ring-learning with errors (R-LWE) algorithm, which encrypts and decrypts communication between devices and servers effectively using polynomial modular multiplication and modular addition operations. The main innovation of this study is the improvement of the traditional R-LWE algorithm, enhancing its efficiency and security. Experimental results demonstrated that, when compared to number theory-based algorithms and elliptic curve cryptography algorithms at a 256-bit security level, the enhanced algorithm achieves significant advantages. The improved algorithm encrypted 20 data points with an average runtime of only 3.6 ms, compared to 7.3 ms and 7.7 ms for the other algorithms. Similarly, decrypting the same amount of data had an average runtime of 2.9 ms, as opposed to 7.3 ms and 8 ms for the other algorithms. Additionally, the improved R-LWE algorithm had significant advantages in terms of communication and storage costs. Compared to the number theory-based algorithm, the R-LWE algorithm reduced communication and storage costs by 3 degrees C each, and compared to elliptic curve cryptography, it reduced them by 4 degrees C each. This achievement not only enhances the efficiency of encryption and decryption but also lowers the overall operational costs of the algorithm. The research has made significant strides in improving the security and efficiency of IoT device identity authentication by enhancing the R-LWE algorithm. This study provides theoretical and practical foundations for the development and application of related technologies, as well as new solutions for IoT security.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Improved scheme with zero knowledge for identity-based authentication framework in grid environment
    College of Computer Science, Chongqing University, Chongqing 400044, China
    不详
    不详
    Huazhong Ligong Daxue Xuebao, 2006, SUPPL. (167-170):
  • [22] Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
    Chaudhry, Shehzad Ashraf
    Irshad, Azeem
    Yahya, Khalid
    Kumar, Neeraj
    Alazab, Mamoun
    Bin Zikria, Yousaf
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
  • [23] Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing
    Aruna, Juluru
    Ashwani, D.
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 347 - 354
  • [24] An SVD-based watermarking method for image content authentication with improved security
    Lee, SJ
    Jang, DW
    Yoo, CD
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 525 - 528
  • [25] HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment
    Nikooghadam, Mahdi
    Shahriari, Hamid Reza
    Saeidi, Saeid Tousi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [26] Low-cost group-based identity security authentication protocol for NB-IoT nodes
    Chang X.
    Zhan J.
    Wang Z.
    1600, Editorial Board of Journal on Communications (42): : 152 - 162
  • [27] LSTM-Markov based efficient anomaly detection algorithm for IoT environment
    Shanmuganathan, V
    Suresh, A.
    APPLIED SOFT COMPUTING, 2023, 136
  • [28] An Improved Energy Efficient Duty Cycling Algorithm for IoT based Precision Agriculture
    Dhall, Ruchi
    Agrawal, Himanshu
    9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 135 - 142
  • [29] An Improved Lightweight Pseudonym Identity-Based Authentication Scheme on Multi-server Environment
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 1115 - 1126
  • [30] An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
    Li, Chun-Ta
    Wu, Tsu-Yang
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Chen, Chien-Ming
    SENSORS, 2017, 17 (07):