Abstract
Most of the existing identity-based authentication solutions rely on a centralized key generation center, resulting in the potential risk of single point of failure. Furthermore, there is a lack of heterogeneous authentication schemes that can realize authentication between users in different cryptosystems. In this study, we first present an identity-based authentication protocol with distributed authorization centers based upon blockchain. Next, we extend our fundamental protocol to a heterogeneous environment by considering the mutual authentication between the Public Key Infrastructure (PKI)-based and the identity-based systems. Finally, the proposed work is validated through the comparisons with the benchmarks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liao, S., Wu, J., Mumtaz, S., et al.: Cognitive balance for fog computing resource in internet of things: an edge learning approach. IEEE Trans. Mob. Comput. 21(5), 1596–1608 (2022)
Xu, J.: Analysis and improvement on security of authentication scheme based on password. J. Shandong Univ. Technol. (Nat. Sci. Ed.) 33(03), 19–22 (2019)
Hemalatha, S.: A systematic review on Fingerprint based Biometric Authentication System. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering. IEEE, New York (2020)
Ma, Z., Yang, Y., Liu, X., et al.: EmIr-Auth: eye movement and iris-based portable remote authentication for smart grid. IEEE Trans. Industr. Inf. 16(10), 6597–6606 (2020)
Chen, X.L., Su, H., Yang, D.Y.: Application of Kerberos in authentication of existing system. Cyberspace Secur. 13(01), 23–28 (2022)
Wang, J., Wu, L., Choo, K.-K.R., He, D.: Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans. Ind. Inf. 16(3), 1984–1992 (2020)
Vijayakumar, P., Obaidat, M.S., Azees, M., et al.: Efficient and secure anonymous authentication with location privacy for IoT-based WBANs. IEEE Trans. Ind. Inf. 16(4), 2603–2611 (2020)
Yang, W., Wang, N., Guan, Z., et al.: A practical cross device federated learning framework over 5G networks. IEEE Wirel. Commun. 99, 1 (2022)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Zeng, S.Q., Huo, R., Huang, T., et al.: Survey of blockchain: principle, progress and application. J. Commun. 41(01), 134–151 (2020)
Lin, X., Wu, J., Bashir, A.K., et al.: Blockchain-based incentive energy-knowledge trading in IoT: Joint power transfer and AI design. IEEE Internet Things J. 9(16), 14685–14698 (2022)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (2011)
Park, S., Kim, H., Ryou, J.: Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment. J. Supercomput. 74(12), 6988–7002 (2018). https://doi.org/10.1007/s11227-018-2506-3
Xu, J., Xue, K., Tian, H., et al.: An identity management and authentication scheme based on redactable blockchain for mobile networks. IEEE Trans. Veh. Technol. 69(6), 6688–6698 (2020)
Jiang, Z.T., Xu, J.J.: Efficient heterogeneous cross-domain authentication scheme based on proxy blind signature in cloud environment. Comput. Sci. 47(11), 60–67 (2020)
Tan, C., Chen, M.J.: Research on distributed identity authentication mechanism of IoT device based on blockchain. Chin. J. Internet Things 4(02), 70–77 (2020)
Li, S., Zhang, T., Yu, B., et al.: A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT. IEEE Sens. J. 21(4), 5487–5501 (2021)
Irshad, A., Chaudhry, S.A., Alomari, O.A., et al.: A novel pairing-free lightweight authentication protocol for mobile cloud computing framework. IEEE Syst. J. 15(3), 3664–3672 (2021)
Zhang, W.F., Lei, L.T., Wang, X.M., et al.: Secure and efficient authentication and key agreement protocol using certificateless aggregate signature for cloud service oriented VANET. Acta Electron. Sin. 48(09), 1814–1823 (2020)
Tang, F., Bao, J., Huang, Y., et al.: Identity-based identification scheme without trusted party against concurrent attacks. Secur. Commun. Netw. 2020, 1–9 (2020)
He, D., Kumar, N., Khan, M.K., et al.: Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst. J. 12(2), 1621–1631 (2018)
Karati, A., Amin, R., Islam, S.H., et al.: Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment. IEEE Trans. Cloud Comput 9(1), 318–330 (2021)
Chaudhry, S.A., Kim, I.L., Rho, S., et al.: An improved anonymous authentication scheme for distributed mobile cloud computing services. Clust. Comput. 22(1), 1595–1609 (2019)
Akinyele, J.A., Garman, C., Miers, I., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111–128 (2013)
Acknowledgment
This work is supported by the science and technology project in State Grid Corporation of China entitled “Research on Information Security Supporting and Identity Management Key Technologies for Energy and Power Blockchains” (Grant No. 5700-202158411A-0–0-00).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
An, N., Liang, X., Wang, X., Wang, R., Yuan, S., Guan, Z. (2023). Mutual Authentication Protocol in a Distributed Heterogeneous Environment: A Blockchain-Based Approach. In: Quan, W. (eds) Emerging Networking Architecture and Technologies. ICENAT 2022. Communications in Computer and Information Science, vol 1696. Springer, Singapore. https://doi.org/10.1007/978-981-19-9697-9_13
Download citation
DOI: https://doi.org/10.1007/978-981-19-9697-9_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9696-2
Online ISBN: 978-981-19-9697-9
eBook Packages: Computer ScienceComputer Science (R0)