DKGAuth: Blockchain-Assisted Distributed Key Generation and Authentication for Cross-Domain Intelligent IoT

被引:1
作者
Liu, Kexian [1 ]
Guan, Jianfeng [1 ]
Yao, Su [2 ]
Wang, Lili [3 ]
Zhang, Hongke [4 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[3] PLA, AMS, Inst Syst Engn, Beijing 100141, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 15期
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Blockchains; Public key; Costs; Elliptic curve cryptography; Computer architecture; Blockchain; cross-domain authentication; elliptic curve cryptography (ECC); Internet of Things (IoT); key generation and update; SECURE;
D O I
10.1109/JIOT.2024.3379310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption of intelligent Internet of Things (IoT) has sparked increased efforts to foster extensive data interaction and collaboration across diverse fields, leading to a trust crisis in cross-domain scenarios. Moreover, cross-domain collaboration increases the complexity of key management, especially in resource-constrained IoT environments where high computational costs are impractical. This situation poses risks of key leakage and inefficient key updates. This article introduces DKGAuth, a blockchain-based method for distributed key generation and authentication tailored for resource-constrained cross-domain intelligent IoT systems. Initially, we propose a lightweight cross-domain authentication architecture based on blockchain to address the trust crisis effectively among different domains in the intelligent IoT. Second, building upon this architecture, we introduce a distributed key generation method that revolutionizes the key infrastructure to address key management concerns. Additionally, we design an algorithm to combine key factors, minimizing costs associated with both key generation and updates. Finally, we establish a simulation environment to assess the computational, storage, and read/write overheads of our approach. In the same configuration, compared to other solutions, the efficiency of key updates improves by 83% when updated 100 times.
引用
收藏
页码:25663 / 25673
页数:11
相关论文
共 32 条
  • [1] Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
    Alshahrani, Mohammed
    Traore, Issa
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 156 - 175
  • [2] [Anonymous], 2020, IEEE J. Sel. Areas Commun., V38, P942
  • [3] [Anonymous], 2022, IEEE Internet Things J., V9, P19744
  • [4] [Anonymous], 2021, IEEE J. Sel. Areas Commun., V39, P3688
  • [5] [Anonymous], 2019, IEEE Internet Things J., V6, P5485
  • [6] [Anonymous], 2019, Int. J. Distrib. SensorNetw., V15
  • [7] XAuth: Efficient Privacy-Preserving Cross-Domain Authentication
    Chen, Jing
    Zhan, Zeyi
    He, Kun
    Du, Ruiying
    Wang, Donghui
    Liu, Fei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3301 - 3311
  • [8] A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
    Cui, Zhihua
    Xue, Fei
    Zhang, Shiqiang
    Cai, Xingjuan
    Cao, Yang
    Zhang, Wensheng
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) : 241 - 251
  • [9] Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin
    Gai, Keke
    Zhang, Yue
    Qiu, Meikang
    Thuraisingham, Bhavani
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 1673 - 1685
  • [10] BSLA: Blockchain-assisted Secure and Lightweight Authentication for SGIN
    Guan, Jianfeng
    Wu, Yinan
    Yao, Su
    Zhang, Tianhong
    Su, Xiaokang
    Li, Chuanqing
    [J]. COMPUTER COMMUNICATIONS, 2021, 176 : 46 - 55