“…In particular, terminal devices that store and transmit impor-tant data to users can be attacked and become vulnerable to data leakage, leading to unnecessary damage and loss of privacy. Therefore, the security and privacy of IoT devices must be considered [11], mainly involving authentication [12], access control, data protection [13], trust management, and other issues. Identity authentication [14] is the first step of the whole IoT security, which is a security mechanism that identifies and authenticates the identity of devices that access the IoT system before data interaction takes place.…”