Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios
Abstract
:1. Introduction
1.1. Contribution
- For the user authentication scenario of the IoT, we analyze the attacks faced by the three-layer structure of the IoT and summarize some methods, algorithms, and previous work of the IoT authentication. Finally, we describe the direction of our future research.
- Aiming at the requirements of vehicle security communication in the IoV, we introduce a trust management model based on blockchain, summarize some common consensus algorithms, and explore the future direction of trust management in the IoV.
- For IoT users’ cross-domain anonymous access requirements, we introduce a cross-domain anonymous authentication system model based on blockchain, summarize the previous work, and conclude and compare the performance parameters of several consensus algorithms.
1.2. Paper Outline
2. Challenges
2.1. Problems in Designing Security Protocols
2.2. Malicious Vehicles, Nodes Spread False Information
2.3. Privacy Issues in the IoT
3. IoT Security Protection: Selected Approaches and Algorithms
3.1. Chebyshev Chaotic Mapping
3.2. Biometric Identification Technology
- The original biological features were extracted and the m-bit feature vector y was obtained;
- We generated a pseudo-random matrix of using a user-specific token:, where n is the length of the final value;
- We converted the matrix to an orthonormal matrix ;
- Finally, we made a random projection of y and through the inner product.
3.3. Blockchain Solves the Trust Management Problem
- Proof-of-Work (PoW)A workload certificate can be simply understood as a certificate that confirms that someone have carried out a certain amount of work. The workload proof mechanism is the consensus mechanism adopted by Bitcoin. Miners obtain corresponding block rewards through hard mining.In a digital currency system, workload proof mainly guesses a nonce through calculation, so that the hash value of the content after it pieces together the transaction data meets a prescribed upper limit. As the hash value is obtained by the collision of the group lift method in mathematics, many calculations are needed. As long as the miners who can put forward random numbers that meet the requirements are considered to have been paid a certain amount of work, they can obtain the reward of this block.A hash operation is the most common workload proof mechanism. This mechanism mainly uses the complexity of hash operations through a given initial value, carries out a simple value increment operation, and uses the hash algorithm to solve it until the collision value that meets the conditions is found. The length of the collision value obtained by different hash algorithms is different, and the required workload and security performance are also different. The longer the collision value is, the more work is required. For the same hash algorithm, the number of the first N bits of the hash value can be set to 0 to adjust the operation’s difficulty. Bitcoin adjusts the mining difficulty according to this principle. The recommended miner election principle is:Here, Difficulty represents the hash value of the current block, and the system can adjust Difficulty by controlling the rate at which blocks are generated. The RSU responsible for generating a new block needs to compute the number at the fastest rate while satisfying the above inequality.The specific process is shown in Figure 7. The first node to find the appropriate nonce obtains the bookkeeping right. The node generates a new block and broadcasts it to other nodes, and these other nodes verify the block. If it passes the verification, it will accept the block and complete this round of consensus. Otherwise, it will reject the block and continue to search for the appropriate nonce. Thus far, it has been very difficult to find a nonce that meets the requirements, which requires nodes to consume a lot of computing power. With the continuous accumulation of effective blocks, malicious nodes need to consume a great deal of computing power to overturn the previous blocks.
- Proof-of-Stake (PoS)With the increasing number of people involved in Bitcoin mining, the disadvantages of PoW have been gradually exposed [66]. For example, due to the increasingly fierce competition for computing power, more energy consumption is needed to obtain tokens, which leads to the gradual concentration of accounting rights in the “mining pool” with a large amount of computing power. Based on this, researchers want to adopt a new mechanism instead of workload authentication. PoS came into being and proposed the concept of “coinage”, which is the accumulation of the product of token holding and holding time. PoS uses coin age competition instead of computing power competition to solve the problems existing in PoW.PoS also needs to calculate the hash value, but unlike PoW, it does not need to find the nonce value through continuous violence calculation. The specific process is shown in Figure 8. Each node only needs to calculate a hash once in each round of consensus. The more rights and interests it has, the greater the chance it has of meeting the hash goal and obtaining bookkeeping rights.
- Delegated-Proof-of-Stake (DPoS)The entrusted equity proof blockchain has a voting system, and stakeholders deliver their work to a third party. In other words, they can vote for several representatives to protect the network instead of themselves. Delegates are also called witnesses, and they need to reach a consensus in the process of generating and verifying new blocks. The voting right is proportional to the number of coins held by each user. The voting system varies from project to project, but generally, each delegate gives his or her own opinion when voting. Delegates collect awards and distribute them proportionally among their respective constituents.The specific process is shown in Figure 9. Token holders obtain votes through pledge tokens and select a number of nodes as block producers by voting to perform the obligation of generating blocks on behalf of token holders. DPoS is similar to the system of the company’s board of directors, which allows users with coins to entrust the work of production blocks to more competent professionals, and at the same time, they can enjoy the rewards of participating in the block. The nodes with the most votes from users become out-of-block nodes, with 21 nodes represented by the enterprise operation system (EoS). In each round of consensus, one outbound node is selected in turn to generate blocks and broadcast to other outbound nodes for verification. If the node fails to complete the block out within the specified time or generates invalid blocks, it will be disqualified and replaced by voting again to select a new block-out node.
- Practical Byzantine Fault Tolerance (PBFT)The Byzantine problem is a classic problem in distributed computing. The problem is described as follows. Suppose several Byzantine generals lead troops to surround a city. They must unanimously decide whether to launch a siege. If some generals decide to launch a siege without the participation of other generals, then their actions will end in failure. Generals are separated from each other by a certain distance, and they must rely on information transmission to communicate. Some cryptocurrency protocols use specific versions of BFT when reaching consensus, and each version has its own advantages and disadvantages.PBFT: The first proposed solution to this problem is called “practical Byzantine fault tolerance”, which has been adopted by Hyperledger Fabric. PBFT uses fewer pre-selected generals, so it runs very efficiently. Its advantage is high transaction flux and throughput, but its disadvantage is that it is centralized and used for licensing networks.Federated Byzantine agreement (FBA): The solution to another Byzantine general problem is FBA, which has been used by tokens such as Stellar and Ripple. The general idea of FBA is that every Byzantine general is responsible for his own chain, and once the news arrives, the chain establishes the facts through sorting. In Ripple, generals (verifiers) are pre-selected by Ripple Foundation. In Stellar, anyone can be a verifier, and users need to choose which verifier to trust. FBA can provide incredible throughput, low transaction overhead, and network scalability.PBFT is based on the Byzantine general problem, and the guarantee of consistency can be divided into three stages: pre-prepare, prepare, and commit, as shown in Figure 10.
- First, client C sends the request as the leader node.
- After receiving the request, the master node 0 assigns a sequence number to the request and broadcasts the sequence number to assign the message and the client request to all other slave nodes.
- After receiving the message from the master node, the slave node broadcasts the preparation message to other nodes.
- After each node verifies the received preparation message, they must broadcast the confirmation message, execute the request of the leader node, and then respond to the leader node.
- As long as the leader node receives an f+1 identical response, where f is the number of malicious nodes, it will consider that its request has been realized, and the PBFT consensus process is over.
3.4. Blockchain Solves the Problem of Anonymous Identity Authentication
4. Research Prospects
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zhao, J.; Liu, J.; Yang, L.; Ai, B.; Shanjin, N. Future 5G-oriented system for urban rail transit: Opportunities and challenges. China Commun. 2021, 18, 1–12. [Google Scholar] [CrossRef]
- Zhao, J.; Sun, X.; Ma, X.; Zhang, H.; Yu, F.R.; Hu, Y. Online Distributed Optimization for Energy-Efficient Computation Offloading in Air-Ground Integrated Networks. IEEE Trans. Veh. Technol. 2022, 1–14. [Google Scholar] [CrossRef]
- Guerbouj, S.S.E.; Gharsellaoui, H.; Bouamama, S. A comprehensive survey on privacy and security issues in cloud computing, internet of things and cloud of things. Int. J. Serv. Sci. Manag. Eng. Technol. (IJSSMET) 2019, 10, 32–44. [Google Scholar]
- Sahmim, S.; Gharsellaoui, H. Privacy and security in internet-based computing: Cloud computing, internet of things, cloud of things: A review. Procedia Comput. Sci. 2017, 112, 1516–1522. [Google Scholar] [CrossRef]
- Naveen, S.; Kounte, M.R. Key Technologies and challenges in IoT Edge Computing. In Proceedings of the 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 12–14 December 2019; pp. 61–65. [Google Scholar]
- Othman, M.M.; El-Mousa, A. Internet of things & cloud computing internet of things as a service approach. In Proceedings of the 2020 11th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 7–9 April 2020; pp. 318–323. [Google Scholar]
- Khapre, S.P.; Satpathy, S.P.; Chandramohan, D. Optimization of Consensus Mechanism for IoT Blockchain: A Survey. In Research Anthology on Convergence of Blockchain, Internet of Things, and Security; IGI Global: Hershey, PA, USA, 2023; pp. 931–959. [Google Scholar]
- Zhang, H.; Liu, J.; Zhao, H.; Wang, P.; Kato, N. Blockchain-based trust management for internet of vehicles. IEEE Trans. Emerg. Top. Comput. 2020, 9, 1397–1409. [Google Scholar]
- Zhao, J.; Ni, S.; Yang, L.; Zhang, Z.; Gong, Y.; You, X. Multiband Cooperation for 5G HetNets: A Promising Network Paradigm. IEEE Veh. Technol. Mag. 2019, 14, 85–93. [Google Scholar] [CrossRef]
- Pu, C. A novel blockchain-based trust management scheme for vehicular networks. In Proceedings of the 2021 Wireless Telecommunications Symposium (WTS), Virtual, CA, USA, 21–23 April 2021; pp. 1–6. [Google Scholar]
- Zhao, J.; Wu, Y.; Zhang, Q.; Liao, J. Two-Stage Channel Estimation for mmWave Massive MIMO Systems Based on ResNet-UNet. IEEE Syst. J. 2023, 1–10. [Google Scholar] [CrossRef]
- Gong-Guo, Z.; Wan, Z. Blockchain-based IoT security authentication system. In Proceedings of the 2021 International Conference on Computer, Blockchain and Financial Development (CBFD), Nanjing, China, 23–25 April 2021; pp. 415–418. [Google Scholar]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Deogirikar, J.; Vidhate, A. Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India, 10–11 February 2017; pp. 32–37. [Google Scholar]
- Black, S.; Kim, Y. An Overview on Detection and Prevention of Application Layer DDoS Attacks. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 26–29 January 2022; pp. 791–800. [Google Scholar]
- Cao, J.; Yan, Z.; Ma, R.; Zhang, Y.; Fu, Y.; Li, H. LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 2020, 7, 5329–5344. [Google Scholar] [CrossRef]
- Miloslavskaya, N.; Tolstoy, A. Internet of Things: Information security challenges and solutions. Clust. Comput. 2019, 22, 103–119. [Google Scholar] [CrossRef]
- Djenna, A.; Harous, S.; Saidouni, D.E. Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Appl. Sci. 2021, 11, 4580. [Google Scholar] [CrossRef]
- Alrubaiei, M.H.; Al-Saadi, M.H.; Shaker, H.; Sharef, B.; Khan, S. Internet of Things in Cyber Security Scope. In Blockchain Technology and Computational Excellence for Society 5.0; IGI Global: Hershey, PA, USA, 2022; pp. 146–187. [Google Scholar]
- Li, B.; Liang, R.; Zhu, D.; Chen, W.; Lin, Q. Blockchain-Based Trust Management Model for Location Privacy Preserving in VANET. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3765–3775. [Google Scholar] [CrossRef]
- Boualouache, A.; Senouci, S.M.; Moussaoui, S. A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks. IEEE Commun. Surv. Tutor. 2018, 20, 770–790. [Google Scholar] [CrossRef] [Green Version]
- Raya, M.; Hubaux, J.P.; Ning, P.; Du, W. Securing vehicular ad hoc networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef] [Green Version]
- Artail, H.; Abbani, N. A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks. IEEE Trans. Dependable Secur. Comput. 2016, 13, 106–119. [Google Scholar] [CrossRef]
- Boualouache, A.; Moussaoui, S. S2si: A practical pseudonym changing strategy for location privacy in vanets. In Proceedings of the 2014 International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, Algeria, 17–19 June 2014; pp. 70–75. [Google Scholar]
- Wu, F.; Xu, L.; Kumari, S.; Li, X. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 2017, 8, 101–116. [Google Scholar] [CrossRef]
- Jiang, Q.; Ma, J.; Wei, F.; Tian, Y.; Shen, J.; Yang, Y. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 2016, 76, 37–48. [Google Scholar] [CrossRef]
- Arafin, M.T. Hardware-Based Authentication for the Internet of Things. Ph.D. Thesis, University of Maryland, College Park, MD, USA, 2018. [Google Scholar]
- Vaidya, B.; Makrakis, D.; Mouftah, H. Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 2016, 9, 171–183. [Google Scholar] [CrossRef]
- Hu, H.; Liao, L.; Zhao, J. Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things. Electronics 2022, 11, 1652. [Google Scholar] [CrossRef]
- Mishra, D.; Vijayakumar, P.; Sureshkumar, V.; Amin, R.; Islam, S.H.; Gope, P. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed. Tools Appl. 2018, 77, 18295–18325. [Google Scholar] [CrossRef]
- Chang, I.P.; Lee, T.F.; Lin, T.H.; Liu, C.M. Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 2015, 15, 29841–29854. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Dolev, D.; Yao, A.C. On the security of public key protocols. Inf. Theory IEEE Trans. 1981, 29, 198–208. [Google Scholar] [CrossRef]
- Xue, K.; Meng, W.; Li, S.; Wei, D.S.; Zhou, H.; Yu, N. A secure and efficient access and handover authentication protocol for Internet of Things in space information networks. IEEE Internet Things J. 2019, 6, 5485–5499. [Google Scholar] [CrossRef]
- El-Meniawy, N.; Rizk, M.R.; Ahmed, M.A.; Saleh, M. An Authentication Protocol for the Medical Internet of Things. Symmetry 2022, 14, 1483. [Google Scholar] [CrossRef]
- Tewari, A.; Gupta, B.B. A novel ECC-based lightweight authentication protocol for internet of things devices. Int. J. High Perform. Comput. Netw. 2019, 15, 106–120. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J. Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Dependable Secur. Comput. 2018, 17, 942–956. [Google Scholar] [CrossRef]
- Gupta, M.; Gupta, K.K.; Shukla, P.K. Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover. Multimed. Tools Appl. 2021, 80, 33843–33863. [Google Scholar] [CrossRef]
- Liu, L.; Jiang, D.; Wang, X.; Rong, X.; Zhang, R. 2D Logistic-Adjusted-Chebyshev map for visual color image encryption. J. Inf. Secur. Appl. 2021, 60, 102854. [Google Scholar] [CrossRef]
- Sun, J.; Zhao, G.; Li, X. An improved public key encryption algorithm based on Chebyshev polynomials. Indones. J. Electr. Eng. Comput. Sci. 2013, 11, 864–870. [Google Scholar] [CrossRef]
- Zhang, L. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 2008, 37, 669–674. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Wazid, M.; Kumar, N. Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 2018, 17, 1133–1146. [Google Scholar] [CrossRef]
- Sarkar, A.; Singh, B.K. A review on performance, security and various biometric template protection schemes for biometric authentication systems. Multimed. Tools Appl. 2020, 79, 27721–27776. [Google Scholar] [CrossRef]
- Rui, Z.; Yan, Z. A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE Access 2018, 7, 5994–6009. [Google Scholar] [CrossRef]
- Griffin, P.H. Secure authentication on the Internet of Things. In Proceedings of the SoutheastCon 2017, Concord, NC, USA, 30 March–2 April 2017; pp. 1–5. [Google Scholar]
- Mayron, L.M. Biometric authentication on mobile devices. IEEE Secur. Priv. 2015, 13, 70–73. [Google Scholar] [CrossRef]
- Neal, T.J.; Woodard, D.L. Surveying biometric authentication for mobile device security. J. Pattern Recognit. Res. 2016, 11, 74–110. [Google Scholar] [CrossRef]
- Bureva, V.; Sotirova, E.; Bozov, H. Generalized Net Model of Biometric Identification Process. In Proceedings of the 2018 20th International Symposium on Electrical Apparatus and Technologies (SIELA), Bourgas, Bulgaria, 3–6 June 2018; pp. 1–4. [Google Scholar]
- Dharma Putra, G.; Kang, C.; Kanhere, S.S.; Won-Ki Hong, J. DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Shanghai, China, 2–5 May 2022; pp. 1–5. [Google Scholar]
- Song, Y.; Sun, C.; Peng, Y.; Zeng, Y.; Sun, B. Research on Multidimensional Trust Evaluation Mechanism of FinTech Based on Blockchain. IEEE Access 2022, 10, 57025–57036. [Google Scholar] [CrossRef]
- Jeribi, F.; Amin, R.; Alhameed, M.; Tahir, A. An Efficient Trust Management Technique Using ID3 Algorithm With Blockchain in Smart Buildings IoT. IEEE Access 2023, 11, 8136–8149. [Google Scholar] [CrossRef]
- Sun, R.; Zhang, G.; Tang, H. Trust Based lot Access Control Using Blockchain. In Proceedings of the 2022 IEEE International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC), Chongqing, China, 5–7 August 2022; pp. 240–245. [Google Scholar]
- Pal, S.; Hill, A.; Rabehaja, T.; Hitchens, M. VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions. In Proceedings of the 2022 International Conference on Computer Communications and Networks (ICCCN), Virtual, 25–27 July 2022; pp. 1–7. [Google Scholar]
- Goh, Y.; Yun, J.; Jung, D.; Chung, J.M. Secure Trust Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning. IEEE Access 2022, 10, 118498–118511. [Google Scholar] [CrossRef]
- Wang, X.; Garg, S.; Lin, H.; Kaddoum, G.; Hu, J.; Hassan, M.M. Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2074–2083. [Google Scholar] [CrossRef]
- Ye, J.; Kang, X.; Liang, Y.C.; Sun, S. A Trust-Centric Privacy-Preserving Blockchain for Dynamic Spectrum Management in IoT Networks. IEEE Internet Things J. 2022, 9, 13263–13278. [Google Scholar] [CrossRef]
- Tangade, S.S.; Manvi, S.S. A survey on attacks, security and trust management solutions in VANETs. In Proceedings of the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 4–6 July 2013; pp. 1–6. [Google Scholar]
- Rivera, J.J.D.; Khan, T.A.; Akbar, W.; Muhammad, A.; Song, W.C. ZT&T: Secure blockchain-based tokens for service session management in Zero Trust Networks. In Proceedings of the 2022 6th Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 24–26 October 2022; pp. 1–7. [Google Scholar]
- El-Sayed, H.; Alexander, H.; Kulkarni, P.; Khan, M.A.; Noor, R.M.; Trabelsi, Z. A Novel Multifaceted Trust Management Framework for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2022, 23, 20084–20097. [Google Scholar] [CrossRef]
- Jiao, Y.; Wang, C. A Blockchain-Based Trusted Upload Scheme for the Internet of Things Nodes. Int. J. Crowd Sci. 2022, 6, 92–97. [Google Scholar] [CrossRef]
- Liu, X.; Huang, H.; Xiao, F.; Ma, Z. A Blockchain-Based Trust Management With Conditional Privacy-Preserving Announcement Scheme for VANETs. IEEE Internet Things J. 2020, 7, 4101–4112. [Google Scholar] [CrossRef]
- Elmadani, S.; Hariri, S.; Shao, S. Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks. In Proceedings of the 2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates, 5–8 December 2022; pp. 1–9. [Google Scholar]
- Chen, X.; Ding, J.; Lu, Z. A Decentralized Trust Management System for Intelligent Transportation Environments. IEEE Trans. Intell. Transp. Syst. 2022, 23, 558–571. [Google Scholar] [CrossRef]
- Lu, Z.; Qu, G.; Liu, Z. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy. IEEE Trans. Intell. Transp. Syst. 2019, 20, 760–776. [Google Scholar] [CrossRef]
- Zhao, J.; Sun, X.; Li, Q.; Ma, X. Edge Caching and Computation Management for Real-Time Internet of Vehicles: An Online and Distributed Approach. IEEE Trans. Intell. Transp. Syst. 2021, 22, 2183–2197. [Google Scholar] [CrossRef]
- Zhao, W. Consensus Algorithms for Blockchain. In From Traditional Fault Tolerance to Blockchain; Wiley: Hoboken, NJ, USA, 2021. [Google Scholar]
- Hang, L.; Chen, C.; Zhang, L.; Yang, J. Blockchain for applications of clinical trials: Taxonomy, challenges, and future directions. IET Commun. 2022, 16, 2371–2393. [Google Scholar] [CrossRef]
- Zhao, J.; Yang, L.; Xia, M.; Motani, M. Unified Analysis of Coordinated Multipoint Transmissions in mmWave Cellular Networks. IEEE Internet Things J. 2022, 9, 12166–12180. [Google Scholar] [CrossRef]
- Ding, X.; Wang, X.; Xie, Y.; Li, F. A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things. IEEE Internet Things J. 2022, 9, 1818–1829. [Google Scholar] [CrossRef]
- Chao, L.; He, D.; Huang, X.; Choo, K.; Vasilakos, A.V. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 2018, 116, 42–52. [Google Scholar]
- Liu, J.; Li, X.; Jiang, Q.; Obaidat, M.S.; Vijayakumar, P. BUA: A blockchain-based unlinkable authentication in vanets. In Proceedings of the ICC 2020-2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
- Li, X.; Liu, J.; Obaidat, M.S.; Vijayakumar, P.; Jiang, Q.; Amin, R. An unlinkable authenticated key agreement with collusion resistant for VANETs. IEEE Trans. Veh. Technol. 2021, 70, 7992–8006. [Google Scholar] [CrossRef]
- Yao, Y.; Chang, X.; Mišić, J.; Mišić, V.B.; Li, L. BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services. IEEE Internet Things J. 2019, 6, 3775–3784. [Google Scholar] [CrossRef]
- Feng, Q.; He, D.; Zeadally, S.; Liang, K. BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans. Ind. Inform. 2019, 16, 4146–4155. [Google Scholar] [CrossRef]
- Chulerttiyawong, D.; Jamalipour, A. A blockchain assisted vehicular pseudonym issuance and management system for conditional privacy enhancement. IEEE Access 2021, 9, 127305–127319. [Google Scholar] [CrossRef]
- Ma, Z.; Zhang, J.; Guo, Y.; Liu, Y.; Liu, X.; He, W. An efficient decentralized key management mechanism for VANET with blockchain. IEEE Trans. Veh. Technol. 2020, 69, 5836–5849. [Google Scholar] [CrossRef]
- Tomar, A.; Tripathi, S. BCAV: Blockchain-based certificateless authentication system for vehicular network. Peer- Netw. Appl. 2022, 15, 1733–1756. [Google Scholar] [CrossRef]
- Xue, K.; Luo, X.; Ma, Y.; Li, J.; Liu, J.; Wei, D.S. A distributed authentication scheme based on smart contract for roaming service in mobile vehicular networks. IEEE Trans. Veh. Technol. 2022, 71, 5284–5297. [Google Scholar] [CrossRef]
- Singh, S.K.; Park, J.H.; Sharma, P.K.; Pan, Y. BIIoVT: Blockchain-based secure storage architecture for intelligent internet of vehicular things. IEEE Consum. Electron. Mag. 2021, 11, 75–82. [Google Scholar] [CrossRef]
- Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
- Pariyarath, A.; Tomar, S.; Tripathi, M. Efficient Privacy-Preserving Authentication using Blockchain for VANET. In Proceedings of the 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 3–8 January 2023; pp. 423–426. [Google Scholar]
- Subramani, J.; Maria, A.; Rajasekaran, A.S.; Al-Turjman, F.; Gopal, M. Blockchain-based Physically Secure and Privacy-Aware Anonymous Authentication Scheme for Fog-based VANETs. IEEE Access 2023, 11, 17138–17150. [Google Scholar] [CrossRef]
- Chen, Z.; Chen, S.; Xu, H.; Hu, B. A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain. IEEE Access 2018, 6, 55372–55379. [Google Scholar] [CrossRef]
- Tandon, R.; Verma, A.; Gupta, P. Blockchain enabled vehicular networks: A review. In Proceedings of the 2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, 26–27 November 2022; pp. 1–6. [Google Scholar]
- Shrestha, R.; Bajracharya, R.; Shrestha, A.P.; Nam, S.Y. A new type of blockchain for secure message exchange in VANET. Digit. Commun. Netw. 2020, 6, 177–186. [Google Scholar] [CrossRef]
- Zhang, X.; Chen, X. Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network. IEEE Access 2019, 7, 58241–58254. [Google Scholar] [CrossRef]
- Xiao, Y.; Zhang, N.; Lou, W.; Hou, Y.T. A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 2020, 22, 1432–1465. [Google Scholar] [CrossRef] [Green Version]
- Singh, S.K.; Park, J.H. TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence. IEEE Trans. Ind. Inform. 2023, 19, 626–634. [Google Scholar] [CrossRef]
- Lai, R.; Zhao, G. ValidatorRep: Blockchain-based Trust Management for Ensuring Accountability in Crowdsourcing. In Proceedings of the 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), Los Alamitos, CA, USA, 27 June–1 July 2022; pp. 716–725. [Google Scholar]
- Yu, J.; Zhang, G.; Lu, D.; Liu, H. Blockchain-based Crowd-sensing Trust Management Mechanism for Crowd Evacuation. In Proceedings of the 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Hangzhou, China, 4–6 May 2022; pp. 1179–1184. [Google Scholar]
- Yang, T.; Zhang, G.; Liu, L.; Yang, Y.; Zhao, S.; Sun, H.; Wang, W. New Features of Authentication Scheme for the IoT: A Survey. In Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-Of-Things (IOT S&P’19), London, UK, 15 November 2019; pp. 44–49. [Google Scholar]
- Azrour, M.; Mabrouki, J.; Guezzaz, A.; Farhaoui, Y. New enhanced authentication protocol for internet of things. Big Data Min. Anal. 2021, 4, 1–9. [Google Scholar] [CrossRef]
- Wei, F.; Vijayakumar, P.; Kumar, N.; Zhang, R.; Cheng, Q. Privacy-preserving implicit authentication protocol using cosine similarity for Internet of Things. IEEE Internet Things J. 2020, 8, 5599–5606. [Google Scholar] [CrossRef]
- Chikouche, N.; Cayrel, P.L.; Mboup, E.H.M.; Boidje, B.O. A privacy-preserving code-based authentication protocol for Internet of Things. J. Supercomput. 2019, 75, 8231–8261. [Google Scholar] [CrossRef]
- Gupta, M.; Sandhu, R. Towards activity-centric access control for smart collaborative ecosystems. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, 16–18 June 2021; pp. 155–164. [Google Scholar]
- Mawla, T.; Gupta, M.; Sandhu, R. BlueSky: Activity Control: A Vision for “Active” Security Models for Smart Collaborative Systems. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, New York, NY, USA, 8–10 June 2022; pp. 207–216. [Google Scholar]
- Grosse, K.; Papernot, N.; Manoharan, P.; Backes, M.; McDaniel, P. Adversarial examples for malware detection. In Proceedings of the Computer Security–ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, 11–15 September 2017; pp. 62–79. [Google Scholar]
- Aryal, K.; Gupta, M.; Abdelsalam, M. A survey on adversarial attacks for malware analysis. arXiv 2021, arXiv:2111.08223. [Google Scholar]
- Cathey, G.; Benson, J.; Gupta, M.; Sandhu, R. Edge centric secure data sharing with digital twins in smart ecosystems. In Proceedings of the 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 13–15 December 2021; pp. 70–79. [Google Scholar]
- Zhao, J.; Nie, Y.; Zhang, H.; Yu, F.R. A UAV-aided vehicular integrated platooning network for heterogeneous resource management. IEEE Trans. Green Commun. Netw. 2023, 7, 512–521. [Google Scholar] [CrossRef]
Notation | Description | Approximate Computation Time (ms) |
---|---|---|
A one-way hash function | 0.00032 | |
An ECC point multiplication | 0.0171 | |
An ECC point addition | 0.0044 | |
Symmetric encryption/decryption algorithms | 0.0056 | |
A modular exponentiation operation | 0.0192 | |
A modular multiplication operation | 0.00088 | |
A Chebyshev chaotic map operation | 0.0171 | |
Attain solution using CRT | 0.00704 | |
Signature generation using elliptic curve digital signature algorithm | 0.02182 | |
Signature verification using elliptic curve digital signature algorithm | 0.03892 | |
Message authentication code | 0.00032 |
Algorithm | PoS | DPoS | Casper | PBFT | PoET | Raft |
Capability | Middle | High | Middle | High | Middle | High |
Decentralization | Completely | Completely | Completely | Semi | Semi | Semi |
Maximum evil nodes allowed | 51% | 51% | 51% | 33% | 51% | 51% |
Tokens | Yes | Yes | Yes | No | No | No |
Scenario | Public blockchain | Public blockchain | Public blockchain | Consortium blockchain | Consortium blockchain | Private blockchain |
Technical maturity | Mature | Mature | No application | Mature | No application | Mature |
Special Hardware | No | No | No | No | Yes | No |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, J.; Hu, H.; Huang, F.; Guo, Y.; Liao, L. Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios. Electronics 2023, 12, 1812. https://doi.org/10.3390/electronics12081812
Zhao J, Hu H, Huang F, Guo Y, Liao L. Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios. Electronics. 2023; 12(8):1812. https://doi.org/10.3390/electronics12081812
Chicago/Turabian StyleZhao, Junhui, Huanhuan Hu, Fanwei Huang, Yingxuan Guo, and Longxia Liao. 2023. "Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios" Electronics 12, no. 8: 1812. https://doi.org/10.3390/electronics12081812
APA StyleZhao, J., Hu, H., Huang, F., Guo, Y., & Liao, L. (2023). Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios. Electronics, 12(8), 1812. https://doi.org/10.3390/electronics12081812