Computer Science ›› 2025, Vol. 52 ›› Issue (5): 337-344.doi: 10.11896/jsjkx.240100190
• Information Security • Previous Articles Next Articles
WANG Qiuli1, REN Zhiyu1, WU Xiangyu1, GUAN Qiuguo1, WANG Haichao2
CLC Number:
[1]NANDY T,IDRIS M Y I B,NOOR R M,et al.Review on securi-ty of internet of things authentication mechanism[J].IEEE Access,2019,7(99):1-36. [2]CHOUHAN P K,MCCLEAN S,SHACKLETON M.Situation asses-sment to secure IoT applications[C]//2018 Fifth International Conference on Internet of Things:Systems,Management and Security.IEEE,2018:70-77. [3]KANG J,YU R,HUANG X,et al.Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2017,19(8):2627-2637. [4]SINGH P,MASUD M,HOSSAIN M S,et al.Cross-domain secure data sharing using blockchain for industrial IoT[J].Journal of Parallel and Distributed Computing,2021,156(10):176-184. [5]ZHANG S E,TIAN C W,LI B G.Review of identity authentication research based on blockchain technology[J].Computer Science,2023,50(5):329-347. [6]CHENG G J,DENG S G,WEN Y Y,et al.Survey on blockchain based Internet of Things authentication mechanisms[J].Journal of Software,2023,34(3):1470-1490. [7]YANG T,ZHANG G H,LIU L,et al.A survey on authentication protocols for Internet of Things[J].Journal of Cryptologic Research,2020,7(1):87-101. [8]WEI S,WU X,ZHANG Z.Blockchain-based Cross-domainTrust Authentication Mechanism in Industrial Internet of Things[J].Journal of Chinese Computer Systems,2024,45(4):975-983. [9]CHEN Y B,ZHONG C R,ZHOU C R,et al.Design of cross-domain authentication scheme based on medical consortium chain[J].Computer Science,2022,49(S1):537-543. [10]ZHU H Y,ZHANG X Y,XING H L,et al.Lightweight terminal cross-domain authentication protocol in edge computing environment[J].Chinese Journal of Network and Information Security,2023,9(4):74-89. [11]SHEN M,LIU H,ZHU L,et al.Blockchain-assisted secure device authentication for cross-domain industrial IoT[J].IEEE Journal on Selected Areas in Communications,2020,38(5):942-954. [12]CUI J,LIU N,ZHANG Q,et al.Efficient andanonymous cross-domain authentication for IIoT based on blockchain[J].IEEE Transactions on Network Science and Engineering,2022,10(2):899-910. [13]ZHANG Y,LI B,WU J,et al.Efficient andprivacy-preserving blockchain-based multifactor device authentication protocol for Cross-domain IIoT[J].IEEE Internet of Things Journal,2022,9(22):22501-22515. [14]XUE L,HUANG H,XIAO F,et al.A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums[J].IEEE Transactions on Network and Service Management,2022,19(3):2409-2420. [15]LIU X J,ZHONG Q,XIA Y J.Efficient authentication scheme for cross-trust domain of loV based on double-layer shard blockchain[J].Journal on Communications,2023,44(5):213-223. [16]FENG X,CUI K P,XIE Q Q,et al.Distributed Anonymous Authentication Scheme Based on the Blockchain in VANET[J].Journal on Communications,2022,43(9):134-147. [17]LIU Y,WANG J,YAN Z,et al.A survey on blockchain-based trust management for Internet of Things[J].IEEE Internet of Things Journal,2023,10(7):5898-5922. [18]YING B,NAYAK A.Anonymous and lightweight authentica-tion for secure vehicular networks[J].IEEE Transactions on Vehicular Technology,2017,66(12):10626-10636. [19]XU Z,LIANG W,LI K C,et al.A Blockchain-based Roadside Unit-assisted Authentication and Key Agreement Protocol for Internet of Vehicles[J].Journal of Parallel and Distributed Computing,2021,149(3):29-39. [20]XIE Q,WONG D S,WANG G,et al.Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model[J].IEEE Transactions on Information Forensics and Security,2017,12(6):1382-1392. [21]FLAJOLET P,GARDY D,THIMONIER L.Birthday paradox,coupon collectors,caching algorithmsand self-organizing search[J].Discrete Applied Mathematics,1992,39(3):207-229. [22]SEURIN Y.On the exact security of Schnorr-type signatures in the random oracle model[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2012:554-571. |
[1] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[2] | JIANG Ze-tao, XU Juan-juan. Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment [J]. Computer Science, 2020, 47(11): 60-67. |
[3] | HUANG Bin, LIU Guang-zhong and XU Ming. Key Management Scheme for Three-dimensional Acoustic Sensor Network Based on Cluster [J]. Computer Science, 2016, 43(11): 215-220. |
|