Xiaoyu Du, Changtao Zhang, Zhijie Han, Guanying Zhou
{"title":"基于BFP的智能家居安全认证方案","authors":"Xiaoyu Du, Changtao Zhang, Zhijie Han, Guanying Zhou","doi":"10.1145/3598438.3598451","DOIUrl":null,"url":null,"abstract":"With the application of Internet of things technology, smart home is gradually changing people's lifestyle. However, IoT devices are vulnerable to attacks that leak user privacy, it leads to some security issues. In this paper, a BFP authentication scheme combining fog computing and blockchain technology is proposed, and the Paillier encryption algorithm is used to generate the key, which ensures the security and privacy of data. Finally, we compare the encryption and decryption efficiency of Paillier and RSA encryption algorithms, and evaluate and analyze them from several aspects. The results show that the proposed scheme has superior performance in terms of security, and the computational overheads of key execution is less than the traditional scheme. Under the premise of ensuring data security, the proposed scheme can effectively improve the execution efficiency of IoT devices.","PeriodicalId":338722,"journal":{"name":"Proceedings of the 2022 3rd International Symposium on Big Data and Artificial Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security authentication scheme of smart home based on BFP\",\"authors\":\"Xiaoyu Du, Changtao Zhang, Zhijie Han, Guanying Zhou\",\"doi\":\"10.1145/3598438.3598451\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the application of Internet of things technology, smart home is gradually changing people's lifestyle. However, IoT devices are vulnerable to attacks that leak user privacy, it leads to some security issues. In this paper, a BFP authentication scheme combining fog computing and blockchain technology is proposed, and the Paillier encryption algorithm is used to generate the key, which ensures the security and privacy of data. Finally, we compare the encryption and decryption efficiency of Paillier and RSA encryption algorithms, and evaluate and analyze them from several aspects. The results show that the proposed scheme has superior performance in terms of security, and the computational overheads of key execution is less than the traditional scheme. Under the premise of ensuring data security, the proposed scheme can effectively improve the execution efficiency of IoT devices.\",\"PeriodicalId\":338722,\"journal\":{\"name\":\"Proceedings of the 2022 3rd International Symposium on Big Data and Artificial Intelligence\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2022 3rd International Symposium on Big Data and Artificial Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3598438.3598451\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 3rd International Symposium on Big Data and Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3598438.3598451","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security authentication scheme of smart home based on BFP
With the application of Internet of things technology, smart home is gradually changing people's lifestyle. However, IoT devices are vulnerable to attacks that leak user privacy, it leads to some security issues. In this paper, a BFP authentication scheme combining fog computing and blockchain technology is proposed, and the Paillier encryption algorithm is used to generate the key, which ensures the security and privacy of data. Finally, we compare the encryption and decryption efficiency of Paillier and RSA encryption algorithms, and evaluate and analyze them from several aspects. The results show that the proposed scheme has superior performance in terms of security, and the computational overheads of key execution is less than the traditional scheme. Under the premise of ensuring data security, the proposed scheme can effectively improve the execution efficiency of IoT devices.