计算机科学
认证(法律)
节点(物理)
计算机安全
信任锚
计算机网络
协议(科学)
身份验证协议
建筑
数据认证算法
公钥密码术
计算信任
加密
法学
医学
工程类
艺术
病理
结构工程
视觉艺术
声誉
替代医学
政治学
作者
Lei Meng,Daochao Huang,Jiahang An,Xianwei Zhou,Fuhong Lin
出处
期刊:China Communications
[Institute of Electrical and Electronics Engineers]
日期:2022-08-01
卷期号:19 (8): 198-213
被引量:7
标识
DOI:10.23919/jcc.2022.08.015
摘要
Zero-trust security is a novel concept to cope with intricate access, which can not be handled by the conventional perimeter-based architecture anymore. The device-to-device continuous authentication protocol is one of the most crucial cornerstones, especially in the IoT scenario. In the zero-trust architecture, trust does not rely on any position, person or device. However, to the best of our knowledge, almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values. This is betrayed by the principle of zero-trust architecture. In this paper, we employ the blockchain to eliminate the trusted node. One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism. Additionally, the devices are categorized into three folds: trusted device, suspected device and untrusted device. Only the first two can participate in authentication, and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency. Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part. Finally, we implement the proposed protocol on simulated devices. The result illustrates that our scheme is highly efficient, and the continuous authentication only costs around 0.1ms.
科研通智能强力驱动
Strongly Powered by AbleSci AI