Cargando…

Application of IoT Authentication Key Management Algorithm to Personnel Information Management

A new IoT authentication protocol is presented to address the security deficiencies in the Z-Wave protocol. The new protocol is based on Diameter and includes authentication/authorization module, billing module, and secure communication module. According to the characteristics of IoT devices, the re...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Qing, Li, Haoran
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050305/
https://www.ncbi.nlm.nih.gov/pubmed/35498183
http://dx.doi.org/10.1155/2022/4584072
_version_ 1784696332812812288
author Wang, Qing
Li, Haoran
author_facet Wang, Qing
Li, Haoran
author_sort Wang, Qing
collection PubMed
description A new IoT authentication protocol is presented to address the security deficiencies in the Z-Wave protocol. The new protocol is based on Diameter and includes authentication/authorization module, billing module, and secure communication module. According to the characteristics of IoT devices, the relevant algorithms are optimized, and the key agreement scheme based on elliptic curve algorithm and the symmetric encryption scheme based on AES and RC4 are introduced, which enhances the security of the protocol and also improves the system performance. The speed of response reduces the energy consumption of the system. Aiming at solving the problem that the existing polynomial-based key predistribution management scheme is limited by the key sharing rate between the nodes and the network connectivity rate, a quadratic-based wireless sensor key management scheme is proposed. The scheme breaks through the existing idea of building a shared key with a binary t-order symmetric polynomial, introduces a multivariate asymmetric quadratic polynomial, and utilizes the relationship between the quadratic eigenvalues and eigenvectors. The analysis proves that the quadratic form can be orthogonally diagonalized and uses it to generate key information, and nodes realize identity authentication by exchanging key information. The establishment of an independent and unique session key with the neighbor node is completed. The security performance analysis and simulation results show that, compared with the existing key management schemes, the scheme has great improvements in anti-capture property, connectivity, scalability, communication overhead, and storage overhead. After a series of functional tests, the enterprise information system based on the SaaS platform in this paper basically met the design requirements and finally realized the networking of the enterprise information management process and the sharing of information. Each functional module of the system can be used normally. When the input and output are wrong, the system will have a correct prompt. The buttons and various controls of the system can work normally, meeting the requirements of functional testing. Each document of the system is correct and complete, and the language description and logic meet the needs of users and meet the requirements of document testing. The test results show that the interface of the system is friendly and easy to operate and the performance of the system is stable, which is basically in line with the needs of users and achieves the design goal of this system.
format Online
Article
Text
id pubmed-9050305
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-90503052022-04-29 Application of IoT Authentication Key Management Algorithm to Personnel Information Management Wang, Qing Li, Haoran Comput Intell Neurosci Research Article A new IoT authentication protocol is presented to address the security deficiencies in the Z-Wave protocol. The new protocol is based on Diameter and includes authentication/authorization module, billing module, and secure communication module. According to the characteristics of IoT devices, the relevant algorithms are optimized, and the key agreement scheme based on elliptic curve algorithm and the symmetric encryption scheme based on AES and RC4 are introduced, which enhances the security of the protocol and also improves the system performance. The speed of response reduces the energy consumption of the system. Aiming at solving the problem that the existing polynomial-based key predistribution management scheme is limited by the key sharing rate between the nodes and the network connectivity rate, a quadratic-based wireless sensor key management scheme is proposed. The scheme breaks through the existing idea of building a shared key with a binary t-order symmetric polynomial, introduces a multivariate asymmetric quadratic polynomial, and utilizes the relationship between the quadratic eigenvalues and eigenvectors. The analysis proves that the quadratic form can be orthogonally diagonalized and uses it to generate key information, and nodes realize identity authentication by exchanging key information. The establishment of an independent and unique session key with the neighbor node is completed. The security performance analysis and simulation results show that, compared with the existing key management schemes, the scheme has great improvements in anti-capture property, connectivity, scalability, communication overhead, and storage overhead. After a series of functional tests, the enterprise information system based on the SaaS platform in this paper basically met the design requirements and finally realized the networking of the enterprise information management process and the sharing of information. Each functional module of the system can be used normally. When the input and output are wrong, the system will have a correct prompt. The buttons and various controls of the system can work normally, meeting the requirements of functional testing. Each document of the system is correct and complete, and the language description and logic meet the needs of users and meet the requirements of document testing. The test results show that the interface of the system is friendly and easy to operate and the performance of the system is stable, which is basically in line with the needs of users and achieves the design goal of this system. Hindawi 2022-04-21 /pmc/articles/PMC9050305/ /pubmed/35498183 http://dx.doi.org/10.1155/2022/4584072 Text en Copyright © 2022 Qing Wang and Haoran Li. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Wang, Qing
Li, Haoran
Application of IoT Authentication Key Management Algorithm to Personnel Information Management
title Application of IoT Authentication Key Management Algorithm to Personnel Information Management
title_full Application of IoT Authentication Key Management Algorithm to Personnel Information Management
title_fullStr Application of IoT Authentication Key Management Algorithm to Personnel Information Management
title_full_unstemmed Application of IoT Authentication Key Management Algorithm to Personnel Information Management
title_short Application of IoT Authentication Key Management Algorithm to Personnel Information Management
title_sort application of iot authentication key management algorithm to personnel information management
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050305/
https://www.ncbi.nlm.nih.gov/pubmed/35498183
http://dx.doi.org/10.1155/2022/4584072
work_keys_str_mv AT wangqing applicationofiotauthenticationkeymanagementalgorithmtopersonnelinformationmanagement
AT lihaoran applicationofiotauthenticationkeymanagementalgorithmtopersonnelinformationmanagement