DKGAuth: Blockchain-Assisted Distributed Key Generation and Authentication for Cross-Domain Intelligent IoT

被引:1
|
作者
Liu, Kexian [1 ]
Guan, Jianfeng [1 ]
Yao, Su [2 ]
Wang, Lili [3 ]
Zhang, Hongke [4 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[3] PLA, AMS, Inst Syst Engn, Beijing 100141, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 15期
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Blockchains; Public key; Costs; Elliptic curve cryptography; Computer architecture; Blockchain; cross-domain authentication; elliptic curve cryptography (ECC); Internet of Things (IoT); key generation and update; SECURE;
D O I
10.1109/JIOT.2024.3379310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption of intelligent Internet of Things (IoT) has sparked increased efforts to foster extensive data interaction and collaboration across diverse fields, leading to a trust crisis in cross-domain scenarios. Moreover, cross-domain collaboration increases the complexity of key management, especially in resource-constrained IoT environments where high computational costs are impractical. This situation poses risks of key leakage and inefficient key updates. This article introduces DKGAuth, a blockchain-based method for distributed key generation and authentication tailored for resource-constrained cross-domain intelligent IoT systems. Initially, we propose a lightweight cross-domain authentication architecture based on blockchain to address the trust crisis effectively among different domains in the intelligent IoT. Second, building upon this architecture, we introduce a distributed key generation method that revolutionizes the key infrastructure to address key management concerns. Additionally, we design an algorithm to combine key factors, minimizing costs associated with both key generation and updates. Finally, we establish a simulation environment to assess the computational, storage, and read/write overheads of our approach. In the same configuration, compared to other solutions, the efficiency of key updates improves by 83% when updated 100 times.
引用
收藏
页码:25663 / 25673
页数:11
相关论文
共 50 条
  • [31] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Tomar, Ashish
    Tripathi, Sachin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 451 - 468
  • [32] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Ashish Tomar
    Sachin Tripathi
    Cluster Computing, 2022, 25 : 451 - 468
  • [33] Blockchain-assisted authenticated key agreement scheme for IoT-based healthcare system
    Tomar, Ashish
    Gupta, Niraj
    Rani, Divya
    Tripathi, Sachin
    INTERNET OF THINGS, 2023, 23
  • [34] Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things
    Tong, Fei
    Chen, Xing
    Huang, Cheng
    Zhang, Yujian
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7761 - 7773
  • [35] Cross-domain identity authentication scheme based on blockchain and PKI system
    Zhang, Hai
    Zhao, Feng
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (01):
  • [36] CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things
    Tong, Fei
    Chen, Xing
    Wang, Kaiming
    Zhang, Yujian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3789 - 3800
  • [37] CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things
    Tong, Fei
    Chen, Xing
    Wang, Kaiming
    Zhang, Yujian
    IEEE Transactions on Information Forensics and Security, 2022, 17 : 3789 - 3800
  • [38] BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme
    Zhang, Hongxia
    Chen, Xingshu
    Lan, Xiao
    Jin, Hongjian
    Cao, Qi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [39] Revocable Certificateless Cross-Domain Authentication Scheme Based on PrimarySecondary Blockchain
    Wang, Ze
    Zong, Zhenglin
    Li, Fang
    Sun, Shimin
    Zhao, Ping
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (05): : 5880 - 5891
  • [40] A novel decentralized cross-domain identity authentication protocol based on blockchain
    Zhao, Gang
    Di, Bingbing
    He, Hui
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (01)