• 
    

    
    

      99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

      BLECA:A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

      2023-12-15 03:58:36FengtingLuoRuweiHuangandYuyueChen
      Computers Materials&Continua 2023年11期

      Fengting Luo,Ruwei Huangand Yuyue Chen

      School of Computer and Electronic Information,Guangxi University,Nanning,530004,China

      ABSTRACT Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme.

      KEYWORDS Cross-domain authentication;blockchain;smart parks;Certificate Authority (CA);distributed collaboration;Internet of Things(IoT)

      1 Introduction

      Intelligent devices have increased alarmingly with the development of the Internet of Things(IoT)and the advent of the 5G era[1].Promoting the development of smart cities through IoT and cloud computing technology is a research hotspot nowadays[2].Smart parks,as microcosms of smart cities,play an integral role in the era of innovation.Although extensive network infrastructure enables devices from various parks to interconnect,quite a few trust and security challenges have not been resolved[3].Establishing secure communication for devices across different domains is still a crucial task.

      Most of the existing identity authentication mechanisms are built upon the widely recognized Public Key Infrastructure (PKI) system,which involves a Certificate Authority (CA) [4].The PKI system verifies the certificate to authenticate the identity of devices [5].Traditional PKI-based cross-domain authentication schemes can be categorized into two types.The first type involves the introduction of a trusted third party,namely the root CA,to serve as a trust center for all domains.However,if the root CA is compromised,the entire authentication system becomes paralyzed,leading to significant economic losses.The second type is inter-domain mutual authentication through the exchange of certificates between CAs.This authentication model results in overly complex authentication paths and escalates the cost of cross-domain cooperation.The traditional PKI-based crossdomain authentication schemes heavily rely on CAs,making them susceptible to the risk of single point failures[6].

      The thriving blockchain technology offers a new solution to solve the security problem of IoT[7,8].Blockchain possesses attributes like decentralization,tamper-proof,and data traceability,which can establish trust in an untrusted environment [9,10].Blockchain has found widespread utility as a foundational technology for multi-party solutions [11,12].The consortium blockchain is a kind of distributed ledger (DL) maintained by multiple cooperative peer nodes [13].When multiple CAs collectively construct a consortium blockchain,they can realize decentralized certificate management and ensure reliable cross-domain trust transfer.This approach mitigates the risk of single point failures,and streamlines the complexity of cross-domain authentication processes[14,15].

      In recent years,numerous scholars have leveraged consortium blockchain for cross-domain identity authentication [16-22].Qiao et al.[23] devised an efficient cross-domain authentication scheme for the drone transportation industry by integrating consortium blockchain and PKI.Similarly,Rana et al.[24] employed blockchain technology to create a decentralized access control model for various healthcare sectors,enhancing interoperability among distinct industry systems.The solutions provided in [23,24] demand uniform identity management standards across all industries,which are not suitable for application in a range of industries with varying security levels.A smart park alliance is a cooperative mechanism aimed at fostering collaboration among various parks,promoting urban sustainability,and facilitating digital transformation.Members of smart park alliances may include government departments,urban planners,technology suppliers,businesses and industry groups,as well as social organizations.The security management of each park is typically different.Therefore,there is a need for a certificate management scheme that enables each park to issue and revoke cross-domain certificates in alignment with its specific security level.While many cross-domain authentication schemes address the requirement for autonomous certificate management by issuing cross-domain certificates to devices,the maintenance cost of multiple cross-domain certificates renders them impractical for resource-constrained devices.Moreover,large-scale enterprise parks typically oversee thousands of devices,and collaborative relationships between different organizations often undergo changes.In scenarios where an industrial park needs to terminate its cooperative relationship with other parks or replace a cooperative logistics company,existing solutions require substantial expenses to revoke cross-domain certificates for all relevant devices.

      In order to solve the above problems,we proposed a blockchain-based lightweight and efficient cross-domain authentication scheme for smart parks (we call it BLECA).In contrast to the aforementioned cross-domain authentication schemes,BLECA provides a lightweight cross-domain authentication protocol and a practical certificate revocation mechanism specifically designed for smart parks.This solution not only guarantees cross-domain connectivity for resource-constrained devices but also enables each park to flexibly and cost-effectively revoke cross-domain identities according to its individual security requirements.The main contributions of this paper are as follows:

      (1) We introduce a cross-domain authentication architecture based on the consortium blockchain,which consists of CA in each smart park.A smart contract for establish trust chains is deployed in the blockchain,allowing each park to dynamically adjust its partnerships.

      (2) Drawing from the attributes of blockchain technology,this paper designs a low-cost,simplified cross-domain authentication and key agreement protocol.The protocol figures out the device’s cross-domain certificate according to the device’s intra-domain certificate and CA identity of the cross-domain park,enabling resource-constrained devices to maintain only one intradomain certificate.

      (3) We devise a complete certificate revocation mechanism for the dynamic partnership between parks.First,the device cancellation algorithm utilizes the trust chain to identify the relevant cross-domain certificates associated with the device that needs to be logged out,and revokes them synchronously,thereby enhancing system security.Secondly,the cross-domain certificate batch revocation feature is formatted in accordance with the requirement for terminating part of the partnerships.Only one blockchain write operation is required to revoke all relevant crossdomain certificates,which substantially reduces computational overhead and saves storage resources.

      Organization:The remainder of this paper is organized as follows:Section 2 reviews the related work of cross-domain authentication based on blockchain.Section 3 introduces the system model and related theoretical knowledge.Section 4 elaborates on the design specifics of the proposed scheme,and Section 5 presents a security analysis.Section 6 includes extensive experiments and discussions to showcase the effectiveness of BLECA.Finally,Section 7 concludes the work.

      2 Related Work

      In this section,we begin by summarizing some basic knowledge of blockchain and smart contracts.Subsequently,we provide a comprehensive overview of recent research in blockchain-based identity authentication.

      2.1 Blockchain and Smart Contract

      Blockchain,initially proposed by Satoshi Nakamoto,is a distributed ledger system where data is managed in the form of blocks by a cluster of distributed computers [25].Each block contains a block header and transaction data.The block header,including the hash value of the previous block,the hash value of the current block,and the timestamp,is used to link the previous block and calculate the hash value of the current block to ensure the continuity and tamper resistance.There are two common categories of blockchain:permissionless blockchain and permissioned blockchain.The first type refers to public blockchain,which allows any member to join freely.It always selects some competitive schemes as consensus protocol,such as Proof of Work (PoW),Proof of Stake(PoS),and Proof of Activity(PoA)[26-28].The second category encompasses private blockchain and consortium blockchain.It only chooses trustful actors as peer nodes and usually adopts typical Crash Fault Tolerance (CFT) or Byzantine Fault Tolerance (BFT) consensus protocols.BFT is designed to ensure the fault tolerance and security of distributed systems by overcoming Byzantine faults like node failures,network delays,message loss,and malicious behaviors,enabling the system to reach a consensus in the face of these problems.Before transaction data is added to the blockchain,it must be confirmed by the consensus mechanism,ensuring the credibility and security of the data.Through the above-mentioned data organization method,the blockchain realizes the characteristics of decentralization,security,transparency and immutability,which can be used for credible reading and writing in distributed environments[29].

      Practical Byzantine Fault Tolerance (PBFT) and Tendermint are consensus protocols based on the principles and ideas of BFT,which are currently widely used in the consortium blockchain.Both protocols can tolerate no more than 1/3 of malicious nodes to ensure that the system has strong fault tolerance to Byzantine faults.PBFT consensus requires three rounds of voting,including the pre-prepare,prepare,and commit phases.The Tendermint consensus uses a “proposal-vote”mechanism that involves only two rounds of voting,namely the pre-vote stage and the pre-commit stage,reducing the complexity of message transmission and the consensus process.Tendermint offers higher throughput and lower latency,making it more suitable for large-scale network applications that demand high-performance consensus.Peer nodes of the consortium blockchain are verified entities,resulting in fewer instances of malicious behavior.Smart park alliances generally only allow qualified organizations to join,hence it is more appropriate to select the consortium blockchain with Tendermint consensus protocol for large-scale park alliances.

      The users can perform customized programs stored on the blockchain.When certain transactions invoke the predetermined functions,the program will automatically run [30].These customized programs go by different names on various blockchain platforms.For example,on the Ethereum platform,they are referred to as smart contracts,on the Hyperledger Fabric platform,they are called chaincode,and on the Tendermint platform,they are known as ABCI applications.Since Ethereum platform is the most widely used,we commonly use“smart contract”as the generic term for customized blockchain programs.

      2.2 Cross-Domain Authentication Based on Blockchain

      The research of identity authentication based on blockchain has garnered the attention of many research institutions [31,32].In 2014,the Conner team of MIT proposed the first blockchain-based identity authentication system for certificate management[33].Kshetri[34]asserted that blockchain offers significant advantages in facilitating identity management and access control for IoT,which can enhance IoT security.Rana et al.[35] discussed the significance of blockchain in the context of IoT and introduced a specialized blockchain-based architecture for IoT networks.Dave et al.[36]presented a blockchain-based video surveillance framework designed for smart home environments.This framework utilizes smart contracts to define authentication levels and access rules for video footage,ensuring that only authorized users can access surveillance recordings.

      Zhou et al.[16]and Huang et al.[17]established consortium blockchains consisting of several PKI organizations and developed cross-domain authentication protocols.Nevertheless,these two schemes retain the process of traditional identity certification,resulting in relatively complex authentication paths.Zhao et al.[18] proposed a double-layer cross-domain authentication architecture composed of authentication server nodes and several internal blockchains,enhancing the scalability of the PKI system without altering the internal structure.However,for the authentication schemes proposed by[16-18] necessitate devices to manage multiple cross-domain certificates,rendering them unsuitable for lightweight devices with limited storage capacity.In [19],the authors designed a cross-domain authentication and session key agreement protocol,enabling devices to manage just one certificate for authentication across all other domains.Nonetheless,in this scheme,each domain is unable to flexibly define its certificate management standards,potentially posing a security risk to the system.In [20],researchers designed a thoroughly cross-domain authentication scheme based on blockchain,accommodating participants from domains with entirely different configurations.But its authentication process requires the blockchain to perform intensive signature verification and hash calculation.Furthermore,none of the aforementioned studies offer an effective certificate revocation mechanism.

      Gu et al.[21]proposed a blockchain-based authentication and certificate revocation scheme.In this scheme,revoked certificate records are appended to the certificate revocation list stored in the DL for the query.However,the certificate revocation mechanism of this scheme is relatively intricate,and the accumulation of revocation records can significantly impact authentication efficiency.Wang et al.[22] introduced a multi-CA authentication model based on blockchain.They designed a cross-domain certificate revocation mechanism using the Poisson distribution of the cross-domain access list.However,it requires substantial system resources to execute device revocation,and the related cross-domain certificates cannot be revoked synchronously.

      While these blockchain-assisted cross-domain authentication schemes have achieved reliable authentication across multiple domains to some extent,they have not addressed the issue of certificate management for resource-constrained devices in multi-domain environments with varying security management settings.Furthermore,the existing certificate revocation mechanisms have not met the requirement for synchronously revoking all certificates when a device is deregistered and the bulk revocation of cross-domain certificates due to changes in inter-domain collaboration.Therefore,the current authentication schemes are not suitable for dynamic collaborative scenarios among smart parks with different security levels.

      Novelty:The principal novel aspect of this article is that an effective blockchain-based crossdomain authentication scheme is proposed to meet the collaboration requirements among smart parks with varying security levels.Specifically,the distinctions from existing solutions are as follows: 1)The smart contract for managing cross-domain trust chains facilitates each park to flexibly adjust its collaborative relationships.2) The process of cross-domain authentication and key negotiation is formulated,allowing each park to issue cross-domain certificates according to its security management regulations without adding to the certificate management burden of resource-constrained devices.3)Utilizing the cross-domain trust chain as a foundation,we present an effective certificate revocation mechanism consisting of three algorithms: device cancellation,single cross-domain certificate revocation,and cross-domain certificate batch revocation.This mechanism further guarantees that each park can efficiently carry out certificate revocation tasks in different scenarios aligning with its own security standards.

      3 Preliminaries

      This section provides a summary of symbols used in the BLECA scheme,as presented in Table 1.Subsequently,the system model is described,followed by an introduction to the relevant technologies employed in this scheme.

      Table 1: Symbol description of the BLECA scheme

      3.1 System Model

      The cross-domain authentication model of the proposed scheme is shown in Fig.1.

      (1)BPCArepresents the consortium blockchain composed of CA from each park.Every CA node with the complete ledger can independently and transparently audit and verify blockchain transactions.

      (2)CAirepresents the authority node issuing certificates for the devices ofPark i.CAiis also responsible for maintaining the trust chain ofPark iand managing the certificates of devices.

      (3)ASirepresents the authentication server node ofPark i,which is responsible for receiving and processing the authentication request.ASiis authorized to issue cross-domain certificates for request devices according to the trust chain.Furthermore,ASidetermines the abnormal behavior of a cross-domain device using predefined behavior criteria and recognition algorithms,and subsequently revokes the device’s cross-domain certificate.

      (4)Direpresents the smart device under the jurisdiction ofPark i.

      Figure 1:System model

      In the proposed scheme,each park can autonomously maintain its own cross-domain trust relationships.The CA of each campus establishes its cross-domain trust chain according to its specific operational requirements.The trust chains of all domains collectively form an editable directed graph,as illustrated in Fig.2.The vertexs in this graph represent the parks that join the consortium blockchain.Each park can only maintain its indegree edges.In Fig.2,the valueHash(CA2,CA1)and its statusTrustState=“issue‘‘indicate thatPark2 has obtained cross-domain access authorization forPark1.TrustState=“revoke‘‘means that the channel forPark2 to accessPark1 has been closed.

      Figure 2:Editable cross-domain directed graph

      3.2 Related Technologies

      3.2.1 Computational Hard Assumptions

      While constructing the scheme,we rely on two computational difficulties assumptions.The detailed definition is presented as follows:

      Elliptic curve discrete logarithm(ECDL)assumption:Given an elementA∈G.It is impossible for any probabilistic polynomial time(PPT)adversaryAto obtainA=a·G,wherea∈Z*q.

      Elliptic curve computational Diffie-Hellman(ECCDH)assumption:LetA=a·G,B=b·G,whereA,B∈G.It is impossible for any probabilistic polynomial time(PPT)adversaryAto obtaina·b·G.

      3.2.2 Hash Function

      A secure hash function[37]should possess the following three properties,whereXrepresents the sets of all possible messages andYrepresents the sets of all potential hash values.

      Preimage stability:Given hash functionh:X→Y,y∈Y.It is difficult to find outx∈Xto make the equationh(x)=yhold.

      The second preimage stability:Given hash functionh:X→Y,x∈X.It is difficult to find outx′∈Xto make the equationh(x′)=h(x)hold,wherex′/=x.

      Collision-resistance:Given hash functionh:X→Y.It is difficult to find outx,x′∈Xto make the equationh(x′)=h(x)hold,wherex′/=x.

      3.2.3 Signature Scheme

      A generic digital signature scheme consists of a set of probabilistic polynomial-time algorithmsSIG=(Gen,Sign,Verify)[38].The specific definition is provided below:

      Key generation algorithm(pk,sk)←Gen(1λ):Safety parametersλis the input.The public keypkused for signature verification and the private keyskused for signing are the output.

      Signing algorithmδ←Sign(sk,msg):Useskto signmsgto generate a signatureδ.

      Verification algorithmresult←Verify(pk,msg,δ):The signatureδ,messagemsgand public keypkare the input parameters.Ifδis the valid signature ofmsg,setresult=1,otherwise setresult=0.

      Correctness.For everyλ,(pk,sk)←Gen(1λ)andmsg,ifVerify(pk,msg,δ=Sign(sk,msg))=1,proving thatδis a valid signature ofmsg.

      Security.The security of the elliptic curve-based signature scheme relies on the computational complexity of ECDL assumption.

      4 Design of the Proposed Scheme

      4.1 System Initialization

      The system initialization phase is carried out by all domains,as described below:

      (1)Basic initialization:Every domain picks an elliptic curveE(defined on the finite fieldwhere the generator isPand the prime order isq.A secure hash functionHash:{0,1}*→is selected by all the parks.The system parameters and the public key list ofCAsare published in the DL.Then,every CA must process the registration application from the authentication server(AS)under its jurisdiction.Finally,the smart contract supporting the query of CA and AS nodes’information is deployed in the DL.

      (2)Initialization of trust chain:Every CA sets its indegree edges.This process is called initialization of trust chain,as shown in Algorithm 1,whereself_CAis the identity ID of the initiator,andtrust_CA[n] are the partners ofself_CA.BPCAstores theTrustRoot=Hash(trust_CA[x],self_CA) as the trust root and setsTrustRoot‘s statusTrustState=“issue‘‘

      ,whereTrustState=“issue‘‘means thattrust_CA[x]has gained the trust ofself_CA.Based on the initialization and update of the directed graph,every CA synchronously records the vertexs pointed to by its outdegree edge as the cross-domain listcross_CA[n]in the local database.

      4.2 Device Registration

      The smart deviceDiis registered through the authentication serverASi.The specific steps for identity registration are as follows:

      Step1:Di→ASi

      After receiving the registration request fromDi,ASidecrypts the message with its private key.ASichecks the registration status ofDiand determines whetherDiis a legal user.If the verification is successful,ASisend the message to the certification authorityCAithrough a secure channel to apply forcertificate.Otherwise,the identity registration ofDimust be terminated.

      Step3:BPCA→ASi→Di:

      4.3 Cross-Domain Authentication and Session Key Agreement

      Devices can apply for cross-domain certificates from the authentication server nodes of cooperative parks.For example,if a deviceDAofPark Awants to obtain a cross-domain certificate issued byPark B,ASBtakes the identity ofCABas a new parameter and combines it with thesintra-domain certificate to form a cross-domain certificateforDA.The specifics of function for issuing cross-domain certificates can be referred to Algorithm 2.

      When the deviceDAfromPark Aneed access to the resources fromPark B,the process of crossdomain authentication and session key agreement is shown in Fig.3.The specific steps are outlined below:

      Step1:DA→ASB:{request}.

      DAsends a cross-domain access request toASB.

      Step2:ASB→DA:{Ni}.

      After receiving the request,ASBgenerates a random numberNiand records the current timestamptN.Then,ASBsendsNitoDA.

      Step3:DA→ASB:

      Figure 3:The process of cross-domain authentication and session key agreement

      DAuses its private key to encryptNito generate a signature message.The signature andcertificate is sent toASB.

      Step4:ASB→BPCA:{CrossCertKey}.

      Step5:BPCA→ASB:{result}.

      Algorithm 3 depict the cross-domain authentication function deployed in the blockchain.It will return the result toASB.

      (a) If the query result is empty,it means thatDAdoes not have the cross-domain certificate ofPark B.SoASBneeds to issue cross-domain certificates forDA,i.e.,Steps 6-7.

      (b) If the status ofCrossCertKeyisrevokeor the status ofTrustRootisrevokeorTrustRootdoes not exist,cross-domain authentication fails.

      (c) If the status ofCrossCertKeyisissueand the status ofTrustRootisissue,it means that crossdomain authentication is successful andDAcan access the resources ofPark Bthen.After verification,the session key is figured out for further reliable communication.Steps 8-11 describe a session key agreement protocol based on ECCDH assumption.

      Step7:BPCA→ASB:{result}.

      After receiving the request,BPCAwill automatically execute Algorithm 2.If the signature ofASBis valid,BPCAsetsCrossCertState=“issue‘‘a(chǎn)nd stores the tuple (CrossCertKey|TrustRoot,CrossCertState) intoDLas the form of key-value pair,whereCrossCertKey=Hash(TrustRoot=Hash(CAA,CAB).

      DAselects a private random numbera∈and records the current timestampti.Subsequently,DAcalculatesA=a·Pand signsAwith its private key.In the end,the message is sent toDB.

      Step11:DA:{KSAB}.

      If the identity signature of theDBis valid,DAperforms the calculationKA=xA+a·B,wherexAis the private key ofDA.Last,the valueKSAB=Hash(KA‖ti)is recognized as the session key.

      Correctness:From the above equations,we can get Eq.(1).

      Thus,we obtainKSAB=KSBA.

      4.4 Certificate Revocation

      4.4.1 Device Cancellation

      When a device needs to be canceled,the cross-domain certificates associated with the device should be revoked simultaneously to enhance system security.Taking the deviceDias an example,whenCAireceives the cancellation request fromASi,ifsidentity signature is correct,CAiinvokes the device cancellation contract whose algorithm is shown in Algorithm 4.The status ofscertificate is updated asCertState=“revoke”.Then,BPCArevokes all cross-domain certificates associated withDi.BPCAperforms the hash computationsCrossCertKey=Hash(cross_CA[x],),TrustRoot=Hash(CAi,cross_CA[x]) and updates the information (CrossCertKey|TrustRoot,CrossCertState),whereCrossCertState=“revoke”.

      4.4.2 Single Cross-Domain Certificate Revocation

      The revocation of a single device certificate typically occurs in the following two situations.IfDAno longer needs to access the equipment resources ofPark B.To protect the cross-domain certificate from malicious attackers,DAcan requestASBto revoke its cross-domain certificate.The second situation arises whenPark Bdetermines thatDAhas violated its management regulation,it must revoke the cross-domain certificate ofDA.Algorithm 5 describes the mechanism for revoking a single cross-domain certificate.

      4.4.3 Cross-Domain Certificate Batch Revocation

      According to Section 4.3,theTrustRoot,based on the cross-domain directed graph,is set as an attribute of the cross-domain certificate of the device.Suppose a park needs to disable the cross-domain access for some cooperative objects,it can efficiently revoke all relevant cross-domain certificates by updating its trust chain.The batch revocation function for cross-domain certificates is shown in Algorithm 6,whererevoke_CA[n] are the objects whose cross-domain permission will be revoked byself_CA.

      5 Security Analysis

      This section will provide a detailed explanation of how the BLECA scheme satisfies several standard security requirements for identity authentication.

      5.1 Distributed Denial of Service(DDoS)Attack

      DDoS Attack refer to multiple attackers located in different locations simultaneously launching attacks on one or more targets,or an attacker taking control of multiple machines located in different locations and utilizing these machines to simultaneously attack victims.This scheme uses consortium blockchain with Tendermint consensus mechanism as a distributed database.For every write transaction,all peers will receive them and save the data in the DL.Unlike traditional identity authentication solutions that rely on a central node,this scheme operates differently.Even if some nodes come under attack,the blockchain network can continue to function normally as long as the number of failed nodes is less than 1/3.When the paralyzed nodes is restored,it can retrieve the complete ledger from other nodes and resume its role as a normal node with a cross-domain authentication function.If the attacker tries to manipulate the system,it needs to control the computing power of,whereCAandCSrepresent the computing power of the attacker and the total computing power of the blockchain system,respectively.It is difficult for an attacker to possess such a huge computing power to disrupt Tendermint consensus protocol.The underlying blockchain technology and cryptographic primitives ensure the immutability of any identity information stored in the DL.

      5.2 Replay Attack

      The authentication scheme of this paper adopts the question-response handshake mode,which integrates a random number along with a timestamp to ensure timeliness during message transmission.Receiving the cross-domain request of a device,the authentication server node will generate a random numberNiand record the current timestamptN.If the message delivery time surpasses the systemdefined threshold,it is determined that the message has lost its freshness.Even if an attacker intercepts and attempts to resend the message,the timeliness ofNiwill lead to failure,making it is resistant to replay attacks.

      5.3 Man-in-the-Middle(MITM)Attack

      The man-in-the-middle attack aims to intercept regular network traffic,sniff,and tamper with data without the knowledge of both parties.Suppose the attacker intercepts the random numberNifromASBduring the cross-domain authentication process,but it does not haveprivate key so that it can not generateidentity signature.If the attacker attempts to sign the random numberNiusing its private key and sends this signature along with its certificate toASB,it will fail authentication since the attacker is not a legitimate user in the DL.Successful cross-domain authentication requires the correct signature and a valid certificate.Therefore,this scheme is effective in thwarting man-inthe-middle attacks.

      5.4 Insider Attack

      Authorized users within the network can query the information about certificates stored in the DL.An insider attack occurs when an authorized user within the network behaves as an attacker by leaking certificates,thereby posing a threat to the system’s security.In our scheme,the data stored in the DL is the certificate’s hash value rather than the certificate’s metadata.Due to the hash function properties described in Section 3.2,it is virtually impossible for an attacker to deduce certificate metadata from the hash value.As a result,this scheme exhibits resistance to internal attack.

      5.5 Perfect Forward Secrecy

      A secure session key agreement protocol is designed for communication between two devices.The valueaandbare secret keys selected by both sides of the communication,so attackers cannot obtain these values.Attackers would need to break the ECCDH assumption to figure out the session key.The exchanged messagesAandBare one-time keys,which ensure the forward secrecy of the session.In the event of a leak of the private keys of both parties,the session keyKSAB,KSBAwill not be compromised.

      6 Performance Evaluation

      6.1 Security and Functionality Performance Comparison

      In this subsection,we choose some critical features to compare the scheme BLECA with Zhou et al.[16],Zhao et al.[18],Gu et al.[21],and Wang et al.[22].As shown in Table 2,it is evident that BLECA is the only scheme that supports all of these features.

      Table 2: Security and functionality system features comparison

      The aforementioned five schemes meet the basic security requirements,such as resisting DDoS attacks,replay attacks,MITM attacks,and internal attacks.Besides,BLECA provides a secure session key agreement mechanism to ensure the forward secrecy in communication.In the scheme proposed by Gu et al.[21],a device is only required to maintain one certificate,but this certificate also serves as a cross-domain certificate for other domains.As a result,this scheme is not suitable for scenarios where each park has different certificate management standards.In contrast,the cross-domain certificates in[16,18,22]are independent.However,devices in the studies[16,18]need to preserven+1 certificates to accessnparks,and those in[22]needs to retainm+1 certificates to connect m devices simultaneously.It is worth highlighting that BLECA requires only a single certificate for each device,which illustrates that an increase in the number of cooperation parks or communication devices will not elevate the certificate management overhead for the device.More importantly,BLECA offers several flexible features,including an editable cross-domain directed graph,global cancellation of devices,and batch revocation of cross-domain certificates,which enhance the scalability,security,and efficiency of the system.

      6.2 Experiment Performance

      Chen et al.[39]conducted performance evaluations of certain cryptographic operations used in the relevant protocols on both smartphones and desktop computers to simulate resource-constrained terminal devices and authentication servers.The smartphone is equipped with Android 10.0 system,HUAWEI Kirin 980 2.6 GHz CPU,and 6 GB RAM,while the computer has Windows 10 system,Intel(R)Core(TM)i5-7300 HQ 2.5 GHz CPU,and 8 GB RAM.The computational capabilities of the current devices from smart parks are similar to these types of devices.Therefore,when evaluating the computation costs of different solutions,we refer to the measured times of some cryptographic operations reported by Chen et al.[39].Table 3 summarizes some of their experimental results.Most computation and communication overhead are incurred during the authentication period,so we ignore the cost of system initialization and certificate issuance.Our primary focus is on comparing the cost of cross-domain authentication.Table 4 provides a summary of the comparison between BLECA and the other four schemes.The computation cost of BLECA is equal to that of the scheme [16,18,21].Compared with the scheme [22],BLECA places a slightly lower computational burden on devices.Furthermore,our scheme requires one less communication interaction than the other four schemes,which reduces communication costs.It can be seen that our scheme is the most lightweight among the mentioned schemes.

      Table 3: Execution time of cryptographic operations

      Table 4: Computation and communication costs comparisons

      For reference,we categorize the operations involved in the contracts ofBLECAinto two types:Query operations and Write operations.Write operations involve the creation and storage of new data into the blockchain network,which changes the ledger of every peer node.Query operations,on the other hand,involve retrieving data already stored in the blockchain,without modifying the distributed ledger.As outlined in the security analysis in Section 5.1,the consensus mechanism initiated by write operations ensures that the certificates of devices can be safely written into the ledgers of all parks without being tampered with.The query operations of blockchain provides a trust transfer service for the authentication server to verify the identities of cross-domain devices,and ensures that the crossdomain authentication service will not collapse due to the failure of some CA nodes.Write operations within this scheme encompass trust chain initialization,device registration,cross-domain certificate issuance,and certificate revocation.Since the code calculation overhead of these write operations is similar,and all write operations within the same blockchain network carry the same time cost for executing the consensus protocol.We selected the smart contract for single cross-domain certificate revocation(Algorithm 5)as an experimental sample for write operations.Algorithm 3,described in Section 4.3,represents a query operation and serves as the core of the cross-domain authentication protocol.Therefore,this contract was chosen as the experimental sample of the query operation.

      We conducted four sets of experiments to assess the performance of query and write operations across different numbers of domains (4,8,12,and 16).We employed the thread group of Apache-Jmeter-5.5 to simulate client connection requests and collected the throughput and average delay data using performance listener of Jmeter.Initially,we measured the average latency for both write and query operations with one request,as shown in Table 5.Then,we focused on performance metrics by increasing the number of concurrent requests within 1 s.For query operations,the number of requests increases from 100 to 1000,and the test result of average latency is shown in Fig.4.In the case of write operations,the number of requests increases from 50 to 500,and the corresponding results are presented in Figs.5a and 5b.Each condition was tested ten times,and the average values were recorded for the results.

      Figure 4:Average latency of query operation

      Table 5: Average delay of a single operation

      Performance of query operations:Table 5 and Fig.4 reveal that the average delay of query operations is not affected by the number of peers.Similar findings were also testified in the experiments conducted by[20,22].This observation shows that scaling up the number of parks within the collaborative alliance has no discernible impact on the performance of the cross-domain authentication protocol.Fig.4 shows that the average latency for query operations exhibits a gradual increase as the number of concurrent requests rises.Specifically,with every additional 100 query requests,the average delay increases by a mere 0.88 milliseconds.It can be predicted that the time required for queries,even when numerous devices are simultaneously requesting cross-domain authentication,remains well within the acceptable limits for smart park construction.Based on these results,it is evident that the cross-domain authentication protocol of this scheme demonstrates outstanding performance and scalability.

      Figure 5:(a)Average latency of write operation.(b)Throughput of write operation

      Performance of write operations:As depicted in Table 5,Figs.5a,and 5b,as the number of peer nodes increases,the average latency rises,and the maximum throughput decreases.With the increase of concurrent requests,the average delay will also increase,while the throughput will gradually increase at the beginning and then tend to be steady with a maximum value.

      The scheme [16,18] does not provide cross-domain certificate revocation service.Next,we will compare the cross-domain certificate revocation protocols of BLECA[21,22].Table 6 summarizes this comparison results.Revoking a cross-domain certificate requires one write operation in both BLECA and [21].However,ifPark A‘sall cross-domain certificates authorized byPark B(assuming that the number of cross-domain certificates is n)require to be revoked,BLECA still needs only one write operation.In contrast,the scheme[21]needsnwrite operations.For the scheme[22],the authentication servers perform the cross-domain certificate revocation locally.Although local servers run much faster than the blockchain,revoking numerous cross-domain certificates still incurs significant costs.For BLECA,increasing the number of cross-domain devices in the park does not increase the cost of revoking cross-domain certificates when terminating park cooperation.From the above test results on write operations,it can be observed that the growth in the number of parks in the cooperative alliance can increase the cost of revoking cross-domain certificates resulting from terminating park cooperation.However,the protocol for cross-domain certificates batch revocation in this solution only requires one write operation,ensuring that the time cost does not increase significantly.Additionally,within the scheme[22],the process of revoking a device involves notifying the authentication servers in every domain to remove the relevant identity data,incurring substantial communication costs.This revocation process faces challenges in promptly synchronizing certificate information across all domains.In contrast,the device cancellation algorithm of BLECA ensures that the cross-domain certificates associated with the device can be revoked simultaneously when a device is canceled,which improves system security.

      Table 6: Cross-domain certificate revocation cost comparison

      In summary,our scheme can deliver lightweight and efficient cross-domain authentication services for smart parks,with a more secure and flexible certificate revocation mechanism.

      7 Conclusion and Future Work

      This paper introduces a blockchain-based cross-domain authentication scheme tailored for smart parks.This scheme designs the process of cross-domain authentication and session key agreement,simplifying the interaction of cross-domain authentication and reducing the certificate maintenance burden on devices,ensuring the feasibility of cross-domain interactions for resource-constrained devices.The mutual independence of cross-domain certificates aligns with the individual requirements of each park to manage certificates according to its own standards.A standout feature of this scheme is its provision of an editable cross-domain directed graph and a comprehensive certificate revocation mechanism,making it highly suitable for dynamic collaboration scenarios among smart parks.The batch revocation protocol of cross-domain certificates dramatically slashes computational and storage costs,which guarantees the efficiency of cross-domain authentication.The security analysis and performance evaluation manifest the practical security,high efficiency,and low cost of this scheme.In our future work,we will delve into blockchain consensus algorithms to develop a unique consensus mechanism tailored for IoT cross-domain authentication.

      Acknowledgement:Not applicable.

      Funding Statement:This work was supported in part by the National Natural Science Foundation Project of China under Grant No.62062009 and the Guangxi Innovation-Driven Development Project under Grant Nos.AA17204058-17 and AA18118047-7.

      Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:Fengting Luo,Ruwei Huang;data collection:Fengting Luo;analysis and interpretation of results: Fengting Luo,Ruwei Huang,Yuyue Chen;draft manuscript preparation: Fengting Luo.Yuyue Chen.All authors reviewed the results and approved the final version of the manuscript.

      Availability of Data and Materials:Not applicable.

      Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

      拉萨市| 兰溪市| 镇雄县| 南陵县| 洪江市| 镇赉县| 东乡族自治县| 绥德县| 宜章县| 金湖县| 迁安市| 绿春县| 抚松县| 合川市| 兰西县| 黎川县| 扶余县| 马尔康县| 宣武区| 饶阳县| 冀州市| 崇仁县| 修武县| 江川县| 建平县| 汶川县| 屯留县| 班玛县| 睢宁县| 女性| 乐安县| 深州市| 霍林郭勒市| 兴义市| 东山县| 信宜市| 托克托县| 札达县| 聂拉木县| 德安县| 雅江县|