Netinfo Security ›› 2025, Vol. 25 ›› Issue (7): 1032-1043.doi: 10.3969/j.issn.1671-1122.2025.07.003

Previous Articles     Next Articles

Research on Simple and Low Interaction Authentication Protocols for IoT Devices

WANG Mei1,2(), YANG Xiaoran2, LI Zengpeng1,2   

  1. 1. Quan Cheng Laboratory, Jinan 250103, China
    2. School of Cyber Science and Technology, Shandong University, Qingdao 266237, China
  • Received:2024-12-13 Online:2025-07-10 Published:2025-08-07
  • Contact: WANG Mei E-mail:wangmeiz@sdu.edu.cn

Abstract:

In the context of the maturity and widespread application of Internet of Things (IoT) technology, this paper designed and implemented a simple, low-interaction IoT device interconnection authentication protocol to address the issues of authentication and encrypted communication efficiency and security among IoT devices. The design of this protocol included a device trust binding process and a device key negotiation process. The trust binding process involved the exchange of identity identification public keys authenticated by a cloud server to verify the identity of the communication counterpart and ensure the secure storage of identity identification public keys. To ensure security, the authentication process employed symmetric encryption to transmit both parties’ identity identification public keys, with the key determined by a oblivious pseudorandom function. The key negotiation process was based on the HMQV (Hashed Menezes-Qu-Vanstone) protocol, which was used to negotiate a session key for secure communication. Compared to the Huawei device interconnection authentication protocol, the proposed protocol reduces the number of interactions, and experimental results demonstrate that it has lower computational and communication overhead, resulting in higher efficiency.

Key words: IoT, device interconnection, oblivious pseudorandom function, authentication and key agreement

CLC Number: