A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

被引:5
|
作者
Wang, Xiangyang [1 ]
Gu, Chunxiang [1 ,2 ]
Wei, Fushan [1 ]
Lu, Siqi [1 ]
Li, Zhaoxuan [3 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Henan, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
SIGNCRYPTION SCHEME; BLOCKCHAIN; SECURITY;
D O I
10.1155/2022/3693748
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) improves productivity and intelligent manufacturing process through revolutionary technology. Due to the complexity of the manufacturing process, cross-domain access is inevitable. Recently, Meng et al. proposed a secure and efficient blockchain-assisted entity authentication mechanism BASA for IIoT cross-domain. In the BASA scheme, the authors utilized identity-based signature (IBS) to realize mutual authentication and the Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) exchange mechanism to negotiate the session key. Due to the inherent key escrow problem of identity-based cryptography (IBC), the key generation center (KGC) can obtain the session key negotiated between two entities distributed in different domains. When KGC is threatened, the security of the session key is worrying. Considering this security concern, based on the BASA scheme, in this article, we first show a secure and efficient certificateless public-key signature (CL-PKS) scheme with anonymity. Then, combined with the ECDHE key exchange mechanism, we give an efficient cross-domain authentication and key agreement scheme CL-BASA with the aid of consortium blockchain. After that, we make security verification by the formal analysis tool, Tamarin, which shows that our CL-BASA is secure. The evaluation demonstrates that our CL-BASA may have a slight disadvantage in storage overhead, but it has obvious advantages than competitor schemes in terms of communication overhead and computational overhead.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Secure Certificateless-Based Authenticated Key Agreement Protocol in the Client-Server Setting
    Hou Meng-bo
    Xu Qiu-liang
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 960 - 965
  • [22] Cross-domain authentication scheme based on trust for service entity
    Gao Y.
    Ma W.
    Liu X.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2019, 41 (02): : 438 - 443
  • [23] Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks
    Li, Guangsong
    Wang, Yang
    Zhang, Bin
    Lu, Siqi
    MOBILE INFORMATION SYSTEMS, 2020, 2020 (2020)
  • [24] A Cross-Domain Alliance Authentication Scheme based on Bilinear Group
    Zhang, Qikun
    Wang, Ruifang
    Gan, Yong
    Yin, Yifeng
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1313 - 1317
  • [25] Cross-domain data cloud storage auditing scheme based on certificateless cryptography
    Yan X.
    Zheng L.
    Long D.
    Rui X.
    Journal of China Universities of Posts and Telecommunications, 2021, 28 (06): : 36 - 47
  • [26] Cross-domain data cloud storage auditing scheme based on certificateless cryptography
    Xu Yan
    Li Zheng
    Ding Long
    Xu Rui
    The Journal of China Universities of Posts and Telecommunications, 2021, 28 (06) : 36 - 47
  • [27] Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings
    Ming Luo
    Jiayu Wu
    Xiangjun Li
    Telecommunication Systems, 2020, 74 : 437 - 449
  • [28] Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings
    Luo, Ming
    Wu, Jiayu
    Li, Xiangjun
    TELECOMMUNICATION SYSTEMS, 2020, 74 (04) : 437 - 449
  • [29] Certificateless-Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks
    Ye, Xin
    Xu, Gencheng
    Cheng, Xueli
    Li, Yuedi
    Qin, Zhiguang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [30] Cross-domain identity authentication scheme based on blockchain and PKI system
    Zhang, Hai
    Zhao, Feng
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (01):