| There are a large number of sensing devices in the agricultural Internet of Things,which have limited resources such as memory,storage,and CPU,and their security performance is generally lower than that of traditional servers or ordinary user client devices.There are basic simple authentication methods and key management in agricultural Io T devices,but key leakage problems are prone to occur.Therefore,it is necessary to study lightweight identity authentication and key negotiation algorithms with high security performance and low resource consumption.To solve the security problem of data leakage in the authentication process of agricultural Io T devices,this thesis proposes a two-way identity authentication strategy assisted by cloud servers by Elliptic Curve Cryptography,Advanced Encrypted Standard and Hash,which specifically completes the following work:1.A network architecture suitable for device identity authentication in the agricultural Internet of Things environment is proposed.Integrating sensor technology and communication technology,sensors can accurately collect agricultural data.2.A lightweight identity authentication strategy using Elliptic Curve Cryptography,Advanced Encrypted Standard and Hash is proposed.The protocol is completed with the assistance of a cloud-assisted authentication server,which shares the resource consumption of the device.3.The security performance analysis of the policy was carried out.The classic Dolev-Yao model was used for resistance analysis,and the AVISPA tool was used to simulate the safety performance of the strategy.Using comparative analysis,it is analyzed that the research results of this strategy and others not only ensure security performance,but also have lower computing costs and communication costs.4.The research results were deployed in the field at Shudao Farm in Zhangjiakou City.Finally,the two-way identity authentication and key negotiation between the agricultural Io T intelligent gateway and the computer client were completed.Through various tests and simulations,the following conclusions are finally concluded: in Cloud-assisted Mutual Authentication Policies,the computing overhead of agricultural Io T gateway nodes and computer clients is similar,accounting for about 17.2% of the total computing overhead,and the computing overhead of cloud-assisted authentication server is the largest,accounting for about 65.7% of the total system resources.Compared with the previous username-password-based authentication scheme,computing consumes less resources under the condition of ensuring the same communication and construction costs.Realize the lightweight of identity authentication strategy. |