Telecommunications Science ›› 2016, Vol. 32 ›› Issue (6): 136-142.doi: 10.11959/j.issn.1000-0801.2016116

• research and development • Previous Articles     Next Articles

Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT

Jie ZHAO1,Huarong ZHANG2   

  1. 1 Department of Mathematics and Information Technology,Jiangsu Second Normal College,Nanjing 210013,China
    2 Department of Science and Technology,Nanjing Normal University,Nanjing 210023,China
  • Online:2016-06-20 Published:2016-07-20
  • Supported by:
    The National Natural Science Foundation of China;The Foundation of“12th Five-Year”in Jiangsu Second Normal College

Abstract:

For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.

Key words: internet of things, terminal device, identity authentication, elliptic curve cryptography, cookie information

No Suggested Reading articles found!