A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

被引:5
|
作者
Wang, Xiangyang [1 ]
Gu, Chunxiang [1 ,2 ]
Wei, Fushan [1 ]
Lu, Siqi [1 ]
Li, Zhaoxuan [3 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Henan, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
SIGNCRYPTION SCHEME; BLOCKCHAIN; SECURITY;
D O I
10.1155/2022/3693748
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) improves productivity and intelligent manufacturing process through revolutionary technology. Due to the complexity of the manufacturing process, cross-domain access is inevitable. Recently, Meng et al. proposed a secure and efficient blockchain-assisted entity authentication mechanism BASA for IIoT cross-domain. In the BASA scheme, the authors utilized identity-based signature (IBS) to realize mutual authentication and the Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) exchange mechanism to negotiate the session key. Due to the inherent key escrow problem of identity-based cryptography (IBC), the key generation center (KGC) can obtain the session key negotiated between two entities distributed in different domains. When KGC is threatened, the security of the session key is worrying. Considering this security concern, based on the BASA scheme, in this article, we first show a secure and efficient certificateless public-key signature (CL-PKS) scheme with anonymity. Then, combined with the ECDHE key exchange mechanism, we give an efficient cross-domain authentication and key agreement scheme CL-BASA with the aid of consortium blockchain. After that, we make security verification by the formal analysis tool, Tamarin, which shows that our CL-BASA is secure. The evaluation demonstrates that our CL-BASA may have a slight disadvantage in storage overhead, but it has obvious advantages than competitor schemes in terms of communication overhead and computational overhead.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Compliance with HIPAA and GDPR in Certificateless-Based Authenticated Key Agreement Using Extended Chaotic Maps
    Lee, Tian-Fu
    Chang, I-Pin
    Su, Guo-Jun
    ELECTRONICS, 2023, 12 (05)
  • [42] Certificateless-based two-party authenticated Key agreement Protocols in a Multiple PKG Environment
    Pan Jin
    Liu Xiaoqiong
    Xie Minghui
    Liu Qiong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2364 - 2367
  • [43] A Lightweight Cross-Layer Mutual Authentication With Key Agreement Protocol for IIoT
    Yu, Liying
    Wu, Wen
    Mei, Lin
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 7051 - 7066
  • [44] An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems
    Srikanth G.U.
    Geetha R.
    Prabhu S.
    International Journal of Information Technology, 2023, 15 (3) : 1221 - 1230
  • [45] CKAA: Certificateless key-agreement authentication scheme in digital twin telemedicine environment
    Zhang, Jianhong
    Wei, Jie
    Zhang, Jianan
    Bo, Cao
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (01)
  • [46] A Cross-Domain Group Authentication Scheme for LTE-A Based Vehicular Network
    Xu, Cheng
    Ma, Maode
    Huang, Xiaohong
    Bao, Hong
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 595 - 599
  • [47] A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
    Zhao, Feng
    Ding, Hongtao
    Li, Chunhai
    Su, Zhaoyu
    Liang, Guoling
    Yang, Changsong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 567 - 585
  • [48] IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things
    Jia, Xudong
    Hu, Ning
    Su, Shen
    Yin, Shi
    Zhao, Yan
    Cheng, Xinda
    Zhang, Chi
    ELECTRONICS, 2020, 9 (04)
  • [49] Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
    YANG Yanyan
    HU Mingsheng
    KONG Shan
    GONG Bei
    LIU Xinxin
    Wuhan University Journal of Natural Sciences, 2019, 24 (02) : 134 - 140
  • [50] A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication
    Jiang, Junfeng
    Zhang, Yujian
    Li, Junhao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 992 - 999