Abstract
AbstractAs the important transmission approach of the perception data, the security and privacy of the perception layer nodes have been paid more and more attention. To evaluate the credibility of the perception nodes and protect autologous identity privacy, a remote attestation mechanism using group signature (GS-RAM) for the perception layer of centralized networking is proposed in this paper. First, a RAM, based on the computational Diffie–Hellman (CDH) problem and GS, is established for the data source of the perception nodes. Second, the specific construction of the proposed GS-RAM is given to identify the trusted state of data sources without exposing the privacy of the perception nodes. Then, a strict security certification was carried out to verify the correctness, unforgeability, anonymity, traceability, unrelatedness, non-framing, anti-joint aggression and forward security of the proposed GS-RAM. Finally, simulation experiments are carried out to verify that the proposed scheme has better security and dynamic adaptability.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference30 articles.
1. D. Wang, J. Zhao, A new approach to heterogeneous wireless sensor networks reliability evaluation based on perception layer in internet of vehicles. Photonic Netw. Commun. 37(2), 179–186 (2019)
2. N. Ye, Y. Zhu et al., An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inform. Sci. 8(4), 1617–1824 (2014)
3. B. Ndibanje, H.J. Lee, S. Lee, Security analysis and improvements of authentication and access control in the internet of things. Sensors 14, 786–805 (2014)
4. M. Zhou, L. Han, H. Lu et al., Intrusion detection system for IoT heterogeneous perceptual network. Mob. Netw. Appl. 4, 42–54 (2020)
5. P. Zhang, J. Gao, W. Jia et al., Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT multi-cloudy environment. J. Inf. Secur. Appl. 47, 65–77 (2019)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献