An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
Xingxing CHEN, Qingfeng CHENG, Weidong YANG, Xiangyang LUO
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device nodes are connected to the network, generating massive amounts of data. Therefore, it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission. At present, blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability. Recently, Fan et al. proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme. We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes. To overcome these security flaws, this paper proposes an enhanced authentication and data transmission scheme, which is verified by formal security proofs and informal security analysis. Furthermore, Scyther is applied to prove the security of the proposed scheme. Moreover, it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.
Internet of Things / blockchain / authentication / data transmission
Xingxing Chen received her MS degree in School of Information Science and Engineering from Henan University of Technology, China in 2021. She is currently pursuing the PhD degree at the State Key Laboratory of Mathematical Engineering and Advanced Computing, China. Her research interests are information security and blockchain
Qingfeng Cheng received the MS degree from National University of Defense Technology, China in 2004 and PhD degree from Information Engineering University, China in 2011. He is now a professor in the State Key Laboratory of Mathematical Engineering and Advanced Computing, China. His research interests include cryptography and information security
Weidong Yang received his BS in Industrial Automation, MS and PhD degree in Computer Science from Xidian University, China in 1999, 2005, and 2008, respectively. He is now a professor in Henan University of Technology, deputy chair of Henan Key Laboratory of Grain Photoelectric Detection and Control, Henan University of Technology, China. He is also a senior member of China Computer Federation (CCF). His research focuses on wireless networks security, privacy protection, vehicular ad-hoc networks, and so on
Xiangyang Luo received his BS, MS and PhD degrees from the State Key Laboratory of Mathematical Engineering and Advanced Computing, China in 2001, 2004, and 2010, respectively. He is the author or co-author of more than 150 refereed international journal and conference papers. He is currently a professor of the State Key Laboratory of Mathematical Engineering and Advanced Computing, also with Key Laboratory of Cyberspace Situation Awareness of Henan Province. His research interests are multimedia security and network security
[1] |
Hasan M. State of IoT-Spring 2022. IOT Analytics, See iot-analytics.com/product/state-of-iot-spring-2022 website, 2022
|
[2] |
Wang X, Ning Z, Hu X, Wang L, Hu B, Cheng J, Leung V C M . Optimizing content dissemination for real-time traffic management in large-scale internet of vehicle systems. IEEE Transactions on Vehicular Technology, 2019, 68( 2): 1093–1105
|
[3] |
Kelly J T, Campbell K L, Gong E, Scuffham P . The internet of things: impact and implications for health care delivery. Journal of Medical Internet Research, 2020, 22( 11): e20135
|
[4] |
Zemrane H, Baddi Y, Hasbi A. Internet of things smart home ecosystem. In: Elhoseny M, Hassanien A E, eds. Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks. Cham: Springer, 2020, 101−125
|
[5] |
Miloslavskaya N, Tolstoy A . Internet of things: information security challenges and solutions. Cluster Computing, 2019, 22( 1): 103–119
|
[6] |
Khan M A, Salah K . IoT security: review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018, 82: 395–411
|
[7] |
Fakhri D, Mutijarsa K. Secure IoT communication using blockchain technology. In: Proceedings of 2018 International Symposium on Electronics and Smart Devices (ISESD). 2018, 1−6
|
[8] |
Fan Q, Chen J H, Deborah L J, Luo M . A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. Journal of Systems Architecture, 2021, 117: 102112
|
[9] |
Liu S G, Dibaei M, Tai Y, Chen C, Zhang J, Xiang Y . Cyber vulnerability intelligence for internet of things binary. IEEE Transactions on Industrial Informatics, 2020, 16( 3): 2154–2163
|
[10] |
Xu Z, Xu C, Chen H, Yang F . A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and Computation: Practice and Experience, 2019, 31( 14): e5295
|
[11] |
Alzahrani B A, Irshad A, Albeshri A, Alsubhi K . A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wireless Personal Communications, 2021, 117( 1): 47–69
|
[12] |
Adavoudi-Jolfaei H, Ashouri-Talouki M, Aghili S F . Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Networking and Applications, 2019, 12( 1): 43–59
|
[13] |
Gope P, Hwang T . A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics, 2016, 63( 11): 7124–7132
|
[14] |
Kumar P, Chouhan L . A secure authentication scheme for IoT application in smart home. Peer-to-Peer Networking and Applications, 2021, 14( 1): 420–438
|
[15] |
Bera B, Vangala A, Das A K, Lorenz P, Khan M K . Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Computer Standards & Interfaces, 2022, 80: 103567
|
[16] |
Islam T, Youki R A, Chowdhury B R, Hasan A S M T. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In: Proceedings of the International Conference on Big Data, IoT, and Machine Learning. 2022, 431−444
|
[17] |
Panda S S, Jena D, Mohanta B K, Ramasubbareddy S, Daneshmand M, Gandomi A H . Authentication and key management in distributed IoT using blockchain technology. IEEE Internet of Things Journal, 2021, 8( 16): 12947–12954
|
[18] |
Kshetri N . Can blockchain strengthen the internet of things?. IT Professional, 2017, 19( 4): 68–72
|
[19] |
Cui Z, Xue F, Zhang S, Cai X, Cao Y, Zhang W, Chen J . A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, 2020, 13( 2): 241–251
|
[20] |
Khalid U, Asim M, Baker T, Hung P C K, Tariq M A, Rafferty L . A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Computing, 2020, 23( 3): 2067–2087
|
[21] |
Yang X, Yang X, Yi X, Khalil I, Zhou X, He D, Huang X, Nepal S . Blockchain-based secure and lightweight authentication for internet of things. IEEE Internet of Things Journal, 2022, 9( 5): 3321–3332
|
[22] |
Choi K Y, Hwang J Y, Lee D H, Seo I S. ID-based authenticated key agreement for low-power mobile devices. In: Proceedings of the 10th Australasian Conference on Information Security and Privacy. 2005, 494−505
|
[23] |
Guo Z, Ni Y, Wong W S, Shi L . Time synchronization attack and countermeasure for multisystem scheduling in remote estimation. IEEE Transactions on Automatic Control, 2021, 66( 2): 916–923
|
[24] |
Tabassum N, Geetha D D, Biradar R C. Joint position estimation and synchronization of clocks in WSN. In: Proceedings of the 6th International Congress on Information and Communication Technology. 2022, 409−418
|
[25] |
Pointcheval D, Stern J . Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13( 3): 361–396
|
[26] |
Cremers C J F. The scyther tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification. 2008, 414−418
|
[27] |
Lowe G. A hierarchy of authentication specifications. In: Proceedings of the 10th Computer Security Foundations Workshop. 1997, 31−43
|
[28] |
Wu T Y, Wang T, Lee Y Q, Zheng W, Kumari S, Kumar S. Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Security and Communication Networks , 2021, 2021, 1−16
|
[29] |
Li Y, Cheng Q, Liu X, Li X . A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal, 2021, 15( 1): 935–946
|
[30] |
Jia X, He D, Kumar N, Choo K K R A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal, 2020, 14(1): 560−571
|
/
〈 | 〉 |