A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

被引:5
作者
Wang, Xiangyang [1 ]
Gu, Chunxiang [1 ,2 ]
Wei, Fushan [1 ]
Lu, Siqi [1 ]
Li, Zhaoxuan [3 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Henan, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
SIGNCRYPTION SCHEME; BLOCKCHAIN; SECURITY;
D O I
10.1155/2022/3693748
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) improves productivity and intelligent manufacturing process through revolutionary technology. Due to the complexity of the manufacturing process, cross-domain access is inevitable. Recently, Meng et al. proposed a secure and efficient blockchain-assisted entity authentication mechanism BASA for IIoT cross-domain. In the BASA scheme, the authors utilized identity-based signature (IBS) to realize mutual authentication and the Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) exchange mechanism to negotiate the session key. Due to the inherent key escrow problem of identity-based cryptography (IBC), the key generation center (KGC) can obtain the session key negotiated between two entities distributed in different domains. When KGC is threatened, the security of the session key is worrying. Considering this security concern, based on the BASA scheme, in this article, we first show a secure and efficient certificateless public-key signature (CL-PKS) scheme with anonymity. Then, combined with the ECDHE key exchange mechanism, we give an efficient cross-domain authentication and key agreement scheme CL-BASA with the aid of consortium blockchain. After that, we make security verification by the formal analysis tool, Tamarin, which shows that our CL-BASA is secure. The evaluation demonstrates that our CL-BASA may have a slight disadvantage in storage overhead, but it has obvious advantages than competitor schemes in terms of communication overhead and computational overhead.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] SE-CAS: Secure and Efficient Cross-Domain Authentication Scheme Based on Blockchain for Space TT&C Networks
    Wang, Chuanhua
    Zhang, Yang
    Zhang, Quan
    Xu, Xin
    Chen, Wei
    Li, Heji
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 26806 - 26818
  • [42] QKBAKA: A Quantum-Key-Based Authentication and Key Agreement Scheme for Internet of Vehicles
    Shi, Qin
    Yang, Ze
    Cheng, Teng
    Wang, Chuansu
    Wu, Zexu
    Zhang, Xing
    Xu, Peiling
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12292 - 12306
  • [43] XAuth: Efficient Privacy-Preserving Cross-Domain Authentication
    Chen, Jing
    Zhan, Zeyi
    He, Kun
    Du, Ruiying
    Wang, Donghui
    Liu, Fei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3301 - 3311
  • [44] Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks
    Pu, Cong
    Choo, Kim-Kwang Raymond
    Bhattarai, Image
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 931 - 936
  • [45] A method for improving the security of blockchain-based cross-domain authentication
    Kong, Lingrui
    Wang, Jizhi
    Zhao, Yue
    Sui, Tongtong
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 177 - 183
  • [46] A Secure Certificateless Identity Authentication Scheme Based on Blockchain
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Xu, Ming
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 251 - 266
  • [47] An Efficient Lightweight Key Agreement and Authentication Scheme for WBAN
    Rehman, Zia Ur
    Altaf, Saud
    Iqbal, Saleem
    IEEE ACCESS, 2020, 8 : 175385 - 175397
  • [48] A novel authentication and key agreement scheme for Internet of Vehicles
    Yang, Qing
    Zhu, Xiaoqian
    Wang, Xiaoliang
    Fu, Junjie
    Zheng, Jing
    Liu, Yuzhen
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 415 - 428
  • [49] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [50] A Cross-domain Data Sharing Scheme for VANETs Based on Blockchain
    Shang, Wan-Yu
    Mu, Hai-Bing
    Liu, Jian-Xiong
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (06): : 843 - 850