Abstract
In order to solve the data security problems faced by the power Internet of Things, this article combines the trust evaluation technology and the token authentication method to propose a multi-attribute identity authentication method based on continuous trust evaluation. This method embeds the trust evaluation value into the token, and authenticate the user’s identity through the real-time update of the token, thereby granting the corresponding authority. At the same time, the authentication process is encrypted and decrypted by mixing the random generation matrix encryption algorithm based on chaotic mapping and the RSA digital signature algorithm to improve the security of authentication. The experimental results show that the trust evaluation value obtained by the continuous trust evaluation algorithm for users with different identities are different, so the resource permissions obtained are also different. Therefore, the multi-attribute authentication method combined with trust evaluation in this paper has higher security and confidentiality than previous authentication methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gong, Y., Chen, C., Liu, B.: Research on the ubiquitous electric power Internet of Things security management based on edge-cloud computing collaboration technology. In: IEEE Sustainable Power and Energy Conference (ISPEC), pp. 1997–2002 (2019)
Bedi, G., Singh, R.: Review of Internet of Things (IOT) in electric power and energy systems. IEEE Internet of Things J. 5(2), 847–870 (2018)
Dalkılıç, H., Özcanhan, M.H.: Strong authentication protocol for identity verification in Internet of Things (IOT). In: 6th International Conference on Computer Science and Engineering (UBMK), pp. 199–203. IEEE (2021)
Huang, H., Chen, X.: Power mobile terminal identity authentication mechanism based on blockchain. In: International Wireless Communications and Mobile Computing (IWCMC), pp. 195–198 (2020)
Alashik, K.M., Yildirim, R.: Human identity verification from biometric dorsal hand vein images using the DL-GAN method. IEEE Access 9, 74194–74208 (2021)
Aliev, H., Kim, H.-W.: Matrix-based dynamic authentication with conditional privacy-preservation for vehicular network security. IEEE Access 8, 200883–200896 (2020)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
Chen, Y., Kong, W., Jiang, X.: Anti-synchronization and robust authentication for noisy PUF-based smart card. IEEE Access 7, 142214–142223 (2019)
Carretero, J., Izquierdo-Moreno, G., Vasile-Cabezas, M., Garcia-Blas, J.: Federated identity architecture of the European eID system. IEEE Access 6, 75302–75326 (2018)
Ahmed, A.A., Wendy, K., Kabir, M.N., Sadiq, A.S.: Dynamic reciprocal authentication protocol for mobile cloud computing. IEEE Syst. J. 15(1), 727–737 (2020)
Mao, D., Liu, H., Zhang, W.: An enhanced three-factor authentication scheme with dynamic verification for medical multimedia information systems. IEEE Access 7, 167683–167695 (2019)
Vinoth, R., Deborah, L., Vijayakumar, P., Kumar, N.: Secure multifactor authenticated key agreement scheme for industrial IoT. IEEE Internet of Things J. 8(5), 3801–3811 (2021). https://doi.org/10.1109/JIOT.2020.3024703
Qu, C., Buyya, R.: A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In: International Conference on Advanced Information Networking and Applications, pp. 850–857. IEEE (2014)
Panigrahi, R., Srivastava, P.R.: Evaluation of travel websites a fuzzy analytical hierarchy process approach. In: IEEE UPCON Conference, Allahabad, pp. 1–6 (2015)
Atiewi, S.: Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access 8, 113498–113511 (2020)
Maciej, B., Imed, E.F., Kurkowski, M.: Multifactor authentication protocol in a mobile environment. IEEE Access 7, 157185–157199 (2019)
Yang, Y.S., Lee, S.H., Chen, W.C., Yang, C.S., Huang, Y.M., Hou, T.W.: TTAS: trusted token authentication service of securing SCADA network in energy management system for industrial Internet of Things. Sensors 21, 2685 (2021)
Qi, R., Zhou, J., Liu, Y.: Research on the network security system of water resources management decision support system based on token. Hydropower, pp. 1–7 (2021)
Zou, J.: Application research of token-based identity authentication in university training interactive platform. In: Wireless Internet Technology (2018)
Xu, Z., Liao, H.: Intuitionistic fuzzy analytic hierarchy process. IEEE Trans. Fuzzy Syst. 22(4), 749–761 (2014). https://doi.org/10.1109/TFUZZ.2013.2272585
Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)
Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236–247. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52015-5_24
Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)
Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM Conference, pp. 1–5 (2008)
Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59–67 (2020)
Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) Smart Blockchain: First International Conference, SmartBlock 2018, pp. 159–166. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05764-0_17
Acknowledgement
Supported by the science and technology project of State Grid Corporation of China: “Research on Dynamic Access Authentication and Trust Evaluation Technology of Power Mobile Internet Services Based on Zero Trust” (Grand No. 5700-202158183A-0-0-00).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Guo, J., Li, B., Du, P., Xin, Z., Zhang, J., Chen, J. (2022). Multi-attribute Authentication Method Based on Continuous Trust Evaluation. In: Qiu, M., Gai, K., Qiu, H. (eds) Smart Computing and Communication. SmartCom 2021. Lecture Notes in Computer Science, vol 13202. Springer, Cham. https://doi.org/10.1007/978-3-030-97774-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-97774-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-97773-3
Online ISBN: 978-3-030-97774-0
eBook Packages: Computer ScienceComputer Science (R0)