A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture

被引:0
|
作者
Meng, Lei [1 ]
Huang, Daochao [2 ]
An, Jiahang [1 ]
Zhou, Xianwei [1 ]
Lin, Fuhong [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Coordinat Ctr China CNCERT CC, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[3] Univ Sci & Technol Beijing, Shunde Grad Sch, Beijing 528399, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
continuous authentication; zero-trust architecture; device-to-device; blockchain; IoT; INTERNET; MANAGEMENT; SCHEME;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Zero-trust security is a novel concept to cope with intricate access, which can not be handled by the conventional perimeter-based architecture anymore. The device-to-device continuous authentication protocol is one of the most crucial cornerstones, especially in the IoT scenario. In the zero-trust architecture, trust does not rely on any position, person or device. However, to the best of our knowledge, almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values. This is betrayed by the principle of zero-trust architecture. In this paper, we employ the blockchain to eliminate the trusted node. One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism. Additionally, the devices are categorized into three folds: trusted device, suspected device and untrusted device. Only the first two can participate in authentication, and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency. Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part. Finally, we implement the proposed protocol on simulated devices. The result illustrates that our scheme is highly efficient, and the continuous authentication only costs around 0.1ms.
引用
收藏
页码:198 / 213
页数:16
相关论文
共 50 条
  • [1] A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
    Lei Meng
    Daochao Huang
    Jiahang An
    Xianwei Zhou
    Fuhong Lin
    China Communications, 2022, 19 (08) : 198 - 213
  • [2] A Software Integrity Authentication Protocol for Zero Trust Architecture
    Liu, Wenyi
    Zhang, Zheng
    Qiao, Xu
    Li, Yuanzhang
    Tan, Yu-an
    Meng, Weizhi
    PROCEEDINGS OF THE2024 SIGCOMM WORKSHOP ON ZERO TRUST ARCHITECTURE FOR NEXT GENERATION COMMUNICATIONS, ZTA-NEXTGEN 2024, 2024, : 1 - 6
  • [3] ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems
    Roy, Prasanta Kumar
    Kumar, Pankaj
    Bhattacharya, Ansuman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 163
  • [4] PUFDCA: A Zero-Trust-Based IoT Device Continuous Authentication Protocol
    Alshomrani, Shrooq
    Li, Shancang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [5] A continuous authentication scheme for zero-trust architecture in industrial internet of things
    Wan, Tao
    Shi, Buhai
    Wang, Huan
    Alexandria Engineering Journal, 2025, 122 : 555 - 563
  • [6] LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
    Shah, Syed W.
    Syed, Naeem F.
    Shaghaghi, Arash
    Anwar, Adnan
    Baig, Zubair
    Doss, Robin
    COMPUTERS & SECURITY, 2021, 108
  • [7] STCA: Stacked Token-based Continuous Authentication Protocol for Zero Trust IoT
    Zhang, Biao
    Yang, Shuo
    Zheng, Xinran
    Wang, Xingjun
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [8] Trust Authentication Protocol on the Web
    GUO Ya-jun~ 1
    2. Department of Computer Science
    Wuhan University Journal of Natural Sciences, 2006, (01) : 253 - 255
  • [9] Privacy-preserving authentication scheme based on zero trust architecture
    Tang, Fei
    Ma, Chunliang
    Cheng, Kefei
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (05) : 1211 - 1220
  • [10] Privacy-preserving authentication scheme based on zero trust architecture
    Fei Tang
    Chunliang Ma
    Kefei Cheng
    Digital Communications and Networks, 2024, 10 (05) : 1211 - 1220