skip to main content
10.1145/3512576.3512628acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicitConference Proceedingsconference-collections
research-article

Digital fingerprint extraction method of IOT devices based on Cryptography

Published: 11 April 2022 Publication History

Abstract

In order to improve the identification efficiency of devices in the perception layer of the Internet of Things, reduce the cost of calculation and protect data privacy, a device fingerprint extraction method based on lightweight national secret algorithm is proposed. Firstly, the feature information of embedded module is introduced to construct a comprehensive feature set, and the reasonable feature subset is determined based on the feature selection strategy of expert information weighting mechanism; Secondly, the lightweight cipher algorithm with high security is selected to transform the feature subset data into device fingerprint; Finally, based on the electric energy acquisition equipment in the power Internet of things, the fingerprint value extracted meets the requirements of uniqueness and unforgeability, and has the characteristics of fast response, which verifies the feasibility of the method.

References

[1]
HU Xiang-dong,Wei Qin-fang,Hu Rong.Applied cryptography(4 version).Beijing:Publishing House of Electronics Industry, 2019:378-379
[2]
ZHANG Kai. Internet of Things Security Course. Beijing:Tsinghua university press,2014:315-320
[3]
WANG Zeng-guang,CHEN Li-yun,LU Yu.Research on WiFi Identity Authentication Scheme Based on Dynamic Password,Microelectronics&Computer,2016,33(6): 78-81
[4]
SONG Guang-jie,ZHANG Ming-hui,LI Jing-jiao.Research of embedded network communications based on hardware encryption,Application of Electronic Technique, 2010,36(1):148-150.
[5]
FENG L.Research and Design of Remote Identity Authentication on System Based on Bio-metrics and PKI Technology, Jinan:Shandong University,2019.
[6]
CHEN Da-Jang, ZHANG Ning, QIN Zhen,et al.S2M:A Lightweight Acoustic Fingerprints-based Wireless Device Authentication Protocol.IEEE Internet of Things Journal, 2016, 4(1): 88-100.
[7]
FANG Y Y.Research and Implementation about Device Fingerprints based on Smartphone's Battery, Wuhan:Wuhan University,2018.
[8]
Guo L B.Design and implementation of identity authentication and license authorization system based on machine fingerprint,Chengdu:University of Electronic Science and Technology of China,2011.
[9]
LI Zhi-wei,YANG Mao-xing,TIE Yue-huan.Implementation of the software lock function based on Fingerprint within hardware,Microelectronics&Computer,2013,30(4),123-126.
[10]
DU J X.Contextual Authentication Technology Based on Fingerprint of Internet of Things,Nanjing:Nanjing University of Posts and Telecommunications,2019.
[11]
Lee J, Kim D W. Feature selection for multi-label classification using multivariate mutual information. Pattern Recognition Letters, 2013, 34(3):349-357.
[12]
LIN Meng-lei,LIU Jing-hua,WANG Chen-xi,et.al,Multi-label Feature Selection Algorithm Based on Label Weighting,Computer Science,2017,44(10):289-295.
[13]
LU Wen-di,LI Xiao-hui,WANG Han.Research and implementation of secure access method for IoT devices based on device fingerprint,Electronic Design Engineering,2019,27(3):136-141.
[14]
LIN Y,HU Q,LIU J,etal.Multi-label feature selection based on max-dependency and min-redundancy.Neurocomputing,2015(168):92-103.
[15]
YONG Ju-ya,ZHOU Zhong-mei,Multi-level feature selection algorithm based on mutual information,Journal of Computer Applications,2020,40(12):3478-3484.
[16]
CHENG Yu-sheng,SONG Fan,WANG Yi-bin,et al.Multi-label feature selection algorithm based on conditional mutual information of expert feature,Journal of Computer Applications,2020, 40(2):503-509.
[17]
Christor Paar,Jan Pelzl,Understanding Cryptography:A Textbook for Students and Practitioners.Beijing:Tsinghua university press,2012.238-241
[18]
YAO Jian.Domestic commercial cryptographic algorithm and its performance analysis.Computer Applications and Software,2019,36(6):327-333.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIT '21: Proceedings of the 2021 9th International Conference on Information Technology: IoT and Smart City
December 2021
584 pages
ISBN:9781450384971
DOI:10.1145/3512576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet of Things
  2. SM
  3. device fingerprint
  4. feature selection
  5. lightweight

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIT 2021
ICIT 2021: IoT and Smart City
December 22 - 25, 2021
Guangzhou, China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 58
    Total Downloads
  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media