Cargando…
Internet of Things Device Identification Algorithm considering User Privacy
The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology is undoubtedly one of the most popular methods to...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9061015/ https://www.ncbi.nlm.nih.gov/pubmed/35510052 http://dx.doi.org/10.1155/2022/6173185 |
_version_ | 1784698633794355200 |
---|---|
author | Wang, Lin |
author_facet | Wang, Lin |
author_sort | Wang, Lin |
collection | PubMed |
description | The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology is undoubtedly one of the most popular methods today. It is replacing the traditional contact IC card and becoming a new trend of smart cards. At the same time, a large amount of data is generated in the IoT environment. A lot of data involve user privacy, and users do not have good control over these data. Collecting and utilizing these data on the basis of protecting user privacy have become an important problem to be solved urgently. With the implementation of the strategy of rejuvenating the country through science and education, major colleges and universities are developing rapidly through enrollment and expansion, which also brings inconvenience to campus security management. Although the traditional campus all-in-one card system can guarantee the security identity of people entering and leaving, it does not reasonably integrate and utilize this information, resulting in waste of information resources and, to a certain extent, the problem of user privacy leakage. To solve the above problems, a new system was developed to integrate resources to identify users. To protect the privacy data of Internet of Things users, a specific solution using blockchain technology is proposed; for the identity authentication problem of Internet of Things users, the identity authentication based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain. The identity authentication method solves the contradiction between anonymity and traceability in blockchain application scenarios. The simulation results show that the system not only considers user privacy but also has extremely important practical significance for the promotion of Internet of Things and RF applications. |
format | Online Article Text |
id | pubmed-9061015 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-90610152022-05-03 Internet of Things Device Identification Algorithm considering User Privacy Wang, Lin Comput Intell Neurosci Research Article The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology is undoubtedly one of the most popular methods today. It is replacing the traditional contact IC card and becoming a new trend of smart cards. At the same time, a large amount of data is generated in the IoT environment. A lot of data involve user privacy, and users do not have good control over these data. Collecting and utilizing these data on the basis of protecting user privacy have become an important problem to be solved urgently. With the implementation of the strategy of rejuvenating the country through science and education, major colleges and universities are developing rapidly through enrollment and expansion, which also brings inconvenience to campus security management. Although the traditional campus all-in-one card system can guarantee the security identity of people entering and leaving, it does not reasonably integrate and utilize this information, resulting in waste of information resources and, to a certain extent, the problem of user privacy leakage. To solve the above problems, a new system was developed to integrate resources to identify users. To protect the privacy data of Internet of Things users, a specific solution using blockchain technology is proposed; for the identity authentication problem of Internet of Things users, the identity authentication based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain. The identity authentication method solves the contradiction between anonymity and traceability in blockchain application scenarios. The simulation results show that the system not only considers user privacy but also has extremely important practical significance for the promotion of Internet of Things and RF applications. Hindawi 2022-04-25 /pmc/articles/PMC9061015/ /pubmed/35510052 http://dx.doi.org/10.1155/2022/6173185 Text en Copyright © 2022 Lin Wang. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Wang, Lin Internet of Things Device Identification Algorithm considering User Privacy |
title | Internet of Things Device Identification Algorithm considering User Privacy |
title_full | Internet of Things Device Identification Algorithm considering User Privacy |
title_fullStr | Internet of Things Device Identification Algorithm considering User Privacy |
title_full_unstemmed | Internet of Things Device Identification Algorithm considering User Privacy |
title_short | Internet of Things Device Identification Algorithm considering User Privacy |
title_sort | internet of things device identification algorithm considering user privacy |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9061015/ https://www.ncbi.nlm.nih.gov/pubmed/35510052 http://dx.doi.org/10.1155/2022/6173185 |
work_keys_str_mv | AT wanglin internetofthingsdeviceidentificationalgorithmconsideringuserprivacy |