Security protection method based on mimic defense and Paillier encryption for smart IoT terminals

Smart internet of things (IoT), with its high flexibility, adaptability, and continuous evolution, brings both new challenges and enhanced user experiences. In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unk...

Full description

Saved in:
Bibliographic Details
Main Authors: GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024088
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Smart internet of things (IoT), with its high flexibility, adaptability, and continuous evolution, brings both new challenges and enhanced user experiences. In particular, the endogenous security and secure transmission issues faced by IoT edge-area smart terminals, due to uncertain threats like unknown vulnerabilities and backdoors, are of considerable concern in the realm of smart IoT. To address these challenges, a security protection method based on mimic defense and Paillier encryption for smart IoT terminals was proposed. First, a security architecture was constructed based on the mimic defense theory to ensure the reliability and robustness of the system even when the edge domain smart terminal had its own security genetic defects. Then, a secure blind signature with Paillier encryption (SBSPE) algorithm was designed in this architecture to safeguard the data and privacy of the edge-area smart terminals throughout the data processing lifecycle of edge-area smart terminals. Blind signature technology was integrated into SBSPE algorithm on the basis of Paillier semi-homomorphic encryption algorithm. During data encryption, it employed blind factor technology to execute a blind signature, rendering ciphertext information indecipherable even if an attacker obtained access to the decryption key of the Paillier encryption algorithm. It also effectively supported the efficient and reliable transmission of data of the intelligent IoT devices. Finally, taking the mimic smart IoT system as an application scenario, the proposed method was theoretically analyzed and experimentally validated for its improved performance and security.
ISSN:2096-109X