Abstract

The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a trusted third party, the traditional centralized authentication model not only destroys the autonomy and flexibility of the application system, but also causes issues such as single point of failure and hidden dangers of unilateral control. This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things. This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional PKI authentication algorithm. The scheme proposed in this paper implements a decentralized authentication model, which can guarantee the autonomy and initiative of the security domain.

Highlights

  • Internet of Things, referred to as internet of things (IoT), has become one of the most eye-catching technologies in recent years

  • IRBA explored the cross-domain access control problems caused by multiple IoT applications and proposed a novel solution with low cost, fast response, and anti-attack function, while eliminating the security risks brought by trusted third parties

  • Ma et al proposed a cross-heterogeneous domain authentication scheme based on Blockchain technology, in which the consortium chain model is composed of a Blockchain domain proxy server in the Identity-based cryptosystem (IBC) domain and PKI domain Blockchain certificate server [36]

Read more

Summary

Introduction

Internet of Things, referred to as IoT, has become one of the most eye-catching technologies in recent years. IRBA explored the cross-domain access control problems caused by multiple IoT applications and proposed a novel solution with low cost, fast response, and anti-attack function, while eliminating the security risks brought by trusted third parties. Compared with the previous research works, the innovations and contributions of IRBA are as follows: Proposed a cross-domain access control oriented authentication method based on IBC (Identity-Based Cryptograph) algorithm. In the identity authentication stage, IRBA uses the identity of the IoT terminal to replace digital certificates issued by third parties and implements a decentralized identity authentication. IRBA has designed a joint authorization method for cross-domain access With this method, authentication servers in different application domains can jointly calculate the authorization signature and can independently verify the authorization signature.

Centralized Cross-Domain Authentication Scheme
Decentralized Cross-Domain Authentication Scheme
Motivation and Objectives
Basic Idea
Identifier of Object
Identity-Based Signature Algorithm
As is untrustworthy
As is trustworthy
Threshold Signature Algorithm
Authority validation
Smart Contracts in IRBA
Authority for Cross-Domain Access
Cross-Domian Authentication Process
Cross-Domian
System
Conceptual
Processing
Processing Performance of Authorization Verify
Processing Performance of the Authentication
Conclusion
Findings
10 Augest

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.