These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
Pubmed for Handhelds
PUBMED FOR HANDHELDS
Search MEDLINE/PubMed
Title: Internet of Things Device Identification Algorithm considering User Privacy. Author: Wang L. Journal: Comput Intell Neurosci; 2022; 2022():6173185. PubMed ID: 35510052. Abstract: The Internet of Things has become the third wave of the information industry and cloud computing, big data, and Internet technologies. Among the many identification technologies used in the Internet of Things, radiofrequency identification technology is undoubtedly one of the most popular methods today. It is replacing the traditional contact IC card and becoming a new trend of smart cards. At the same time, a large amount of data is generated in the IoT environment. A lot of data involve user privacy, and users do not have good control over these data. Collecting and utilizing these data on the basis of protecting user privacy have become an important problem to be solved urgently. With the implementation of the strategy of rejuvenating the country through science and education, major colleges and universities are developing rapidly through enrollment and expansion, which also brings inconvenience to campus security management. Although the traditional campus all-in-one card system can guarantee the security identity of people entering and leaving, it does not reasonably integrate and utilize this information, resulting in waste of information resources and, to a certain extent, the problem of user privacy leakage. To solve the above problems, a new system was developed to integrate resources to identify users. To protect the privacy data of Internet of Things users, a specific solution using blockchain technology is proposed; for the identity authentication problem of Internet of Things users, the identity authentication based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain. The identity authentication method solves the contradiction between anonymity and traceability in blockchain application scenarios. The simulation results show that the system not only considers user privacy but also has extremely important practical significance for the promotion of Internet of Things and RF applications.[Abstract] [Full Text] [Related] [New Search]