In the field of IoT terminal security authentication, the security boundaries set by the cluster architecture network are not fixed data, so in the process of IoT applications, users can easily disclose their own data information, user data storage is poor. On the other hand, the modern Internet of Things mobile device computing power is weak, the battery life is very poor, a single authentication factor is difficult to ensure the security of IoT terminal authentication and data privacy protection needs
正在翻译中..