首站-论文投稿智能助手
典型文献
A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
文献摘要:
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture any-more.The device-to-device continuous authentication protocol is one of the most crucial cornerstones,es-pecially in the IoT scenario.In the zero-trust archi-tecture,trust does not rely on any position,person or device.However,to the best of our knowledge,almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values.This is betrayed by the principle of zero-trust architecture.In this paper,we employ the blockchain to eliminate the trusted node.One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism.Additionally,the devices are categorized into three folds:trusted device,suspected device and untrusted device.Only the first two can participate in authentication,and they have different lengths of security parameters and in-tervals to reach a better balance between security and efficiency.Then we prove the security of the initial authentication part in the eCK model and give an in-formal analysis of the continuous authentication part.Finally,we implement the proposed protocol on sim-ulated devices.The result illustrates that our scheme is highly efficient,and the continuous authentication only costs around 0.1ms.
文献关键词:
作者姓名:
Lei Meng;Daochao Huang;Jiahang An;Xianwei Zhou;Fuhong Lin
作者机构:
School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083,China;National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC),Beijing 100029,China;Shunde Graduate School of University of Science and Technology Beijing,Guangdong,528399,China
引用格式:
[1]Lei Meng;Daochao Huang;Jiahang An;Xianwei Zhou;Fuhong Lin-.A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture)[J].中国通信(英文版),2022(08):198-213
A类:
betrayed,tervals,eCK
B类:
Continuous,Authentication,Protocol,Without,Trust,Authority,Zero,Architecture,security,novel,concept,cope,intricate,access,which,can,not,handled,by,conventional,perimeter,architecture,any,more,continuous,authentication,protocol,crucial,cornerstones,pecially,IoT,scenario,In,zero,does,rely,position,person,However,best,our,knowledge,almost,existing,relies,authority,node,generate,secret,keys,values,This,principle,this,paper,employ,blockchain,eliminate,One,chosen,produce,public,two,entities,through,practical,Byzantine,fault,tolerance,consensus,mechanism,Additionally,devices,are,categorized,into,three,folds,suspected,untrusted,Only,first,participate,they,have,different,lengths,parameters,reach,better,balance,between,efficiency,Then,prove,initial,model,give,formal,analysis,Finally,implement,proposed,sim,ulated,result,illustrates,that,scheme,highly,efficient,only,costs,around,1ms
AB值:
0.549957
相似文献
Structured Sparse Coding With the Group Log-regularizer for Key Frame Extraction
Zhenni Li;Yujie Li;Benying Tan;Shuxue Ding;Shengli Xie-School of Automation,Guangdong University of Technology,Guangzhou 510006,and also with the Guangdong-Hong Kong-Macao Joint Laboratory for Smart Discrete Manufacturing,Guangdong University of Technology(GDUT),Guangzhou 510006,China;School of Artificial Intelligence,Guilin University of Electronic Technology,Guilin 541004,China,and also with the National Institute of Advanced Industrial Science and Technology,Tsukuba,Ibaraki 305-8560,Japan;School of Artificial Intelligence,Guilin University of Electronic Technology,Guilin 541004,China;Key Laboratory of Intelligent Information Processing and System Integration of IoT(GDUT),Ministry of Education,and with Guangdong Key Laboratory of IoT Information Technology(GDUT),Guangzhou 510006,China
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。