scholarly journals A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Shichang Xuan ◽  
Haibo Xiao ◽  
Dapeng Man ◽  
Wei Wang ◽  
Wu Yang

With the continuous enrichment of the Internet of Things (IoT) applications, the demand for value exchange and collaborative control between heterogeneous IoT applications is increasing. However, the user management space varies depending on the IoT application, where the security domain stands as an example. It is one of the key technologies of data sharing between heterogeneous IoT organizations to cross the boundary of the security domain and verify the identity and authority of users in other security domains. Aiming at the slow speed of authentication protocol authority authentication during cross-domain access and without considering the actual cross-domain situation, the same cryptographic system parameters are used for all communication nodes in a cross-domain environment. This article proposes a heterogeneous Internet of Things data access authority authentication scheme between applications. Based on certificate-less public key cryptography and smart contract technology, a certificate-less cross-domain authentication scheme that supports parameter differentiation is designed and implemented. The theoretical and empirical analyses, comparing the communication volume, identity signature, and verification calculation cost, validated that the method proposed improves the cross-domain identity authorization authentication ability and supports the use of differentiated cryptographic system parameters among different IoT applications.

2022 ◽  
Vol 2022 ◽  
pp. 1-15
Author(s):  
Yujian Zhang ◽  
Yuhao Luo ◽  
Xing Chen ◽  
Fei Tong ◽  
Yuwei Xu ◽  
...  

Internet of Things (IoT) has been ubiquitous in both industrial and living areas, but also known for its weak security. Being as the first defense line against various cyberattacks, authentication is even more critical to IoT applications. Moreover, there has been a growing demand for cross-domain collaboration, leading to an increasing need for cross-domain authentication. Recently, certificate-based authentication schemes have been extensively studied. However, many of these schemes are not efficient in computation, storage, and communication, which are highly required in IoT. In this paper, we propose a lightweight authentication scheme based on consortium blockchain and design a cryptocurrency-like digital token to build trust. Furthermore, trust lifecycle management is performed by manipulating the amount of tokens. The comprehensive analysis and evaluation demonstrate that the proposed scheme is resistant to various common attacks and more efficient than competitor schemes in terms of storage, communication, and authentication cost.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 634 ◽  
Author(s):  
Xudong Jia ◽  
Ning Hu ◽  
Shen Su ◽  
Shi Yin ◽  
Yan Zhao ◽  
...  

The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a trusted third party, the traditional centralized authentication model not only destroys the autonomy and flexibility of the application system, but also causes issues such as single point of failure and hidden dangers of unilateral control. This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things. This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional PKI authentication algorithm. The scheme proposed in this paper implements a decentralized authentication model, which can guarantee the autonomy and initiative of the security domain.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 119 ◽  
Author(s):  
M Durairaj ◽  
K Muthuramalingam

Internet of Things (IoT) consists of a large number of connected objects that are communicating with each other. To support trusted communication between IoT objects, the authentication procedures should be used and applied to the communicating entities. Internet of Things (IoT) is an emerging technology, which makes the remote sensing and control across the heterogeneous network a reality, and has good prospects in industrial applications. As an essential infrastructure, Wireless Sensor Networks (WSNs) play a crucial role in industrial IoT. Due to the resource-constrained feature of sensor nodes, the design of security and efficiency balanced authentication scheme for WSNs becomes a significant challenge in IoT applications. In this paper, an anonymous authentication scheme for WSNs in an Internet of Things environments.  


Author(s):  
Jose David Alvarado Moreno ◽  
Luis Carlos Luis Garcia ◽  
Wilder Castellanos Hernandez ◽  
Anlly Milena Barrera Obando

2019 ◽  
Vol 2019 ◽  
pp. 1-5 ◽  
Author(s):  
Steve W. Y. Mung ◽  
Cheuk Yin Cheung ◽  
Ka Ming Wu ◽  
Joseph S. M. Yuen

This article presents a simple wideband rectangular antenna in foldable and non-foldable (printed circuit board (PCB)) structures for Internet of Things (IoT) applications. Both are simple structures with two similar rectangular metal planes which cover multiple frequency bands such as GPS, WCDMA/LTE, and 2.4 GHz industrial, scientific, and medical (ISM) bands. This wideband antenna is suitable to integrate into the short- and long-range wireless applications such as the short-range 2.4 GHz ISM band and standard cellular bands. This lowers the overall size of the product as well as the cost in the applications. In this article, the configuration and operation principle are presented as well as its trade-offs on the design parameters. Simulated and experimental results of foldable and non-foldable (PCB) structures show that the antenna is suited for IoT applications.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1615
Author(s):  
Zeeshan Ali Khan ◽  
Ubaid Abbasi ◽  
Sung Won Kim

Low power wide area networks (LPWAN) are comprised of small devices having restricted processing resources and limited energy budget. These devices are connected with each other using communication protocols. Considering their available resources, these devices can be used in a number of different Internet of Things (IoT) applications. Another interesting paradigm is machine learning, which can also be integrated with LPWAN technology to embed intelligence into these IoT applications. These machine learning-based applications combine intelligence with LPWAN and prove to be a useful tool. One such IoT application is in the medical field, where they can be used to provide multiple services. In the scenario of the COVID-19 pandemic, the importance of LPWAN-based medical services has gained particular attention. This article describes various COVID-19-related healthcare services, using the the applications of machine learning and LPWAN in improving the medical domain during the current COVID-19 pandemic. We validate our idea with the help of a case study that describes a way to reduce the spread of any pandemic using LPWAN technology and machine learning. The case study compares k-Nearest Neighbors (KNN) and trust-based algorithms for mitigating the flow of virus spread. The simulation results show the effectiveness of KNN for curtailing the COVID-19 spread.


2017 ◽  
Vol 4 (6) ◽  
pp. 2058-2069 ◽  
Author(s):  
Poonam Yadav ◽  
Julie A. McCann ◽  
Tiago Pereira

2014 ◽  
Vol 543-547 ◽  
pp. 3411-3414
Author(s):  
Xu Bing

Key core technologies of IOT (internet of things) have to be addressed to achieve rapid development. This paper focused on studying RFID, wireless sensor network (WSN) and TCCP which were integrated to address the IOT application problems. Meanwhile, an IOT architectural model was established and the IOT applications in real-time medical monitoring, intelligent transportation system (ITS), intelligent appliances and intelligent agriculture were introduced.


Sign in / Sign up

Export Citation Format

Share Document