Skip to main content

Mutual Authentication Protocol in a Distributed Heterogeneous Environment: A Blockchain-Based Approach

  • Conference paper
  • First Online:
Emerging Networking Architecture and Technologies (ICENAT 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1696))

  • 760 Accesses

Abstract

Most of the existing identity-based authentication solutions rely on a centralized key generation center, resulting in the potential risk of single point of failure. Furthermore, there is a lack of heterogeneous authentication schemes that can realize authentication between users in different cryptosystems. In this study, we first present an identity-based authentication protocol with distributed authorization centers based upon blockchain. Next, we extend our fundamental protocol to a heterogeneous environment by considering the mutual authentication between the Public Key Infrastructure (PKI)-based and the identity-based systems. Finally, the proposed work is validated through the comparisons with the benchmarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liao, S., Wu, J., Mumtaz, S., et al.: Cognitive balance for fog computing resource in internet of things: an edge learning approach. IEEE Trans. Mob. Comput. 21(5), 1596–1608 (2022)

    Article  Google Scholar 

  2. Xu, J.: Analysis and improvement on security of authentication scheme based on password. J. Shandong Univ. Technol. (Nat. Sci. Ed.) 33(03), 19–22 (2019)

    Google Scholar 

  3. Hemalatha, S.: A systematic review on Fingerprint based Biometric Authentication System. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering. IEEE, New York (2020)

    Google Scholar 

  4. Ma, Z., Yang, Y., Liu, X., et al.: EmIr-Auth: eye movement and iris-based portable remote authentication for smart grid. IEEE Trans. Industr. Inf. 16(10), 6597–6606 (2020)

    Article  Google Scholar 

  5. Chen, X.L., Su, H., Yang, D.Y.: Application of Kerberos in authentication of existing system. Cyberspace Secur. 13(01), 23–28 (2022)

    Google Scholar 

  6. Wang, J., Wu, L., Choo, K.-K.R., He, D.: Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans. Ind. Inf. 16(3), 1984–1992 (2020)

    Article  Google Scholar 

  7. Vijayakumar, P., Obaidat, M.S., Azees, M., et al.: Efficient and secure anonymous authentication with location privacy for IoT-based WBANs. IEEE Trans. Ind. Inf. 16(4), 2603–2611 (2020)

    Article  Google Scholar 

  8. Yang, W., Wang, N., Guan, Z., et al.: A practical cross device federated learning framework over 5G networks. IEEE Wirel. Commun. 99, 1 (2022)

    Google Scholar 

  9. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  10. Zeng, S.Q., Huo, R., Huang, T., et al.: Survey of blockchain: principle, progress and application. J. Commun. 41(01), 134–151 (2020)

    Google Scholar 

  11. Lin, X., Wu, J., Bashir, A.K., et al.: Blockchain-based incentive energy-knowledge trading in IoT: Joint power transfer and AI design. IEEE Internet Things J. 9(16), 14685–14698 (2022)

    Article  Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (2011)

    Article  MATH  Google Scholar 

  13. Park, S., Kim, H., Ryou, J.: Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment. J. Supercomput. 74(12), 6988–7002 (2018). https://doi.org/10.1007/s11227-018-2506-3

    Article  Google Scholar 

  14. Xu, J., Xue, K., Tian, H., et al.: An identity management and authentication scheme based on redactable blockchain for mobile networks. IEEE Trans. Veh. Technol. 69(6), 6688–6698 (2020)

    Article  Google Scholar 

  15. Jiang, Z.T., Xu, J.J.: Efficient heterogeneous cross-domain authentication scheme based on proxy blind signature in cloud environment. Comput. Sci. 47(11), 60–67 (2020)

    Google Scholar 

  16. Tan, C., Chen, M.J.: Research on distributed identity authentication mechanism of IoT device based on blockchain. Chin. J. Internet Things 4(02), 70–77 (2020)

    Google Scholar 

  17. Li, S., Zhang, T., Yu, B., et al.: A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT. IEEE Sens. J. 21(4), 5487–5501 (2021)

    Article  Google Scholar 

  18. Irshad, A., Chaudhry, S.A., Alomari, O.A., et al.: A novel pairing-free lightweight authentication protocol for mobile cloud computing framework. IEEE Syst. J. 15(3), 3664–3672 (2021)

    Article  Google Scholar 

  19. Zhang, W.F., Lei, L.T., Wang, X.M., et al.: Secure and efficient authentication and key agreement protocol using certificateless aggregate signature for cloud service oriented VANET. Acta Electron. Sin. 48(09), 1814–1823 (2020)

    Google Scholar 

  20. Tang, F., Bao, J., Huang, Y., et al.: Identity-based identification scheme without trusted party against concurrent attacks. Secur. Commun. Netw. 2020, 1–9 (2020)

    Article  Google Scholar 

  21. He, D., Kumar, N., Khan, M.K., et al.: Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst. J. 12(2), 1621–1631 (2018)

    Article  Google Scholar 

  22. Karati, A., Amin, R., Islam, S.H., et al.: Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment. IEEE Trans. Cloud Comput 9(1), 318–330 (2021)

    Article  Google Scholar 

  23. Chaudhry, S.A., Kim, I.L., Rho, S., et al.: An improved anonymous authentication scheme for distributed mobile cloud computing services. Clust. Comput. 22(1), 1595–1609 (2019)

    Article  Google Scholar 

  24. Akinyele, J.A., Garman, C., Miers, I., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111–128 (2013)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the science and technology project in State Grid Corporation of China entitled “Research on Information Security Supporting and Identity Management Key Technologies for Energy and Power Blockchains” (Grant No. 5700-202158411A-0–0-00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruimiao Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

An, N., Liang, X., Wang, X., Wang, R., Yuan, S., Guan, Z. (2023). Mutual Authentication Protocol in a Distributed Heterogeneous Environment: A Blockchain-Based Approach. In: Quan, W. (eds) Emerging Networking Architecture and Technologies. ICENAT 2022. Communications in Computer and Information Science, vol 1696. Springer, Singapore. https://doi.org/10.1007/978-981-19-9697-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9697-9_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9696-2

  • Online ISBN: 978-981-19-9697-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics