A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

With the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as a...

Full description

Bibliographic Details
Main Authors: Shichang Xuan, Haibo Xiao, Dapeng Man, Wei Wang, Wu Yang
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2021/9942950
id doaj-08f24a3a441043339ecf9ed9e1b0fa51
record_format Article
spelling doaj-08f24a3a441043339ecf9ed9e1b0fa512021-10-11T00:38:59ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772021-01-01202110.1155/2021/9942950A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT ApplicationsShichang Xuan0Haibo Xiao1Dapeng Man2Wei Wang3Wu Yang4Information Security Research CenterInformation Security Research CenterInformation Security Research CenterInformation Security Research CenterInformation Security Research CenterWith the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as an example. It is one of the key technologies of data sharing between heterogeneous IoT organizations to cross the boundary of the security domain and verify the identity and authority of users in other security domains. Aiming at the slow speed of authentication protocol authority authentication during cross-domain access and without considering the actual cross-domain situation, the same cryptographic system parameters are used for all communication nodes in a cross-domain environment. This article proposes a heterogeneous Internet of Things data access authority authentication scheme between applications. Based on certificate-less public key cryptography and smart contract technology, a certificate-less cross-domain authentication scheme that supports parameter differentiation is designed and implemented. The theoretical and empirical analyses, comparing the communication volume, identity signature, and verification calculation cost, validated that the method proposed improves the cross-domain identity authorization authentication ability and supports the use of differentiated cryptographic system parameters among different IoT applications.http://dx.doi.org/10.1155/2021/9942950
collection DOAJ
language English
format Article
sources DOAJ
author Shichang Xuan
Haibo Xiao
Dapeng Man
Wei Wang
Wu Yang
spellingShingle Shichang Xuan
Haibo Xiao
Dapeng Man
Wei Wang
Wu Yang
A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
Wireless Communications and Mobile Computing
author_facet Shichang Xuan
Haibo Xiao
Dapeng Man
Wei Wang
Wu Yang
author_sort Shichang Xuan
title A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
title_short A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
title_full A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
title_fullStr A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
title_full_unstemmed A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications
title_sort cross-domain authentication optimization scheme between heterogeneous iot applications
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8677
publishDate 2021-01-01
description With the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as an example. It is one of the key technologies of data sharing between heterogeneous IoT organizations to cross the boundary of the security domain and verify the identity and authority of users in other security domains. Aiming at the slow speed of authentication protocol authority authentication during cross-domain access and without considering the actual cross-domain situation, the same cryptographic system parameters are used for all communication nodes in a cross-domain environment. This article proposes a heterogeneous Internet of Things data access authority authentication scheme between applications. Based on certificate-less public key cryptography and smart contract technology, a certificate-less cross-domain authentication scheme that supports parameter differentiation is designed and implemented. The theoretical and empirical analyses, comparing the communication volume, identity signature, and verification calculation cost, validated that the method proposed improves the cross-domain identity authorization authentication ability and supports the use of differentiated cryptographic system parameters among different IoT applications.
url http://dx.doi.org/10.1155/2021/9942950
work_keys_str_mv AT shichangxuan acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT haiboxiao acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT dapengman acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT weiwang acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT wuyang acrossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT shichangxuan crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT haiboxiao crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT dapengman crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT weiwang crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
AT wuyang crossdomainauthenticationoptimizationschemebetweenheterogeneousiotapplications
_version_ 1716829166503985152