A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture

被引:0
|
作者
Meng, Lei [1 ]
Huang, Daochao [2 ]
An, Jiahang [1 ]
Zhou, Xianwei [1 ]
Lin, Fuhong [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Coordinat Ctr China CNCERT CC, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[3] Univ Sci & Technol Beijing, Shunde Grad Sch, Beijing 528399, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
continuous authentication; zero-trust architecture; device-to-device; blockchain; IoT; INTERNET; MANAGEMENT; SCHEME;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Zero-trust security is a novel concept to cope with intricate access, which can not be handled by the conventional perimeter-based architecture anymore. The device-to-device continuous authentication protocol is one of the most crucial cornerstones, especially in the IoT scenario. In the zero-trust architecture, trust does not rely on any position, person or device. However, to the best of our knowledge, almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values. This is betrayed by the principle of zero-trust architecture. In this paper, we employ the blockchain to eliminate the trusted node. One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism. Additionally, the devices are categorized into three folds: trusted device, suspected device and untrusted device. Only the first two can participate in authentication, and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency. Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part. Finally, we implement the proposed protocol on simulated devices. The result illustrates that our scheme is highly efficient, and the continuous authentication only costs around 0.1ms.
引用
收藏
页码:198 / 213
页数:16
相关论文
共 50 条
  • [31] A zero trust architecture for health information systems
    Edo, Onome Christopher
    Ang, David
    Billakota, Praveen
    Ho, Johnny C.
    HEALTH AND TECHNOLOGY, 2024, 14 (01) : 189 - 199
  • [32] Building a zero trust architecture to support an enterprise
    ISACA Journal, 2021, 2 : 39 - 40
  • [33] A Comprehensive Framework for Migrating to Zero Trust Architecture
    Phiayura, Pacharee
    Teerakanok, Songpon
    IEEE ACCESS, 2023, 11 : 19487 - 19511
  • [34] Building A Zero Trust Architecture Using Kubernetes
    D'Silva, Daniel
    Ambawade, Dayanand D.
    2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2021,
  • [35] Migrating to Zero Trust Architecture: Reviews and Challenges
    Teerakanok, Songpon
    Uehara, Tetsutaro
    Inomata, Atsuo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [36] Trust Score-based Zero Trust Architecture for Advanced Metering Infrastructure Security
    Bhattarai, Hrishav
    Kulkarni, Akshay
    Niamat, Mohammed
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 334 - 339
  • [37] ASMCC+: A Secure Authentication Scheme for Mobile Cloud Computing Environment Based on Zero Trust Architecture
    Hossain, Md Jakir
    Seid, Abegaz Mohammed
    Abishu, Hayla Nahom
    Dharejo, Fayaz Ali
    Jhaveri, Rutvij H.
    Erbad, Aiman
    Alathbah, Moath
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 6236 - 6249
  • [38] Dynamic trust management framework using blockchain for zero-trust-based authentication in BYOD environments
    Huang, Jheng-Jia
    Lin, Zheng-Yan
    Lo, Nai-Wei
    Feng, Sheng-Feng
    ENTERPRISE INFORMATION SYSTEMS, 2025, 19 (1-2)
  • [39] A Survey on Zero Trust Architecture: Challenges and Future Trends
    He, Yuanhang
    Huang, Daochao
    Chen, Lei
    Ni, Yi
    Ma, Xiangjie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [40] Beyond Zero Trust: Trust Is a Vulnerability
    Campbell, Mark
    COMPUTER, 2020, 53 (10) : 110 - 113