Cargando…

Internet of Things Device Identification Algorithm considering User Privacy

The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology is undoubtedly one of the most popular methods to...

Descripción completa

Detalles Bibliográficos
Autor principal: Wang, Lin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9061015/
https://www.ncbi.nlm.nih.gov/pubmed/35510052
http://dx.doi.org/10.1155/2022/6173185
_version_ 1784698633794355200
author Wang, Lin
author_facet Wang, Lin
author_sort Wang, Lin
collection PubMed
description The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology is undoubtedly one of the most popular methods today. It is replacing the traditional contact IC card and becoming a new trend of smart cards. At the same time, a large amount of data is generated in the IoT environment. A lot of data involve user privacy, and users do not have good control over these data. Collecting and utilizing these data on the basis of protecting user privacy have become an important problem to be solved urgently. With the implementation of the strategy of rejuvenating the country through science and education, major colleges and universities are developing rapidly through enrollment and expansion, which also brings inconvenience to campus security management. Although the traditional campus all-in-one card system can guarantee the security identity of people entering and leaving, it does not reasonably integrate and utilize this information, resulting in waste of information resources and, to a certain extent, the problem of user privacy leakage. To solve the above problems, a new system was developed to integrate resources to identify users. To protect the privacy data of Internet of Things users, a specific solution using blockchain technology is proposed; for the identity authentication problem of Internet of Things users, the identity authentication based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain. The identity authentication method solves the contradiction between anonymity and traceability in blockchain application scenarios. The simulation results show that the system not only considers user privacy but also has extremely important practical significance for the promotion of Internet of Things and RF applications.
format Online
Article
Text
id pubmed-9061015
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-90610152022-05-03 Internet of Things Device Identification Algorithm considering User Privacy Wang, Lin Comput Intell Neurosci Research Article The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology is undoubtedly one of the most popular methods today. It is replacing the traditional contact IC card and becoming a new trend of smart cards. At the same time, a large amount of data is generated in the IoT environment. A lot of data involve user privacy, and users do not have good control over these data. Collecting and utilizing these data on the basis of protecting user privacy have become an important problem to be solved urgently. With the implementation of the strategy of rejuvenating the country through science and education, major colleges and universities are developing rapidly through enrollment and expansion, which also brings inconvenience to campus security management. Although the traditional campus all-in-one card system can guarantee the security identity of people entering and leaving, it does not reasonably integrate and utilize this information, resulting in waste of information resources and, to a certain extent, the problem of user privacy leakage. To solve the above problems, a new system was developed to integrate resources to identify users. To protect the privacy data of Internet of Things users, a specific solution using blockchain technology is proposed; for the identity authentication problem of Internet of Things users, the identity authentication based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain. The identity authentication method solves the contradiction between anonymity and traceability in blockchain application scenarios. The simulation results show that the system not only considers user privacy but also has extremely important practical significance for the promotion of Internet of Things and RF applications. Hindawi 2022-04-25 /pmc/articles/PMC9061015/ /pubmed/35510052 http://dx.doi.org/10.1155/2022/6173185 Text en Copyright © 2022 Lin Wang. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Wang, Lin
Internet of Things Device Identification Algorithm considering User Privacy
title Internet of Things Device Identification Algorithm considering User Privacy
title_full Internet of Things Device Identification Algorithm considering User Privacy
title_fullStr Internet of Things Device Identification Algorithm considering User Privacy
title_full_unstemmed Internet of Things Device Identification Algorithm considering User Privacy
title_short Internet of Things Device Identification Algorithm considering User Privacy
title_sort internet of things device identification algorithm considering user privacy
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9061015/
https://www.ncbi.nlm.nih.gov/pubmed/35510052
http://dx.doi.org/10.1155/2022/6173185
work_keys_str_mv AT wanglin internetofthingsdeviceidentificationalgorithmconsideringuserprivacy