BTAA: Blockchain and TEE-Assisted Authentication for IoT Systems

被引:9
作者
Mao, Wenze [1 ]
Jiang, Peng [1 ]
Zhu, Liehuang [1 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
基金
北京市自然科学基金;
关键词
Blockchain; cross-domain authentication; Internet of Things (IoT); trusted execution environment (TEE); ANONYMOUS AUTHENTICATION; SECURITY; CHALLENGES; INTERNET; PRIVACY; SERVICE; THINGS;
D O I
10.1109/JIOT.2023.3252565
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet of Things (IoT) technology has gained a lot of attention. With the development of IoT technology, it comes the need for devices with different trust domains to interact and collaborate. In order to protect the security and reliability of the communication between devices in different trust domains, it raises the concerns about the technology of cross-domain authentication. Traditional cross-domain authentication methods may lead to heavy key management overhead or depend on trusted third parties, while existing blockchain-based cross-domain authentication schemes do not prevent the possibility of mischief by malicious domain managers. In this article, we design an efficient Blockchain and trusted execution environment (TEE)-assisted secure device authentication scheme for cross-domain IoT system, called blockchain and TEE-assisted authentication. Our solution solves the problem that managers are not fully trusted, which in turns protect the security and reliability in the blockchain-based cross-domain communication. Specifically, blockchain is introduced to build trust between different domains, the identity-based signatures are used to verify the identity information of devices and the TEE is introduced to prevent the possibility of mischief by domain managers. Finally, our experiments show that the introduction of TEE has greatly improved system security with a low-efficiency reduction, which proves that our scheme can achieve highly secure distributed IoT authentication.
引用
收藏
页码:12603 / 12615
页数:13
相关论文
共 42 条
  • [1] [Anonymous], 2018, GlobalPlatform
  • [2] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [3] Cervesato Iliano., 2005, Proceedings of the 2005 workshop on Issues in the theory of security, P12
  • [4] Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
    Cheng, Raymond
    Zhang, Fan
    Kos, Jernej
    He, Warren
    Hynes, Nicholas
    Johnson, Noah
    Juels, Ari
    Miller, Andrew
    Song, Dawn
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 185 - 200
  • [5] A Method of Surface Subsidence Prediction for Compressed Air Energy Storage in Salt Rock
    Cheng, Zirui
    Ye, Bin
    [J]. PROCEEDINGS OF GEOSHANGHAI 2018 INTERNATIONAL CONFERENCE: ROCK MECHANICS AND ROCK ENGINEERING, 2018, : 3 - 11
  • [6] Blockchain for Internet of Things: A Survey
    Dai, Hong-Ning
    Zheng, Zibin
    Zhang, Yan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8076 - 8094
  • [7] Das P, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P801
  • [8] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    [J]. SENSORS, 2019, 19 (05)
  • [9] Erwig A., 2020, 20201486 IACR
  • [10] The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial
    Ferrag, Mohamed Amine
    Shu, Lei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24) : 17236 - 17260