A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture

被引:0
|
作者
Meng, Lei [1 ]
Huang, Daochao [2 ]
An, Jiahang [1 ]
Zhou, Xianwei [1 ]
Lin, Fuhong [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Coordinat Ctr China CNCERT CC, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[3] Univ Sci & Technol Beijing, Shunde Grad Sch, Beijing 528399, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
continuous authentication; zero-trust architecture; device-to-device; blockchain; IoT; INTERNET; MANAGEMENT; SCHEME;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Zero-trust security is a novel concept to cope with intricate access, which can not be handled by the conventional perimeter-based architecture anymore. The device-to-device continuous authentication protocol is one of the most crucial cornerstones, especially in the IoT scenario. In the zero-trust architecture, trust does not rely on any position, person or device. However, to the best of our knowledge, almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values. This is betrayed by the principle of zero-trust architecture. In this paper, we employ the blockchain to eliminate the trusted node. One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism. Additionally, the devices are categorized into three folds: trusted device, suspected device and untrusted device. Only the first two can participate in authentication, and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency. Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part. Finally, we implement the proposed protocol on simulated devices. The result illustrates that our scheme is highly efficient, and the continuous authentication only costs around 0.1ms.
引用
收藏
页码:198 / 213
页数:16
相关论文
共 50 条
  • [11] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [12] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    Concurrency and Computation: Practice and Experience, 2022, 34 (23)
  • [13] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [14] The Inhibitors to Zero Trust Architecture
    Ross, Steven J.
    ISACA Journal, 2024, 3 : 3 - 5
  • [15] Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
    Xu, Mingyang
    Guo, Junli
    Yuan, Haoyu
    Yang, Xinyu
    ELECTRONICS, 2023, 12 (04)
  • [16] Resilient Without Zero Trust
    Swearingen, Michael T.
    Michael, James Bret
    Weiss, Joseph
    Radvanovsky, Robert
    COMPUTER, 2024, 57 (01) : 120 - 122
  • [17] Zero Trust Architecture: Risk Discussion
    Levine, Alan
    Tucker, Brett Alan
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [18] Zero Trust Architecture: Does It Help?
    Bertino, Elisa
    IEEE SECURITY & PRIVACY, 2021, 19 (05) : 95 - 96
  • [19] Zero Trust Security in the Mist Architecture
    Uehara, Minoru
    COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2021, 2021, 278 : 185 - 194
  • [20] Strategy for Implementing of Zero Trust Architecture
    Tsai, Mengru
    Lee, Shanhsin
    Shieh, Shiuhpyng Winston
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (01) : 93 - 100