Table 1.
Symbols and descriptions.
Fig 1.
The overall identity authentication flowchart based on FAST-SM9 algorithm and zero-trust-DRA mechanism.
Fig 2.
FMM and multi-layer security strategy diagram.
Fig 3.
Key negotiation and session establishment diagram.
Fig 4.
Display diagram of KEM + DEM session message processing mechanism.
Fig 5.
Continuous message window authentication diagram.
Table 2.
Comparison table of authentication delay.
Table 3.
Comparison table of authentication delay.
Table 4.
Comparison table of efficiency and safety.
Fig 6.
The AVISPA model diagram.
Fig 7.
The simulation results of this method under OFMC and CL-AtSe conditions in AVISPA environment.
Fig 8.
Comparison and analysis of various methods of security.
Table 5.
Comparison of total communication costs.
Fig 9.
Comparison chart of communication overhead for various protocols.