2020
DOI: 10.3390/electronics9040634
|View full text |Cite
|
Sign up to set email alerts
|

IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things

Abstract: The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 54 publications
(39 citation statements)
references
References 34 publications
0
39
0
Order By: Relevance
“…Compared with literature [37], this scheme can resist the replacement attack by using temporary identities and the two-factor authentication of "password + key," making itself more secure. Compared with literature [33,34,[37][38][39], this scheme realizes cross-domain identity authentication under different cryptographic systems, which better satisfies the needs of contemporary society. 4.7.…”
Section: Anti-man-in-the-middle Attacksmentioning
confidence: 95%
See 1 more Smart Citation
“…Compared with literature [37], this scheme can resist the replacement attack by using temporary identities and the two-factor authentication of "password + key," making itself more secure. Compared with literature [33,34,[37][38][39], this scheme realizes cross-domain identity authentication under different cryptographic systems, which better satisfies the needs of contemporary society. 4.7.…”
Section: Anti-man-in-the-middle Attacksmentioning
confidence: 95%
“…is scheme uses hierarchical ID tree to define the ID values of users, cloud service providers, and other entities to realize the uniqueness of entity identity. Compared with literature [34][35][36][37][38][39], this scheme replaces the real identity with the temporary identity, and the KGC or CA1 signs user U's temporary identity, further enhancing security and meanwhile realizing anonymous tracking. Compared with literature [33][34][35][36], the KGC or CA1 in this scheme signs the temporary identity of user U and encrypts the message by the public key of the CSP, which results in better performance in resisting man-in-the-middle attacks.…”
Section: Anti-man-in-the-middle Attacksmentioning
confidence: 99%
“…The number of cryptographic operations involved in this study are counted. To represent the comparison, Table 6 shows the notations, description, and computed their approximate execution time for various cryptographic operations by using the PBC library reported by Jia et al [ 41 ]. Specifically, the study employed a secure hash function, public-key-based encryption, symmetrical encryption, and symmetric decryption, which are, respectively, denoted as , and .…”
Section: Security Features Comparisonmentioning
confidence: 99%
“…(2) Scalability problem: with the popularity of IoT, the identity authentication problem in IoT does not only exist in a single IoT application, but also in different IoT applications with the same authentication needs [21,37], which we call cross-domain authentication. Blockchain-based authentication schemes are usually deployed in a single application domain or intelligent system, and authentication information from different application domains or systems is not interoperable, lacking an effective cross-domain authentication scheme.…”
Section: Motivation and Basicmentioning
confidence: 99%
“…Besides, blockchain's nonfalsifiability and fault tolerance make it a good solution to authentication problems [19]. For example, in [20], the feasibility of using blockchain technology for IoT device authentication in edge computing systems is discussed, and blockchain-based smart contracts are introduced to handle the operation of authentication-related certificates; Jia et al [21] proposed a blockchain-based cross-domain authentication system applied to the authentication process for data access to different IoT application domains; e study [22] was based on blockchain and elliptic curve cryptosystem cross-data center authentication and key exchange programs.…”
Section: Introductionmentioning
confidence: 99%