Perception Layer Lightweight Certificateless Authentication Scheme for IoT-Based Emergency Logistics

被引:6
作者
Yang, Jianxi [1 ]
Fan, Jinpo [2 ]
Zhu, Xiaochen [3 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[2] Beijing Univ Posts & Telecommun, Key Lab Universal Wireless Commun, Minist Educ, Beijing 100876, Peoples R China
[3] Xidian Univ, Sch Commun Engn, Xian 710071, Peoples R China
关键词
Authentication; Logistics; Security; Costs; Logic gates; Object recognition; Communication systems; Emergency logistics; lightweight authentication; communication system security; perception layer; SIGNATURE SCHEME; PROVABLY-SECURE; RFID AUTHENTICATION; EFFICIENT; PROTOCOL; INTERNET;
D O I
10.1109/ACCESS.2023.3243624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Emergency logistics is of great significance for supply security in emergencies. As a crucial component of strategic material reserve and allocation, emergency logistics is characterized by high levels of safety and efficacy. The security of the IoT-based emergency logistics system cannot be overstated, considering the potential damage caused by malicious accessors. Authentication is an essential means of system security. Existing certificateless authentication protocols are mostly based on bilinear pairings, which cannot match the objectives of emergency logistics networks for lightweight deployment and fast authentication of massive nodes. In this paper, we propose a lightweight certificateless authentication protocol (CL-LAP) without bilinear pairings. The security is determined by the discrete logarithm problem on elliptic curves. Nonlinear pairings guarantee energy efficiency and minimum computation cost. In addition, we use batch verification to reduce the authentication cost and tackle the problem of quick authentication in broadcast messages. We conduct a security analysis on the proposed CL-LAP under the random oracle model to demonstrate that the proposed scheme can withstand common security threats and provide the necessary security for the perception layer. The performance analysis indicates that the suggested scheme is less complex and more efficient than similar schemes with the same level of security.
引用
收藏
页码:14350 / 14364
页数:15
相关论文
共 46 条
[1]  
Al Housani H., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P53
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]   IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics [J].
Anandhi, S. ;
Anitha, R. ;
Sureshkumar, Venkatasamy .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (02) :543-560
[4]  
[Anonymous], 2013, J. Cyber Secur. Mobil., DOI DOI 10.13052/JCSM2245-1439.142
[5]  
[Anonymous], 1984, P CRYPTO
[6]  
[Anonymous], 2018, DISPOSITION SPECIFIC
[7]   Facility location in humanitarian relief [J].
Balcik, B. ;
Beamon, B. M. .
INTERNATIONAL JOURNAL OF LOGISTICS-RESEARCH AND APPLICATIONS, 2008, 11 (02) :101-121
[8]  
Baoyi W., 2019, Internet of Things (IoT) and Engineering Applications, V4, P7
[9]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[10]   Combinatorial design of key distribution mechanisms for wireless sensor networks [J].
Camtepe, Seyit A. ;
Yener, Bulent .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (02) :346-358