Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3661638.3661716acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaisnsConference Proceedingsconference-collections
research-article

Research on Authentication Method for Interface Access Security of Communication Equipment in High Coverage Internet of Things

Published: 01 June 2024 Publication History

Abstract

The conventional authentication method of communication interface access security is mainly based on node restriction, which makes the sensing node enter the dormant state, and the interface access resources are also restricted, which affects the final authentication effect. Therefore, an authentication method for interface access security of high coverage Internet of Things communication equipment is designed. Authenticate the physical layer messages accessed by the communication equipment interface of the Internet of Things with high coverage, confirm the authenticity and integrity of the information source accessed by the communication equipment interface, and provide the security mechanism of the message authentication code, so as to meet the communication reliability requirements of the Internet of Things. Establish the security authentication protocol for Internet of Things communication equipment interface access, establish the trust relationship between domains in Internet of Things communication equipment interface access, and increase the bottom authentication and key protocol for accessing foreign domain resources, so as to meet the security requirements of interface access. The simulation results show that this method is more secure and can be applied to real life.

References

[1]
Jia, W., Diwakar, G., Kata, N., Kern, D., & Milner, T. (2021). 516 Quantitation of blue light irradiation dose emitted by electronic communication devices and its potential impact on human skin. Journal of Investigative Dermatology, 141(5), S90.
[2]
Reich, C. M., LaCaille, L. J., Axford, K. E., & Slaughter, N. R. (2022). Empathic communication skills across applied undergraduate psychology courses: A replication study. Teaching of Psychology, 49(1), 49-56.
[3]
McMillan, M., Muir, A., & Donlon, C. (2021). Brief communication: Ice sheet elevation measurements from the Sentinel-3A and Sentinel-3B tandem phase. The Cryosphere, 15(7), 3129-3134.
[4]
Nyathi, D. (2020). Dynamics of Parent-Adolescent Communication on Sexual and Reproductive Health in Sub-Sahara: A Focus on Barriers and Policy Implications. Online Journal of Health and Allied Sciences, 19(3).
[5]
Tcholtchev, N., & Schieferdecker, I. (2021). Sustainable and reliable information and communication technology for resilient smart cities. Smart Cities, 4(1), 156-176.
[6]
Modares, A., Kazemi, M., Emroozi, V. B., & Roozkhosh, P. (2023). A new supply chain design to solve supplier selection based on internet of things and delivery reliability. Journal of Industrial and Management Optimization, 19(11), 7993-8028.
[7]
Wu, X., Yang, C., Han, W., & Pan, Z. (2022). Integrated design of solar photovoltaic power generation technology and building construction based on the Internet of Things. Alexandria Engineering Journal, 61(4), 2775-2786.
[8]
Al Tahtawi, A. R., Andika, E., & Harjanto, W. N. (2021). Portable wireless node design for smart agricultural system based on Internet of Things. IAES International Journal of Robotics and Automation, 10(1), 1.
[9]
Wei, Y., Gan, P., Chen, L., Huang, G., Meng, D., Huang, Q., & Jiang, T. (2021, May). Discovering internet of things (iot) applications for health monitoring during the outbreak of infectious disease. In Journal of Physics: Conference Series (Vol. 1930, No. 1, p. 012004). IOP Publishing.
[10]
Deng, X. (2021). Multiconstraint fuzzy prediction analysis improved the algorithm in internet of things. Wireless Communications and Mobile Computing, 2021, 1-7.
[11]
Nazir, A., Sholla, S., & Bashir, A. (2021). An ontology based approach for context-aware security in the internet of things (IoT). International Journal of Wireless and Microwave Technologies (IJWMT), 11(1), 28-46.
[12]
Rosa, L., Silva, F., & Analide, C. (2021). Mobile networks and Internet of Things infrastructures to characterize smart human mobility. Smart Cities, 4(2), 894-918.
[13]
Ding, T., Li, J., Pan, J., & Guo, D. (2021). Human remote mobile medical information collection method based on internet of things and intelligent algorithm. Revista Brasileira de Medicina do Esporte, 27, 28-30.
[14]
Zhu, J. (2021). Internet of things enabled intelligent energy management and control system for heavy equipment industrial park and fuzzy assessment of its schemes. Energy Engineering, 118(2), 379-397.
[15]
Liang, X., Sun, D., & Li, W. (2021). Composition Form and Function Configuration of Intelligent Terminal Based on Edge Computing for Power Internet of Things. In IOP Conference Series: Earth and Environmental Science (Vol. 621, No. 1, p. 012058). IOP Publishing.
[16]
Bonanni, M., Chiti, F., Fantacci, R., & Pierucci, L. (2021). Dynamic control architecture based on software defined networking for the internet of things. Future Internet, 13(5), 113.
[17]
Hamdani, S. W. A., Khan, A. W., Iltaf, N., Bangash, J. I., Bangash, Y. A., & Khan, A. (2021). Dynamic distributed trust management scheme for the Internet of Things. Turkish Journal of Electrical Engineering and Computer Sciences, 29(2), 796-815.
[18]
Setiaji, T., Budiyanto, C., & Yuana, R. A. (2021, March). The contribution of the Internet of Things and smart systems to agricultural practices: A survey. In IOP Conference Series: Materials Science and Engineering (Vol. 1098, No. 5, p. 052100). IOP Publishing.
[19]
Ghosh, A., Liaquat, S., & Ahmed, S. (2020). Healthcare-internet of things (H-IoT) can assist and address emerging challenges in healthcare. Int J Sci Innov Res, 1, 2725-3338.
[20]
Chen, J., Gong, B., Wang, Y., & Zhang, Y. (2021). Construction of Internet of things trusted group based on multidimensional attribute trust model. International Journal of Distributed Sensor Networks, 17(1), 1550147721989888.
[21]
Zhang, H., Ge, D., Yang, N., Jia, P., Li, L., & Yang, Y. (2021). Study on Internet of things architecture of substation online monitoring equipment. In MATEC Web of Conferences (Vol. 336, p. 05024). EDP Sciences.
[22]
Zou, J., & Chen, Y. (2021, February). Research on Intelligent Management of Municipal Solid Waste Emergency Supply Chain Based on Computer EPC Internet of Things System Environment. In Journal of Physics: Conference Series (Vol. 1744, No. 2, p. 022044). IOP Publishing.
[23]
Samy, M. M., Anis, W. R., Abdel-Hafez, A. A., & Eldemerdash, H. D. (2021). An Optimized Protocol of M2M Authentication for Internet of Things (IoT). International Journal of Computer Network & Information Security, 13(2).
[24]
N.Hemakumari., S.Bismillah Khan & Dr.C.Priya Dr.M.Vidhyalakshmi., H.Peer oli.(2021). Internet of Things (IoT) Based Smart Plant Monitoring System.International Journal for Modern Trends in Science and Technology, 7(5):144-146.
[25]
Wei L M, Zhu H K .(2023). Simulation of Active Defense Against Internet of Things Attacks Based on Weak Point Analysis. Computer Simulation, 40(2):438-442.

Index Terms

  1. Research on Authentication Method for Interface Access Security of Communication Equipment in High Coverage Internet of Things

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AISNS '23: Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security
    December 2023
    467 pages
    ISBN:9798400716966
    DOI:10.1145/3661638
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AISNS 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 7
      Total Downloads
    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 23 Nov 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media