skip to main content
10.1145/3674225.3674317acmotherconferencesArticle/Chapter ViewAbstractPublication PagespeaiConference Proceedingsconference-collections
research-article

A Lightweight iot Terminal security access authentication Method Based on edge Computing

Published: 31 July 2024 Publication History

Abstract

Facing the situation of massive resource-constrained terminal access in the edge computing environment of the power Internet of things, in order to overcome the shortcomings of the existing authentication technology[1], this paper proposes a lightweight terminal security access authentication scheme based on edge computing. Different from the traditional symmetric and asymmetric cryptography, the lightweight identity authentication mechanism is realized based on hash function, XOR operation and Hash message authentication code. To meet the authentication requirements of massive power terminal heterogeneous access. The calculation rate of hash function is much lighter than that of traditional symmetric and asymmetric encryption, its computational consumption is negligible compared with that of hash function, and its requirement for computing resources is minimal, which is suitable for embedded terminals in the Internet of Things.

References

[1]
Sen A, Ghosh P, Vittal V,et al. A new min-cut problem with application to electric power network partitioning[J].European Transactions on Electrical Power, 2009.
[2]
Dhull P, Guevara A P, Ansari M,et al.Internet of Things Networks: Enabling Simultaneous Wireless Information and Power Transfer[J].IEEE microwave magazine, 2022 (3):23.
[3]
Gao M, Wang Q, Arafin M T,et al.Approximate Computing for Low Power and Security in the Internet of Things [J].Computer, 2017, 50(6):27-34.
[4]
Haight R, Haensch W, Friedman D . 2024. Solar-powering the Internet of Things [J]. Science, 353 [2024-01-01].
[5]
Song-Jian D. Research of ethernet broadband user of school access authentication technologies [J]. Journal of Chongqing College of Education, 2006.
[6]
Huang Xing, ZHANG Wenjie, Li Xi, Energy efficiency resource allocation algorithm for cognitive D2D network for power Internet of Things [J]. Electrical Measurement and Instrumentation, 2023, 60(2):97-103.
[7]
LU Yuxiang, Shao Weiping, Yang Yang, 2024. Access method and System of power Internet of Things terminal based on multi-logic e-SIM priority :CN202010158436.9[P].CN111432451A [2024-01-01].
[8]
JING Mengchun, WANG Jiye, CHENG Zhihua, Research and application of sensor information model in power Internet of things [J]. Power Grid Technology, 2014, 38(2):532-537. (in Chinese) J.1000-3673.pst.2014.02.040.
[9]
Ding T, Haibin Z, Ziqiang H. Access Authentication Independent of Link-layer Techniques [J]. Computer Engineering, 2006.

Index Terms

  1. A Lightweight iot Terminal security access authentication Method Based on edge Computing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PEAI '24: Proceedings of the 2024 International Conference on Power Electronics and Artificial Intelligence
    January 2024
    969 pages
    ISBN:9798400716638
    DOI:10.1145/3674225
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 July 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    PEAI 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 19
      Total Downloads
    • Downloads (Last 12 months)19
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media