Research Article
Achieving trustworthiness, Transferable, Cross-domain Dynamic Accumulator Authentication in Industrial Internet of Things
@INPROCEEDINGS{10.4108/eai.27-8-2020.2294325, author={Linjie Wang and Youliang Tian and Jinbo Xiong}, title={Achieving trustworthiness, Transferable, Cross-domain Dynamic Accumulator Authentication in Industrial Internet of Things}, proceedings={Proceedings of the 13th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2020, 27-28 August 2020, Cyberspace}, publisher={EAI}, proceedings_a={MOBIMEDIA}, year={2020}, month={11}, keywords={cross-domain authentication undirected graph accumulator bilinear pairings}, doi={10.4108/eai.27-8-2020.2294325} }
- Linjie Wang
Youliang Tian
Jinbo Xiong
Year: 2020
Achieving trustworthiness, Transferable, Cross-domain Dynamic Accumulator Authentication in Industrial Internet of Things
MOBIMEDIA
EAI
DOI: 10.4108/eai.27-8-2020.2294325
Abstract
The authentication problem is one of the most significantchallenges in the industrial Internet of Things control system applica-tions. To authenticate the relationships between devices is an effectivesolution to tackle authentication issue. However, the previous studies ofInternet of Things focused on connecting sensors and setting the sharingcondition from either private or public in the sense that the relationshipauthentication issue between devices is not well solved. In this paper, wepropose CDAA, a Cross-domain Dynamic Accumulator Authenticationwith a general undirected graph representing the relationship betweendevices needed authentication for industrial Internet of Things support-ing trustworthiness cross-domain, cryptographic accumulator, and trans-ferability. Specifically, a dynamically updatable cross-domain authenti-cation scheme is proposed based on the cryptographic accumulator anda standard digital signature scheme as the underlay of the CDAA. Fi-nally, we give the analysis and comparison and the results show that theproposed scheme can address the authentication issue. The effectivenessand feasibility of proposed scheme are presented and analyzed througha comparison with traditional systems in practical application.