Journal of Jilin University Science Edition ›› 2024, Vol. 62 ›› Issue (3): 636-642.

Previous Articles     Next Articles

Anonymous Access User Identity Authentication Algorithm for Cellular Internet of Things

GUO Wenjun   

  1. School of Computer and Network Engineering, Shanxi Datong University, Datong 037009, Shanxi Province, China
  • Received:2023-08-30 Online:2024-05-26 Published:2024-05-26

Abstract: Aiming at the problem that the cellular Internet of Things involved large-scale device connection and identity authentication management, and attackers cuold use various methods  to forge identity information, which made the difficulty of  anonymous access  user identity authentication increase, the author proposed  an  anonymous access user identity authentication algorithm for cellular Internet of Things. Firstly, the 5G network was used as the dynamic application scenario of the cellular Internet of Things system, and the system parameters were preseted. Secondly, according to the user’s identification number and public key, the forged name was used to generate the user’s anonymous access information, and the registration was anonymously saved to the local. Finally, based on the concept of decentralization, the decryption results of the unit public key and the adjacent group key, the random number encryption information and the unit Hash value were compared to authenticate the user identity. The experimental results show that the proposed algorithm effectively shortens the time required for identity authentication and batch message authentication, reduces the number of bytes required for data transmission, with a time cost of only 13 ms, a computational cost of only 4 ms,  and a communication cost of only 210 bytes. Moreover, it can successfully resist 15 types of identity authentication attacks.

Key words: cellular Internet of Things, 5G network, anonymous access, identity authentication, elliptic curve encryption, Hash function

CLC Number: 

  • TP393