I. Introduction
In recent years, with the rapid development of the Internet of Things (IoT) technology, the number of IoT terminals is also growing rapidly. However, due to the limited computing resources of the IoT terminals, the traditional heavy cryptographic algorithm is difficult to be applied well in the identification process of such devices. Therefore, many scholars have applied lightweight cryptographic algorithms in such environments with limited computing resources [1]. However, because of its low security and weak encryption strength, lightweight cipher may lead to illegal identity attacks. Therefore, we need to design a special identity authentication mode for the limited computing resources of the IoT terminals [2].