Blockchain enabled zero trust based authentication scheme for railway communication networks

被引:0
|
作者
Yuan Feng
Zhangdui Zhong
Xiaofang Sun
Lei Wang
Yunlong Lu
Yongsheng Zhu
机构
[1] Collaborative Innovation Center of Railway Traffic Safety,State Key Lab of Rail Traffic Control & Safety
[2] Beijing Jiaotong University,School of Electronic and Information Engineering
[3] Beijing Jiaotong University,Institute of Computing Technologies
[4] Industrial and Commercial Bank of China Shandong Branch,undefined
[5] China Academy of Railway Sciences Corporation Limited,undefined
来源
关键词
Railway communication network; Blockchain; Zero-trust; Authentication; Network security;
D O I
暂无
中图分类号
学科分类号
摘要
With the introduction of emerging technologies such as cloud computing, the railway communication network has the characteristics of complex structure and blurred boundaries, which leads to a series of security threats including information leakage and malicious access. Specifically, the third-party cloud services are difficult to be supervised, and network traffic is untrustworthy. To ensure system security, we propose a zero-trust security model in this paper. Then, we introduce blockchain and Merkle tree to build a distributed identity storage scheme for guaranteeing reliable, confidential and efficient data updates, and improving authentication efficiency. Furthermore, the proxy was introduced for two-way authentication with cloud servers, so that internal and external threats could be counteracted. Moreover, reputation assessment mechanism has been adopted to reduce the possibility of nodes accessing malicious cloud services. Performance analysis demonstrated that the proposed security model is able to enhance the security, efficiency and stability of the system, and consequently can guarantee the safety and reliability of railway transportation.
引用
收藏
相关论文
共 50 条
  • [1] Blockchain enabled zero trust based authentication scheme for railway communication networks
    Feng, Yuan
    Zhong, Zhangdui
    Sun, Xiaofang
    Wang, Lei
    Lu, Yunlong
    Zhu, Yongsheng
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [2] A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments
    Li, Siwei
    Zhang, Hui
    Shi, Hui
    Ma, Maode
    Wang, Cong
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (14): : 20682 - 20714
  • [3] Anonymous Authentication Scheme Based on Trust and Blockchain in VANETs
    Zhang, Li
    Xu, Jianbo
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT II, 2022, 13156 : 473 - 488
  • [4] Lightweight Mutual Authentication Scheme Enabled by Stateless Blockchain for UAV Networks
    Kong, Lingjun
    Chen, Bing
    Hu, Feng
    Zhang, Ji
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] A decentralized blockchain-based authentication scheme for cross-communication in IoT networks
    Chaira, Mahmoud
    Aouag, Sofiane
    Cherroun, Hadda
    Brik, Bouziane
    Rezgui, Abdelmounaam
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2505 - 2523
  • [6] Proof-of-Communication-Capability Based Authentication in Blockchain-enabled Wireless Autonomous Vehicular Networks
    Khan, Ali Hussain
    Ahmed, Chaudhry Mujeeb
    Hassan, Naveed Ul
    Uzmi, Zartash Afzal
    [J]. 2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [7] Zero trust in edge computing environment: a blockchain based practical scheme
    Li, Dawei
    Zhang, Enzhun
    Lei, Ming
    Song, Chunxiao
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (04) : 4196 - 4216
  • [8] A Blockchain-Based Authentication Scheme for 5G-Enabled IoT
    Bidisha Goswami
    Hiten Choudhury
    [J]. Journal of Network and Systems Management, 2022, 30
  • [9] Privacy-preserving authentication scheme based on zero trust architecture
    Fei Tang
    Chunliang Ma
    Kefei Cheng
    [J]. Digital Communications and Networks, 2024, 10 (05) : 1211 - 1220
  • [10] Privacy-preserving authentication scheme based on zero trust architecture
    Tang, Fei
    Ma, Chunliang
    Cheng, Kefei
    [J]. Digital Communications and Networks, 2024, 10 (05) : 1211 - 1220