A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

被引:5
|
作者
Wang, Xiangyang [1 ]
Gu, Chunxiang [1 ,2 ]
Wei, Fushan [1 ]
Lu, Siqi [1 ]
Li, Zhaoxuan [3 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Henan, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
SIGNCRYPTION SCHEME; BLOCKCHAIN; SECURITY;
D O I
10.1155/2022/3693748
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) improves productivity and intelligent manufacturing process through revolutionary technology. Due to the complexity of the manufacturing process, cross-domain access is inevitable. Recently, Meng et al. proposed a secure and efficient blockchain-assisted entity authentication mechanism BASA for IIoT cross-domain. In the BASA scheme, the authors utilized identity-based signature (IBS) to realize mutual authentication and the Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) exchange mechanism to negotiate the session key. Due to the inherent key escrow problem of identity-based cryptography (IBC), the key generation center (KGC) can obtain the session key negotiated between two entities distributed in different domains. When KGC is threatened, the security of the session key is worrying. Considering this security concern, based on the BASA scheme, in this article, we first show a secure and efficient certificateless public-key signature (CL-PKS) scheme with anonymity. Then, combined with the ECDHE key exchange mechanism, we give an efficient cross-domain authentication and key agreement scheme CL-BASA with the aid of consortium blockchain. After that, we make security verification by the formal analysis tool, Tamarin, which shows that our CL-BASA is secure. The evaluation demonstrates that our CL-BASA may have a slight disadvantage in storage overhead, but it has obvious advantages than competitor schemes in terms of communication overhead and computational overhead.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof
    Du, Ruizhong
    Li, Xiaoya
    Liu, Yan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT II, 2022, 13156 : 647 - 664
  • [32] A secure cross-domain authentication scheme based on threshold signature for MEC
    Chen, Lei
    Guo, Chong
    Gong, Bei
    Waqas, Muhammad
    Deng, Lihua
    Qin, Haowen
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [33] A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT
    Zhang, Yujian
    Luo, Yuhao
    Chen, Xing
    Tong, Fei
    Xu, Yuwei
    Tao, Jun
    Cheng, Guang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [34] Oracle Based Privacy-Preserving Cross-Domain Authentication Scheme
    Su, Yuan
    Wang, Yuheng
    Li, Jiliang
    Su, Zhou
    Pedrycz, Witold
    Hu, Qinnan
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (04): : 602 - 614
  • [35] BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme
    Zhang, Hongxia
    Chen, Xingshu
    Lan, Xiao
    Jin, Hongjian
    Cao, Qi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [36] A secure cross-domain authentication scheme based on threshold signature for MEC
    Chen, Lei
    Guo, Chong
    Gong, Bei
    Waqas, Muhammad
    Deng, Lihua
    Qin, Haowen
    Journal of Cloud Computing, 2024, 13 (01)
  • [37] A blockchain and signature based scheme for cross-domain authentication with decentralized identity
    Zhang, Zinuo
    Ren, Wei
    Zhang, Xianchao
    Sun, Yani
    Zhu, Tianqing
    Choo, Kim-Kwang Raymond
    COMPUTER STANDARDS & INTERFACES, 2025, 94
  • [38] CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity
    Zhang, Zinuo
    Xiong, Ruoting
    Di, Xinyu
    Ren, Wei
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2010 - 2015
  • [39] A secure cross-domain authentication scheme based on threshold signature for MEC
    Lei Chen
    Chong Guo
    Bei Gong
    Muhammad Waqas
    Lihua Deng
    Haowen Qin
    Journal of Cloud Computing, 13
  • [40] Cross-Domain Authentication Scheme for Vehicles Based on Given Virtual Identities
    Chen, Yuxuan
    Zhang, Jing
    Wei, Xiyang
    Wang, Yibo
    Cui, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 15869 - 15879