吉林大学学报(理学版) ›› 2024, Vol. 62 ›› Issue (3): 636-642.

• • 上一篇    下一篇

蜂窝物联网匿名访问用户身份认证算法

郭文俊   

  1. 山西大同大学 计算机与网络工程学院, 山西 大同 037009
  • 收稿日期:2023-08-30 出版日期:2024-05-26 发布日期:2024-05-26
  • 通讯作者: 郭文俊 E-mail:sxdtdxgwj@126.com

Anonymous Access User Identity Authentication Algorithm for Cellular Internet of Things

GUO Wenjun   

  1. School of Computer and Network Engineering, Shanxi Datong University, Datong 037009, Shanxi Province, China
  • Received:2023-08-30 Online:2024-05-26 Published:2024-05-26

摘要: 针对蜂窝物联网涉及大规模设备的连接和身份认证管理, 且攻击者会使用各种方法伪造身份信息, 使得匿名访问用户身份认证难度增大的问题, 提出一种蜂窝物联网匿名访问用户身份认证算法. 首先, 以5G网络为蜂窝物联网系统的动态应用场景, 预置系统参数; 其次, 根据用户的身份标识号和公钥, 利用伪造名称生成用户的匿名访问信息, 注册匿名存至本地; 最后, 基于去中心化理念, 对比单元公钥与邻单元群密钥、 随机数加密信息与单元Hash值的解密结果, 认证用户身份. 实验结果表明, 该算法有效缩短了身份认证与批量消息验证所需时间, 减少了数据传输所需字节数, 时间开销仅为13 ms, 计算开销仅为4 ms, 通信开销仅为210字节, 且能成功抵御15种身份认证攻击类型.

关键词: 蜂窝物联网, 5G网络, 匿名访问, 身份认证, 椭圆曲线加密, Hash函数

Abstract: Aiming at the problem that the cellular Internet of Things involved large-scale device connection and identity authentication management, and attackers cuold use various methods  to forge identity information, which made the difficulty of  anonymous access  user identity authentication increase, the author proposed  an  anonymous access user identity authentication algorithm for cellular Internet of Things. Firstly, the 5G network was used as the dynamic application scenario of the cellular Internet of Things system, and the system parameters were preseted. Secondly, according to the user’s identification number and public key, the forged name was used to generate the user’s anonymous access information, and the registration was anonymously saved to the local. Finally, based on the concept of decentralization, the decryption results of the unit public key and the adjacent group key, the random number encryption information and the unit Hash value were compared to authenticate the user identity. The experimental results show that the proposed algorithm effectively shortens the time required for identity authentication and batch message authentication, reduces the number of bytes required for data transmission, with a time cost of only 13 ms, a computational cost of only 4 ms,  and a communication cost of only 210 bytes. Moreover, it can successfully resist 15 types of identity authentication attacks.

Key words: cellular Internet of Things, 5G network, anonymous access, identity authentication, elliptic curve encryption, Hash function

中图分类号: 

  • TP393