A security authentication scheme for mobile industrial IoT supply chains based on blockchain and group key management

ChaoYue Wang , Xian Zhao , Qingyuan Liu , Ting Chen , Tao Liu

›› 2026, Vol. 12 ›› Issue (2) : 283 -293.

PDF
›› 2026, Vol. 12 ›› Issue (2) :283 -293. DOI: 10.1016/j.dcan.2025.08.003
Regular Papers
research-article
A security authentication scheme for mobile industrial IoT supply chains based on blockchain and group key management
Author information +
History +
PDF

Abstract

Driven by globalization and digitization, the Mobile Industrial Supply Chain Internet of Things (IoT) has gradually developed, utilizing mobile devices and IoT technologies to enable real-time monitoring and efficient responses across various stages. However, with the growing demand for high-frequency data exchange, the Mobile Industrial Supply Chain IoT faces significant challenges in data security, authentication, and privacy protection. This paper proposes a security authentication scheme based on blockchain and group key management, leveraging the decentralized and tamper-resistant features of blockchain, the privacy-preserving authentication method of Zero-Knowledge Proofs (ZKP), and a hierarchical key management mechanism based on binary key trees. This approach aims to enhance the security and scalability of Mobile Industrial Supply Chain IoT. The experimental section simulates scenarios such as dynamic node addition and key updates, evaluating the performance in terms of encryption, decryption, and key management efficiency, thus demonstrating its superiority in multi-party collaborative environments.

Keywords

Blockchain / IoT / Authentication / ZKP / Key tree / Mobile industrial supply chain

Cite this article

Download citation ▾
ChaoYue Wang, Xian Zhao, Qingyuan Liu, Ting Chen, Tao Liu. A security authentication scheme for mobile industrial IoT supply chains based on blockchain and group key management. , 2026, 12(2): 283-293 DOI:10.1016/j.dcan.2025.08.003

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

ChaoYue Wang: Writing-review & editing, Writing-original draft, Project administration, Methodology, Investigation, Formal analysis, Data curation. Xian Zhao: Software, Funding acquisition, Formal analy-sis, Data curation, Conceptualization. Qingyuan Liu: Writing-original draft, Software, Resources, Project administration, Methodology, Fund-ing acquisition, Data curation. Ting Chen: Writing-original draft, Validation, Software, Resources, Conceptualization. Tao Liu: Writing-review & editing, Writing-original draft, Visualization, Resources, Funding acquisition, Data curation.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgement

This work was supported in part by the National Natural Science Foundation of China (62332004, 72304121), and part by the Sichuan Provincial Natural Science Foundation for Distinguished Young Scholars (2023NSFSC1963).

References

[1]

J. Dedrick, K.L. Kraemer, G. Linden, The distribution of value in the mobile phone supply chain, Telecommun. Policy 35 (6) (2011) 505-521.

[2]

T.-Y. Eng, Mobile supply chain management: challenges for implementation, Tech-novation 26 (5-6) (2006) 682-686.

[3]

J. Barata, P. Rupino Da Cunha, J. Stal,Mobile supply chain management in the industry 4.0 era: an annotated bibliography and guide for future research, J. Enterp. Inf. Manag. 31 (1) (2018) 173-192.

[4]

M. Belotti, N. Božić, G. Pujolle, S. Secci, A vademecum on blockchain technologies: when, which, and how, IEEE Commun. Surv. Tutor. 21 (4) (2019) 3796-3838.

[5]

W.H.D. Ng, M. Howarth, Z. Sun, H. Cruickshank, Dynamic balanced key tree man-agement for secure multicast communications, IEEE Trans. Comput. 56 (5) (2007) 590-605.

[6]

O. Goldreich, S. Micali, A. Wigderson, Proofs that yield nothing but their validity or all languages in np have zero-knowledge proof systems, J. ACM 38 (3) (1991) 690-728.

[7]

T.R. Gadekallu, T. Huynh-The, W. Wang, G. Yenduri, P. Ranaweera, Q.-V. Pham, D.B. da Costa, M. Liyanage,Blockchain for the metaverse: a review, arXiv preprint arXiv:2203.09738.

[8]

V. Lyubashevsky, N.K. Nguyen, M. Plançon, Lattice-based zero-knowledge proofs and applications:shorter, simpler, and more general, in: Annual International Cryptology Conference, Springer, 2022, pp. 71-101.

[9]

H. Sun, J. Xu, X. Jiang, G. Chen, Y. Yue, X. Qin, glsm: using gpgpu to accelerate compactions in lsm-tree-based key-value stores, ACM Trans. Storage 20 (1) (2024) 1-41.

[10]

Z. Chen, J. Tang, X.Y. Zhang, D.K.C. So, S. Jin, K.-K. Wong, Hybrid evolutionary-based sparse channel estimation for irs-assisted mmwave mimo systems, IEEE Trans. Wirel. Commun. 21 (3) (2021) 1586-1601.

[11]

Q. Zhang, Y. Wang, H. Li, S. Hou, Z. Song, Resource allocation for energy efficient star-ris aided mec systems, IEEE Wirel. Commun. Lett. 12 (4) (2023) 610-614.

[12]

C. Wanqiu, W. Dawei, H. Na, Survey on fake information generation, dissemination and detection, Chin. J. Electron. 33 (3) (2024) 573-583.

[13]

H. Huang, S. Ghandeharizadeh, Nova-lsm: a distributed, component-based lsm-tree key-value store,in: Proceedings of the 2021 International Conference on Manage-ment of Data, 2021, pp. 749-763.

[14]

J. Li, Y. Ren, S. Han, P.P. Lee, Enhancing lsm-tree key-value stores for read-modify-writes via key-delta separation, in: 2024 IEEE 40th International Conference on Data Engineering (ICDE), IEEE, 2024, pp. 4938-4950.

[15]

M. Cai, X. Jiang, J. Shen, B. Ye, Splitdb: closing the performance gap for lsm-tree-based key-value stores, IEEE Trans. Comput. (2023).

[16]

S.-H. Chen, Y. Liang, M.-C. Yang, Kvstl: an application support to lsm-tree based key-value store via shingled translation layer data management, IEEE Trans. Comput. 71 (7) (2021) 1598-1611.

[17]

C. Ma, H. Yang, S. Wu, Y. Wang, R. Mao, Tidal-tree-mem: toward read-intensive key-value stores with tidal structure based on lsm-tree, IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 42 (2) (2022) 423-436.

[18]

J. Shin, J. Wang, W.G. Aref, The lsm rum-tree: a log structured merge r-tree for update-intensive spatial workloads, in: 2021 IEEE 37th International Conference on Data Engineering (ICDE), IEEE, 2021, pp. 2285-2290.

[19]

Q. Yuan, Z. Xiaokang, Z. Qiong, Key technology and system design in mobile supply chain management, in: 2008 International Symposium on Electronic Commerce and Security, IEEE, 2008, pp. 258-262.

[20]

F.T. Chan, A.Y.-L. Chong, Determinants of mobile supply chain management system diffusion: a structural equation analysis of manufacturing firms, Int. J. Prod. Res. 51 (4) (2013) 1196-1213.

[21]

H. Yu, Q. Zheng, A lattice-based method for recovering the unknown parameters of truncated multiple recursive generators with constant, Chin. J. Electron. 33 (6) (2024) 1458-1467.

[22]

D. Mouris, N.G. Tsoutsos, Zilch: a framework for deploying transparent zero-knowledge proofs, IEEE Trans. Inf. Forensics Secur. 16 (2021) 3269-3284.

[23]

A. Bick, G. Kol, R. Oshman, Distributed zero-knowledge proofs over networks, in: Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), SIAM, 2022, pp. 2426-2458.

[24]

C. Weng, K. Yang, J. Katz, X. Wang, Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits, in: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, 2021, pp. 1074-1091.

[25]

D. Gabay, K. Akkaya, M. Cebe, Privacy-preserving authentication scheme for con-nected electric vehicles using blockchain and zero knowledge proofs, IEEE Trans. Veh. Technol. 69 (6) (2020) 5760-5772.

[26]

Y. Zhang, S. Wang, X. Zhang, J. Dong, X. Mao, F. Long, C. Wang, D. Zhou, M. Gao, G. Sun, Pipezk: accelerating zero-knowledge proof with a pipelined architecture, in: 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), IEEE, 2021, pp. 416-428.

[27]

Z. Wan, Y. Zhou, K. Ren, Zk-authfeed: protecting data feed to smart contracts with authenticated zero knowledge proof, IEEE Trans. Dependable Secure Comput. 20 (2) (2022) 1335-1347.

[28]

V. Lyubashevsky, N.K. Nguyen, G. Seiler,Practical lattice-based zero-knowledge proofs for integer relations, in:Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, pp. 1051-1070.

[29]

K. Yang, P. Sarkar, C. Weng, X. Wang, Quicksilver: efficient and affordable zero-knowledge proofs for circuits and polynomials over any field,in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, pp. 2986-3001.

[30]

J. Zhang, Z. Fang, Y. Zhang, D. Song,Zero knowledge proofs for decision tree pre-dictions and accuracy, in:Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, pp. 2039-2053.

[31]

X. Sun, F.R. Yu, P. Zhang, Z. Sun, W. Xie, X. Peng, A survey on zero-knowledge proof in blockchain, IEEE Netw. 35 (4) (2021) 198-205.

[32]

L. Zeyi, W. Pan, W. Zixuan, Flowgananomaly: flow-based anomaly network intrusion detection with adversarial learning, Chin. J. Electron. 33 (1) (2024) 58-71.

[33]

Y. Jiang, X. Xu, F. Xiao, Attribute-based encryption with blockchain protection scheme for electronic health records, IEEE Trans. Netw. Serv. Manag. 19 (4) (2022) 3884-3895.

[34]

B.B. Gupta, K.-C. Li, V.C. Leung, K.E. Psannis, S. Yamaguchi, et al., Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system, IEEE/CAA J. Autom. Sin. 8 (12) (2021) 1877-1890.

[35]

L. Jiamei, T. Lin, X.U. Hong, New related-tweakey boomerang attacks and distin-guishers on deoxys-bc, Chin. J. Electron. 33 (3) (2024) 683-693.

[36]

J. Chen, K. Li, S.Y. Philip, Privacy-preserving deep learning model for decentral-ized vanets using fully homomorphic encryption and blockchain, IEEE Trans. Intell. Transp. Syst. 23 (8) (2021) 11633-11642.

[37]

Y. Tian, Z. Wang, J. Xiong, J. Ma, A blockchain-based secure key management scheme with trustworthiness in dwsns, IEEE Trans. Ind. Inform. 16 (9) (2020) 6193-6202.

[38]

Z. Ma, J. Zhang, Y. Guo, Y. Liu, X. Liu, W. He, An efficient decentralized key man-agement mechanism for vanet with blockchain, IEEE Trans. Veh. Technol. 69 (6) (2020) 5836-5849.

[39]

Y. Tan, J. Liu, N. Kato, Blockchain-based key management for heterogeneous flying ad hoc network, IEEE Trans. Ind. Inform. 17 (11) (2020) 7629-7638.

[40]

B. Farahani, F. Firouzi, M. Luecking, The convergence of iot and distributed ledger technologies (dlt): opportunities, challenges, and solutions, J. Netw. Comput. Appl. 177 (2021) 102936.

[41]

J. Li, M. Kassem, Applications of distributed ledger technology (dlt) and blockchain-enabled smart contracts in construction, Autom. Constr. 132 (2021) 103955.

[42]

M. Asante, G. Epiphaniou, C. Maple, H. Al-Khateeb, M. Bottarelli, K.Z. Ghafoor, Dis-tributed ledger technologies in supply chain security management: a comprehensive survey, IEEE Trans. Eng. Manag. 70 (2) (2021) 713-739.

[43]

A. Cullen, P. Ferraro, C. King, R. Shorten, On the resilience of dag-based distributed ledgers in iot applications, IEEE Internet Things J. 7 (8) (2020) 7112-7122.

[44]

T. Liu, X. Xie, Y. Zhang, Zkcnn: zero knowledge proofs for convolutional neural net-work predictions and accuracy,in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, pp. 2968-2985.

[45]

S. Garg, A. Goel, S. Jha, S. Mahloujifar, M. Mahmoody, G.-V. Policharla, M. Wang,Experimenting with zero-knowledge proofs of training, in:Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, pp. 1880-1894.

[46]

J. Zhang, T. Xie, Y. Zhang, D. Song, Transparent polynomial delegation and its appli-cations to zero knowledge proof, in: 2020 IEEE Symposium on Security and Privacy (SP), IEEE, 2020, pp. 859-876.

[47]

M. Campanelli, D. Fiore, A. Querol,Legosnark: modular design and composition of succinct zero-knowledge proofs, in: Proceedings of the 2019 ACM SIGSAC Confer-ence on Computer and Communications Security, 2019, pp. 2075-2092.

[48]

A. Broadbent, Z. Ji, F. Song, J. Watrous, Zero-knowledge proof systems for qma, in: 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), IEEE, 2016, pp. 31-40.

[49]

Y. Yue, B. He, Y. Li, W. Wang, Building an efficient put-intensive key-value store with skip-tree, IEEE Trans. Parallel Distrib. Syst. 28 (4) (2016) 961-973.

[50]

T. Yao, J. Wan, P. Huang, X. He, F. Wu, C. Xie, Building efficient key-value stores via a lightweight compaction tree, ACM Trans. Storage 13 (4) (2017) 1-28.

[51]

B. Zhang, D.H. Du, Nvlsm: a persistent memory key-value store using log-structured merge tree with accumulative compaction, ACM Trans. Storage 17 (3) (2021) 1-26.

[52]

A. Natarajan, A. Ramachandran, N. Mittal, Feast: a lightweight lock-free concurrent binary search tree, ACM Trans. Parallel Comput. 7 (2) (2020) 1-64.

[53]

H. Cha, M. Nam, K. Jin, J. Seo, B. Nam, B3-tree: byte-addressable binary b-tree for persistent memory, ACM Trans. Storage 16 (3) (2020) 1-27.

[54]

K. Sethi, A. Pradhan, P. Bera, Practical traceable multi-authority cp-abe with out-sourcing decryption and access policy updation, J. Inf. Secur. Appl. 51 (2020) 102435.

[55]

K. Huang, Accountable and revocable large universe decentralized multi-authority attribute-based encryption for cloud-aided iot, IEEE Access 9 (2021) 123786-123804.

[56]

U.S. Varri, S. Kumar Pasupuleti, K. Kadambari, Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing, in: 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Comput-ing (CCGRID), 2020, pp. 450-458.

[57]

K. Edemacu, B. Jang, J.W. Kim, Collaborative ehealth privacy and security: an access control with attribute revocation based on obdd access structure, IEEE J. Biomed. Health Inform. 24 (10) (2020) 2960-2972.

[58]

A. Yazdinejad, R.M. Parizi, A. Dehghantanha, K.-K.R. Choo, Blockchain-enabled au-thentication handover with efficient privacy protection in sdn-based 5g networks, IEEE Trans. Netw. Sci. Eng. 8 (2) (2019) 1120-1132.

[59]

A. Yazdinejad, R.M. Parizi, A. Dehghantanha, H. Karimipour, G. Srivastava, M. Aled- hari, Enabling drones in the Internet of things with decentralized blockchain-based security, IEEE Internet Things J. 8 (8) (2020) 6406-6415.

PDF

4

Accesses

0

Citation

Detail

Sections
Recommended

/