A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
With the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as a...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2021/9942950 |
id |
doaj-08f24a3a441043339ecf9ed9e1b0fa51 |
---|---|
record_format |
Article |
spelling |
doaj-08f24a3a441043339ecf9ed9e1b0fa512021-10-11T00:38:59ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772021-01-01202110.1155/2021/9942950A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT ApplicationsShichang Xuan0Haibo Xiao1Dapeng Man2Wei Wang3Wu Yang4Information Security Research CenterInformation Security Research CenterInformation Security Research CenterInformation Security Research CenterInformation Security Research CenterWith the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as an example. It is one of the key technologies of data sharing between heterogeneous IoT organizations to cross the boundary of the security domain and verify the identity and authority of users in other security domains. Aiming at the slow speed of authentication protocol authority authentication during cross-domain access and without considering the actual cross-domain situation, the same cryptographic system parameters are used for all communication nodes in a cross-domain environment. This article proposes a heterogeneous Internet of Things data access authority authentication scheme between applications. Based on certificate-less public key cryptography and smart contract technology, a certificate-less cross-domain authentication scheme that supports parameter differentiation is designed and implemented. The theoretical and empirical analyses, comparing the communication volume, identity signature, and verification calculation cost, validated that the method proposed improves the cross-domain identity authorization authentication ability and supports the use of differentiated cryptographic system parameters among different IoT applications.http://dx.doi.org/10.1155/2021/9942950 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shichang Xuan Haibo Xiao Dapeng Man Wei Wang Wu Yang |
spellingShingle |
Shichang Xuan Haibo Xiao Dapeng Man Wei Wang Wu Yang A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications Wireless Communications and Mobile Computing |
author_facet |
Shichang Xuan Haibo Xiao Dapeng Man Wei Wang Wu Yang |
author_sort |
Shichang Xuan |
title |
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications |
title_short |
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications |
title_full |
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications |
title_fullStr |
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications |
title_full_unstemmed |
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications |
title_sort |
cross-domain authentication optimization scheme between heterogeneous iot applications |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8677 |
publishDate |
2021-01-01 |
description |
With the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as an example. It is one of the key technologies of data sharing between heterogeneous IoT organizations to cross the boundary of the security domain and verify the identity and authority of users in other security domains. Aiming at the slow speed of authentication protocol authority authentication during cross-domain access and without considering the actual cross-domain situation, the same cryptographic system parameters are used for all communication nodes in a cross-domain environment. This article proposes a heterogeneous Internet of Things data access authority authentication scheme between applications. Based on certificate-less public key cryptography and smart contract technology, a certificate-less cross-domain authentication scheme that supports parameter differentiation is designed and implemented. The theoretical and empirical analyses, comparing the communication volume, identity signature, and verification calculation cost, validated that the method proposed improves the cross-domain identity authorization authentication ability and supports the use of differentiated cryptographic system parameters among different IoT applications. |
url |
http://dx.doi.org/10.1155/2021/9942950 |
work_keys_str_mv |
AT shichangxuan acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT haiboxiao acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT dapengman acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT weiwang acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT wuyang acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT shichangxuan crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT haiboxiao crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT dapengman crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT weiwang crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications AT wuyang crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications |
_version_ |
1716829166503985152 |