4.2 Article

A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT

Journal

MOBILE INFORMATION SYSTEMS
Volume 2020, Issue -, Pages -

Publisher

HINDAWI LTD
DOI: 10.1155/2020/8889192

Keywords

-

Funding

  1. National Natural Science Foundation of China [61976064]
  2. Project of National Defence Science, and Technology Innovation Zone [18-H863-01-ZT-005-027-02]
  3. Equipment Pre-research Key Laboratory Fund Project [61421030203]

Ask authors/readers for more resources

The fifth-generation mobile communication technology (5G) provides high-bandwidth and low-latency data channels for massive IoT terminals to access the core business network. At the same time, it also brings higher security threats and challenges. Terminal identity authentication is an important security mechanism to ensure the core business network; however, most of the existing solutions adopt a centralized authentication model. Once the number of authentication requests exceeds the processing capacity of the authentication center service, it will cause authentication request congestion or deadlock. The decentralized authentication model can effectively solve the above problems. This article proposes a decentralized IoT authentication scheme called A(2) Chain. First, A(2) Chain uses edge computing to decentralize the processing of authentication requests and eliminate the burden on authentication services and the network. Second, to implement cross-domain identity verification of IoT devices, A(2) Chain uses blockchain, and sidechain technologies are used to securely share the identity verification information of IoT devices. Additionally, A(2) Chain replaces public key infrastructure (PKI) algorithm with identity-based cryptography (IBC) algorithm to eliminate the management overhead caused by centralized authentication model.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available