The expansion of the scale of the Power Internet of Things stimulated by the development of the Energy Internet makes the growth in demand for the effective authentication and access control technologies in the cross-domain data exchange. Based on the cross-chain technology of the blockchain and the cuckoo filter, this paper proposes a cross-domain authentication scheme for Power Internet of Things. Firstly, a cross-chain authentication architecture is established. Combined with the existing authentication technologies used in intra-domain authentication, a cross-domain authentication process based on the cross-chain technology is proposed to realize the automatic transmission of the authentication credentials from application domain to authentication domain. The cuckoo filter is deployed on the blockchain as smart contracts, and the user certificate fingerprint is inserted into the filter to realize user registration, query, and revocation, which reduces the cost of the user certificate management. Experimental results show the effectiveness and feasibility of our scheme. Based on the proposed authentication scheme, a cross-domain access control scheme based on roles and object classes is presented, by treating the object classes as controlled objects and then applying the role-based access control to the object classes, on the condition that the heterogeneous domains in the Energy Internet have the same kinds of resources.
In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.