Skip to main content

Point-to-Point Offline Authentication Consensus Algorithm in the Internet of Things

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Included in the following conference series:

  • 1261 Accesses

Abstract

In the era of Internet of Things, identity and information authentication have drawn more and more attention. Existing identification mechanisms for identity information generally require networks, biometrics, etc., which exist security vulnerabilities such as security holes, privacy leaks, and vulnerability to attacks. A non-interactive concise offline authentication scheme based on block-chain technology is proposed which no need for complex services such as networking, and hardware implementation is simple. We research anonymity based on block-chain, workload proof and privacy protection technologies, design system models. Integrate device information, data, and confidentiality. The cloud platform function such as key management completes the hardware verification of the offline token authentication algorithm. The experiment results show that the scheme has the characteristics of extremely low recognition rate with a certain difficulty, high performance, high security, low cost, etc. Compared with the existing authentication methods, ours has more advantages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
eBook
USD 84.99
Price excludes VAT (USA)
Softcover Book
USD 109.99
Price excludes VAT (USA)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)

    Article  Google Scholar 

  2. Lamport, L.: Paxos made simple. ACM SIGACT News 32(4), 18–25 (2001)

    Google Scholar 

  3. Lamport, L.: The part-time parliament. ACM Trans. Comput. Syst. (TOCS) 16(2), 133–169 (1998)

    Article  Google Scholar 

  4. Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: OSDI 1999, vol. 99, pp. 173–186 (1999)

    Google Scholar 

  5. Ongaro, D., Ousterhout, J.: In search of an understandable consensus algorithm (extended version). In: USENIX Annual Technical Conference, pp. 305–320 (2014)

    Google Scholar 

  6. Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. Massachusetts Inst of Tech Cambridge Lab for Computer Science (1982)

    Google Scholar 

  7. Dai, W.: B-money, a scheme for a group of untraceable digital pseudonyms to pay each other with money and to enforce contracts amongst themselves without outside help (1998). http://www.weidai.com/bmoney.txt

  8. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  9. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  10. Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Crypt. 19(2–3), 173–193 (2000)

    Article  MathSciNet  Google Scholar 

  11. Hui, H., Zhou, C., Xu, S., Lin, F.: A novel secure data transmission scheme in industrial Internet of Things. China Commun. 17(1), 73–88 (2020)

    Article  Google Scholar 

  12. Su, J., Lin, F., Zhou, X., Lu, X.: Steiner tree based optimal resource caching scheme in fog computing. China Commun. 12(8), 161–168 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue-Ming Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Du, XF., Lu, YM., Han, DQ. (2020). Point-to-Point Offline Authentication Consensus Algorithm in the Internet of Things. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics