信息网络安全 ›› 2025, Vol. 25 ›› Issue (7): 1032-1043.doi: 10.3969/j.issn.1671-1122.2025.07.003

• 理论研究 • 上一篇    下一篇

简洁低交互的物联网设备认证协议研究

王梅1,2(), 杨潇然2, 李增鹏1,2   

  1. 1.泉城实验室,济南 250103
    2.山东大学网络空间安全学院,青岛 266237
  • 收稿日期:2024-12-13 出版日期:2025-07-10 发布日期:2025-08-07
  • 通讯作者: 王梅 E-mail:wangmeiz@sdu.edu.cn
  • 作者简介:王梅(1990—),女,山东,助理研究员,博士,CCF会员,主要研究方向为隐私增强计算与安全认证|杨潇然(2001—),女,山东,硕士研究生,主要研究方向为安全认证及其应用|李增鹏(1989—),男,山东,副研究员,博士,CCF会员,主要研究方向为同态加密与安全多方计算
  • 基金资助:
    国家自然科学基金(62472255);国家自然科学基金(62302271);山东省高等学校青创科技支持计划(2024KJH79);山东省自然科学基金(ZR2023MF045);山东省自然科学基金(ZR2023QF088);青岛市自然科学基金(23-2-1-152-zyyd-jch)

Research on Simple and Low Interaction Authentication Protocols for IoT Devices

WANG Mei1,2(), YANG Xiaoran2, LI Zengpeng1,2   

  1. 1. Quan Cheng Laboratory, Jinan 250103, China
    2. School of Cyber Science and Technology, Shandong University, Qingdao 266237, China
  • Received:2024-12-13 Online:2025-07-10 Published:2025-08-07
  • Contact: WANG Mei E-mail:wangmeiz@sdu.edu.cn

摘要:

针对物联网设备间认证和加密通信效率及安全性的问题,在物联网技术成熟和应用普及的背景下,文章设计并实现了一种简洁低交互的物联网设备认证协议。该协议的设计包括设备信任绑定过程和设备密钥协商过程。信任绑定过程通过交换云服务器认证的身份标识公钥来验证通信对方的身份,确保身份标识公钥的安全存储。为保障安全性,认证过程中采用对称加密传输双方的身份标识公钥,其密钥通过不经意伪随机函数计算确定。密钥协商过程则基于HMQV协议协商,后续用于安全通信的会话密钥。与华为设备互联认证协议相比,该协议的交互次数减少。实验结果表明,其计算和通信开销更低,效率更高。

关键词: 物联网, 设备互联, 不经意伪随机函数, 认证与密钥协商

Abstract:

In the context of the maturity and widespread application of Internet of Things (IoT) technology, this paper designed and implemented a simple, low-interaction IoT device interconnection authentication protocol to address the issues of authentication and encrypted communication efficiency and security among IoT devices. The design of this protocol included a device trust binding process and a device key negotiation process. The trust binding process involved the exchange of identity identification public keys authenticated by a cloud server to verify the identity of the communication counterpart and ensure the secure storage of identity identification public keys. To ensure security, the authentication process employed symmetric encryption to transmit both parties’ identity identification public keys, with the key determined by a oblivious pseudorandom function. The key negotiation process was based on the HMQV (Hashed Menezes-Qu-Vanstone) protocol, which was used to negotiate a session key for secure communication. Compared to the Huawei device interconnection authentication protocol, the proposed protocol reduces the number of interactions, and experimental results demonstrate that it has lower computational and communication overhead, resulting in higher efficiency.

Key words: IoT, device interconnection, oblivious pseudorandom function, authentication and key agreement

中图分类号: