A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture

被引:0
|
作者
Meng, Lei [1 ]
Huang, Daochao [2 ]
An, Jiahang [1 ]
Zhou, Xianwei [1 ]
Lin, Fuhong [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Coordinat Ctr China CNCERT CC, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[3] Univ Sci & Technol Beijing, Shunde Grad Sch, Beijing 528399, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
continuous authentication; zero-trust architecture; device-to-device; blockchain; IoT; INTERNET; MANAGEMENT; SCHEME;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Zero-trust security is a novel concept to cope with intricate access, which can not be handled by the conventional perimeter-based architecture anymore. The device-to-device continuous authentication protocol is one of the most crucial cornerstones, especially in the IoT scenario. In the zero-trust architecture, trust does not rely on any position, person or device. However, to the best of our knowledge, almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values. This is betrayed by the principle of zero-trust architecture. In this paper, we employ the blockchain to eliminate the trusted node. One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism. Additionally, the devices are categorized into three folds: trusted device, suspected device and untrusted device. Only the first two can participate in authentication, and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency. Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part. Finally, we implement the proposed protocol on simulated devices. The result illustrates that our scheme is highly efficient, and the continuous authentication only costs around 0.1ms.
引用
收藏
页码:198 / 213
页数:16
相关论文
共 50 条
  • [21] A protocol to establish trust on biometric authentication devices
    Kiran, Usha
    Moona, Rajat
    Biswas, Santosh
    SECURITY AND PRIVACY, 2023, 6 (05)
  • [22] ZTEI: Zero-Trust and Edge Intelligence Empowered Continuous Authentication for Satellite Networks
    Fu, Peiyu
    Wu, Jun
    Lin, Xi
    Shen, Ao
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2376 - 2381
  • [23] Continuous Authentication for UAV Delivery Systems Under Zero-Trust Security Framework
    Dong, Chengzu
    Jiang, Frank
    Chen, Shiping
    Liu, Xiao
    2022 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING & COMMUNICATIONS (IEEE EDGE 2022), 2022, : 123 - 132
  • [24] Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
    Dimitrakos, Theo
    Dilshener, Tezcan
    Kravtsov, Alexander
    La Marra, Antonio
    Martinelli, Fabio
    Rizos, Athanasios
    Rosetti, Alessandro
    Saracino, Andrea
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1801 - 1812
  • [25] Zero Trust Container Architecture (ZTCA): A Framework for Applying Zero Trust Principals to Docker Containers
    Leahy, Darragh
    Thorpe, Christina
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 111 - 120
  • [26] The solar trust model: Authentication without limitation
    Clifford, M
    Lavine, C
    Bishop, M
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 300 - 307
  • [27] Emerging Authentication Technologies for Zero Trust on the Internet of Things
    Bast, Chanapha
    Yeh, Kuo-Hui
    SYMMETRY-BASEL, 2024, 16 (08):
  • [28] A critical analysis of Zero Trust Architecture (ZTA)
    Fernandez, Eduardo B.
    Brazhuk, Andrei
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [29] A zero trust architecture for health information systems
    Onome Christopher Edo
    David Ang
    Praveen Billakota
    Johnny C. Ho
    Health and Technology, 2024, 14 : 189 - 199
  • [30] Zero Trust Architecture (ZTA): A Comprehensive Survey
    Syed, Naeem Firdous
    Shah, Syed W.
    Shaghaghi, Arash
    Anwar, Adnan
    Baig, Zubair
    Doss, Robin
    IEEE ACCESS, 2022, 10 : 57143 - 57179