Design and analysis of secure communication protocol in the internet of things environment
Abstract With the popularization and development of the Internet of Things, the issue of secure communication of Internet of Things devices receives increasing attention. However, Internet of Things devices often have characteristics such as limited resources and widespread distribution, which poses...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2025-07-01
|
| Series: | Discover Internet of Things |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s43926-025-00187-5 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Abstract With the popularization and development of the Internet of Things, the issue of secure communication of Internet of Things devices receives increasing attention. However, Internet of Things devices often have characteristics such as limited resources and widespread distribution, which poses challenges to the design and implementation of secure communication protocols. Therefore, research is conducted on device authentication and key negotiation based on physical fingerprints and audio signals, and a secure communication protocol suitable for the Internet of Things environment is proposed. The experimental results show that in terms of protocol detection rate, when the density threshold is 10, the detection rate of device to device secure communication protocol is 85%. When the density threshold is 90, the detection rate is 97%. In terms of false detection rate, when the density threshold is 0, the false detection rate of device to device secure communication protocol is 1%. When the density threshold is 90, the false detection rate is 6%. Research findings demonstrate that the newly proposed device-to-device secure communication protocol surpasses conventional secure communication protocols with regard to both detection rate and false detection rate. It not only offers robust resistance against hacker intrusions but also sustains a high level of recognition accuracy across diverse noisy environments. The proposal of this protocol provides new ideas and methods for the design and optimization of future IoT secure communication protocols. |
|---|---|
| ISSN: | 2730-7239 |