Directed Path Based Authentication Scheme for the Internet of Things

被引:0
|
作者
Ning, Huansheng [1 ]
Liu, Hong [1 ]
Liu, Qing [2 ]
Ji, Genlin [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of things; security; authentication protocol; directed path; SENSOR; ARCHITECTURE; STANDARDS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the directed path descriptor is introduced for the secret key distribution and cross-network authentication, and the proof mapping is applied to establish tri-dimensional equivalence relations among diverse nodes for achieving mutual authentication. Moreover, security analysis shows that DPAS achieves data confidentiality and integrity, authentication, anonymity and forward security, and performance analysis indicates that DPAS with moderate communication overhead and computation load is suitable for the IoT applications.
引用
收藏
页码:1112 / 1131
页数:20
相关论文
共 50 条
  • [1] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [2] Lightweight Authentication Scheme for Internet of Things
    Haenel, Arie
    Haddad, Yoram
    Zhang, Zonghua
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [3] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [4] Authentication scheme for industrial Internet of things based on DAG blockchain
    Fei T.
    Kun D.
    Zhangtao Y.
    Guowei L.
    Fei, Tang (tangfei@cqupt.edu.cn), 1600, Beijing University of Posts and Telecommunications (28): : 1 - 12
  • [5] A payload-based mutual authentication scheme for Internet of Things
    Jan, Mian Ahmad
    Khan, Fazlullah
    Alam, Muhammad
    Usman, Muhammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 1028 - 1039
  • [6] Authentication scheme for industrial Internet of things based on DAG blockchain
    Tang Fei
    Dong Kun
    Ye Zhangtao
    Ling Guowei
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2021, 28 (06) : 1 - 12
  • [7] An Efficient Mutual Authentication Scheme for Internet of Things
    Mbarek, Bacem
    Ge, Mouzhi
    Pitner, Tomas
    INTERNET OF THINGS, 2020, 9
  • [8] A lightweight hierarchical authentication scheme for internet of things
    Aida Akbarzadeh
    Majid Bayat
    Behnam Zahednejad
    Ali Payandeh
    Mohammad Reza Aref
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2607 - 2619
  • [9] Security Authentication Scheme for Power Internet of Things
    Dang, Fang Fang
    Li, Shuai
    Yan, Li Jing
    Li, Ding Ding
    2022 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2022), 2022, : 94 - 97
  • [10] A lightweight hierarchical authentication scheme for internet of things
    Akbarzadeh, Aida
    Bayat, Majid
    Zahednejad, Behnam
    Payandeh, Ali
    Aref, Mohammad Reza
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (07) : 2607 - 2619