skip to main content
10.1145/3661638.3661713acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaisnsConference Proceedingsconference-collections
research-article

Security optimization method of key exchange protocol for massive Internet of things terminal equipment

Published: 01 June 2024 Publication History

Abstract

There are different access processes of multiple terminal devices in the Internet of things, which are interfered by a large number of identity differentiated authentication behaviors. Under this interference, the security of the device key exchange protocol is greatly reduced. A security optimization method of key exchange protocol for massive Internet of things terminal equipment is proposed. Aiming at the authentication process of Internet of things terminal equipment, a key exchange protocol framework is established. The man in the middle attack mode in the main mode exchange process is deeply analyzed to optimize the security of the exchange protocol. Under the condition of mutual authentication, a new identity authentication method for terminal equipment is designed, and a security optimization scheme is generated combined with elliptic curve algorithm. The experimental results show that after the security optimization application of the key exchange protocol of the Internet of things terminal equipment, the security module length of the key exchange protocol is reduced by 81% and 68%, and the anti attack ability of the multi device exchange protocol of the Internet of things is effectively improved.

References

[1]
Amanlou S, Hasan M K, Bakar K A A. 2021. Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model. Computer Networks, 199(9):1-13.
[2]
Zargar S, Shahidinejad A, Mostafa Ghobaei‐Arani. 2021. A lightweight authentication protocol for IoT‐based cloud environment. International Journal of Communication Systems, 34(11):1-17.
[3]
Shen Y, Li Y, Wang Y. 2020. A RLWE-based two-factor three-party authentication key exchange protocol. Computer Engineering & Science, 42(09): 1556-1562.
[4]
Duan X, Han Y, Wang C. 2020. Analysis and Improvement of Public Key Reuse for A RLWE Key Exchange Protocol. Netinfo Security, 20(11): 87-94.
[5]
LI Y, Han Y, Li Z. 2020. A Post Quantum Authenticated Key Exchange Protocol Based on LWE. Netinfo Security, 20(10): 92-99.
[6]
Zhao Z, Huang L, Tang Y. 2020. Biometric authenticated key exchange protocol based on RLWE. Application Research of Computers, 37(11): 3437-3440
[7]
Long G, Chen M. 2020. An identity-based authenticated key exchange scheme with perfect forward secrecy in standard model. Journal of Optoelectronics·Laser, 31(08): 878-890.
[8]
Tseng Y M, Chen J L, Huang S S. 2021. A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices. Computer Networks, 196(4): 1-13.
[9]
Zhang Q, Zhu L, Li Y. 2022. A group key agreement protocol for intelligent internet of things system. International Journal of Intelligent Systems, 37(1): 699-722.
[10]
Wei C, CAI X, Wang T. 2020. Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer. Journal of Electronics & Information Technology, 42(02): 341-347.

Index Terms

  1. Security optimization method of key exchange protocol for massive Internet of things terminal equipment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AISNS '23: Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security
    December 2023
    467 pages
    ISBN:9798400716966
    DOI:10.1145/3661638
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AISNS 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 12
      Total Downloads
    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media