I. Introduction
With the development of the IoT (Internet of Things) and 5G technology, the era of interconnectedness is coming. It predicts that networking equipment will reach 25 billion in 2020 and continue to grow. Large-scale IoT can bring much convenience in life, but it also puts forward higher safety requirements at the same time. Traditional PKI (Public Key Infrastructure) authentication mechanism does not fit for this massive equipment authentication, otherwise it will lead to extremely complex CA (Certificate Authority) Certificate management problem. Once received requests over the network exceed resources capacity, it is easy to cause the network collapse.