4.2 Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Journal

WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Volume 2021, Issue -, Pages -

Publisher

WILEY-HINDAWI
DOI: 10.1155/2021/9942950

Keywords

-

Funding

  1. National Natural Science Foundation of China [61802086, U20B2048]
  2. Defense Industrial Technology Development Program [2020604B004]
  3. Heilongjiang Provincial Natural Science Foundation of China [LH2021F016]
  4. Fundamental Research Funds for the Central Universities [3072021CF0608]

Ask authors/readers for more resources

This article proposes a cross-domain authentication scheme based on certificate-less public key cryptography and smart contract technology, supporting parameter differentiation, which improves cross-domain identity authorization authentication ability.
With the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as an example. It is one of the key technologies of data sharing between heterogeneous IoT organizations to cross the boundary of the security domain and verify the identity and authority of users in other security domains. Aiming at the slow speed of authentication protocol authority authentication during cross-domain access and without considering the actual cross-domain situation, the same cryptographic system parameters are used for all communication nodes in a cross-domain environment. This article proposes a heterogeneous Internet of Things data access authority authentication scheme between applications. Based on certificate-less public key cryptography and smart contract technology, a certificate-less cross-domain authentication scheme that supports parameter differentiation is designed and implemented. The theoretical and empirical analyses, comparing the communication volume, identity signature, and verification calculation cost, validated that the method proposed improves the cross-domain identity authorization authentication ability and supports the use of differentiated cryptographic system parameters among different IoT applications.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available