Next Article in Journal
A Non-Linear Autoregressive Model for Indoor Air-Temperature Predictions in Smart Buildings
Next Article in Special Issue
Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification
Previous Article in Journal
Investigation of Induced Charge Mechanism on a Rod Electrode
Previous Article in Special Issue
Ransomware Detection System for Android Applications
Open AccessArticle

Multi-Point Collaborative Authentication Method Based on User Image Intelligent Collection in the Internet of Things

by Yunfa Li 1,*, Yifei Tu 1 and Jiawa Lu 2
Key Laboratory of Complex Systems Modeling and Simulation, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
Department of Mechanical, Materials and Manufacturing Engineering, Faculty of Science and Engineering, University of Nottingham Ningbo China, Ningbo 315100, China
Author to whom correspondence should be addressed.
Electronics 2019, 8(9), 978;
Received: 26 July 2019 / Revised: 23 August 2019 / Accepted: 28 August 2019 / Published: 2 September 2019
(This article belongs to the Special Issue State-of-the-Art of Cyber Security)
With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information. View Full-Text
Keywords: Internet of Things; identity authentication; collaborative authentication; security Internet of Things; identity authentication; collaborative authentication; security
Show Figures

Figure 1

MDPI and ACS Style

Li, Y.; Tu, Y.; Lu, J. Multi-Point Collaborative Authentication Method Based on User Image Intelligent Collection in the Internet of Things. Electronics 2019, 8, 978.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop