Netinfo Security ›› 2024, Vol. 24 ›› Issue (7): 1006-1014.doi: 10.3969/j.issn.1671-1122.2024.07.003

Previous Articles     Next Articles

Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9

HUANG Wangwang1, ZHOU Hua1(), WANG Daiqiang1,2, ZHAO Qi2   

  1. 1. School of Big Data and Information Engineering, Guizhou University, Guiyang 550025, China
    2. College of Mechanical and Electronic Engineering, Guizhou Minzu University, Guiyang 550025, China
  • Received:2024-05-11 Online:2024-07-10 Published:2024-08-02

Abstract:

To enhance the security and reliability of communication protocols and improve user privacy, a secure authentication protocol for IoT was designed based on the national cryptographic SM9. This protocol aimed to ensure both data source security and data transmission security. Using only point doubling, point addition, and Hash operations, the protocol achieved the encapsulation and reconstruction of shared keys. Additionally, it integrated pseudo one-time-one-key and one-time-one-identity mechanisms to enhance the security and efficiency of key transmission. The protocol guaranteed the security of ciphertext data transmission and identity authentication. The proposed scheme has been formally verified through ProVerif to satisfy nine critical security properties. Compared to other protocols, it incurs lower computational and communication overheads, making it highly suitable for resource-constrained industrial IoT devices.

Key words: SM9, identity authentication, key encapsulation, key reconstruction

CLC Number: