A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture

被引:0
|
作者
Meng, Lei [1 ]
Huang, Daochao [2 ]
An, Jiahang [1 ]
Zhou, Xianwei [1 ]
Lin, Fuhong [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Coordinat Ctr China CNCERT CC, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[3] Univ Sci & Technol Beijing, Shunde Grad Sch, Beijing 528399, Guangdong, Peoples R China
基金
美国国家科学基金会;
关键词
continuous authentication; zero-trust architecture; device-to-device; blockchain; IoT; INTERNET; MANAGEMENT; SCHEME;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Zero-trust security is a novel concept to cope with intricate access, which can not be handled by the conventional perimeter-based architecture anymore. The device-to-device continuous authentication protocol is one of the most crucial cornerstones, especially in the IoT scenario. In the zero-trust architecture, trust does not rely on any position, person or device. However, to the best of our knowledge, almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values. This is betrayed by the principle of zero-trust architecture. In this paper, we employ the blockchain to eliminate the trusted node. One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism. Additionally, the devices are categorized into three folds: trusted device, suspected device and untrusted device. Only the first two can participate in authentication, and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency. Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part. Finally, we implement the proposed protocol on simulated devices. The result illustrates that our scheme is highly efficient, and the continuous authentication only costs around 0.1ms.
引用
收藏
页码:198 / 213
页数:16
相关论文
共 50 条
  • [41] Security System Design and Verification for Zero Trust Architecture
    Lee, Sangdo
    Huh, Jun-Ho
    Woo, Hanchul
    ELECTRONICS, 2025, 14 (04):
  • [42] Questions of Trust in Norms of Zero Trust
    Wylde, Allison
    INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 837 - 846
  • [43] An Interoperable Zero Trust Federated Architecture for Tactical Systems
    Poirrier, Alexandre
    Cailleux, Laurent
    Clausen, Thomas Heide
    MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [44] A Review on Blockchain for Fintech using Zero Trust Architecture
    Singh, Avinash
    Pareek, Vikas
    Sharma, Ashish
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2024, 48 (01) : 191 - 213
  • [45] Zero Trust Architecture for 6G Security
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Zhang, Yan
    IEEE NETWORK, 2024, 38 (04): : 224 - 232
  • [46] Zero-trust architecture is creating a passwordless society
    Iggbom J.
    Network Security, 2022, 2022 (07):
  • [47] Can You Trust Zero Trust?
    Michael, James Bret
    Dinolt, George C.
    Cohen, Frederick B.
    Wijesekera, Duminda
    COMPUTER, 2022, 55 (08) : 103 - 105
  • [48] Federated Zero Trust Architecture using Artificial Intelligence
    Hussain, Mukhtar
    Pal, Shantanu
    Jadidi, Zahra
    Foo, Ernest
    Kanhere, Salil
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) : 30 - 35
  • [49] A Zero-Trust Architecture for Connected and Autonomous Vehicles
    Anderson, John
    Huang, Qiqing
    Cheng, Long
    Hu, Hongxin
    IEEE INTERNET COMPUTING, 2023, 27 (05) : 7 - 14
  • [50] Zero Trust
    Dirk Fox
    Datenschutz und Datensicherheit - DuD, 2022, 46 (3) : 174 - 175