Skip to main content

Multi-attribute Authentication Method Based on Continuous Trust Evaluation

  • Conference paper
  • First Online:
Book cover Smart Computing and Communication (SmartCom 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13202))

Included in the following conference series:

  • 1110 Accesses

Abstract

In order to solve the data security problems faced by the power Internet of Things, this article combines the trust evaluation technology and the token authentication method to propose a multi-attribute identity authentication method based on continuous trust evaluation. This method embeds the trust evaluation value into the token, and authenticate the user’s identity through the real-time update of the token, thereby granting the corresponding authority. At the same time, the authentication process is encrypted and decrypted by mixing the random generation matrix encryption algorithm based on chaotic mapping and the RSA digital signature algorithm to improve the security of authentication. The experimental results show that the trust evaluation value obtained by the continuous trust evaluation algorithm for users with different identities are different, so the resource permissions obtained are also different. Therefore, the multi-attribute authentication method combined with trust evaluation in this paper has higher security and confidentiality than previous authentication methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gong, Y., Chen, C., Liu, B.: Research on the ubiquitous electric power Internet of Things security management based on edge-cloud computing collaboration technology. In: IEEE Sustainable Power and Energy Conference (ISPEC), pp. 1997–2002 (2019)

    Google Scholar 

  2. Bedi, G., Singh, R.: Review of Internet of Things (IOT) in electric power and energy systems. IEEE Internet of Things J. 5(2), 847–870 (2018)

    Article  Google Scholar 

  3. Dalkılıç, H., Özcanhan, M.H.: Strong authentication protocol for identity verification in Internet of Things (IOT). In: 6th International Conference on Computer Science and Engineering (UBMK), pp. 199–203. IEEE (2021)

    Google Scholar 

  4. Huang, H., Chen, X.: Power mobile terminal identity authentication mechanism based on blockchain. In: International Wireless Communications and Mobile Computing (IWCMC), pp. 195–198 (2020)

    Google Scholar 

  5. Alashik, K.M., Yildirim, R.: Human identity verification from biometric dorsal hand vein images using the DL-GAN method. IEEE Access 9, 74194–74208 (2021)

    Article  Google Scholar 

  6. Aliev, H., Kim, H.-W.: Matrix-based dynamic authentication with conditional privacy-preservation for vehicular network security. IEEE Access 8, 200883–200896 (2020)

    Article  Google Scholar 

  7. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  8. Chen, Y., Kong, W., Jiang, X.: Anti-synchronization and robust authentication for noisy PUF-based smart card. IEEE Access 7, 142214–142223 (2019)

    Article  Google Scholar 

  9. Carretero, J., Izquierdo-Moreno, G., Vasile-Cabezas, M., Garcia-Blas, J.: Federated identity architecture of the European eID system. IEEE Access 6, 75302–75326 (2018)

    Article  Google Scholar 

  10. Ahmed, A.A., Wendy, K., Kabir, M.N., Sadiq, A.S.: Dynamic reciprocal authentication protocol for mobile cloud computing. IEEE Syst. J. 15(1), 727–737 (2020)

    Article  Google Scholar 

  11. Mao, D., Liu, H., Zhang, W.: An enhanced three-factor authentication scheme with dynamic verification for medical multimedia information systems. IEEE Access 7, 167683–167695 (2019)

    Article  Google Scholar 

  12. Vinoth, R., Deborah, L., Vijayakumar, P., Kumar, N.: Secure multifactor authenticated key agreement scheme for industrial IoT. IEEE Internet of Things J. 8(5), 3801–3811 (2021). https://doi.org/10.1109/JIOT.2020.3024703

    Article  Google Scholar 

  13. Qu, C., Buyya, R.: A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In: International Conference on Advanced Information Networking and Applications, pp. 850–857. IEEE (2014)

    Google Scholar 

  14. Panigrahi, R., Srivastava, P.R.: Evaluation of travel websites a fuzzy analytical hierarchy process approach. In: IEEE UPCON Conference, Allahabad, pp. 1–6 (2015)

    Google Scholar 

  15. Atiewi, S.: Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access 8, 113498–113511 (2020)

    Article  Google Scholar 

  16. Maciej, B., Imed, E.F., Kurkowski, M.: Multifactor authentication protocol in a mobile environment. IEEE Access 7, 157185–157199 (2019)

    Article  Google Scholar 

  17. Yang, Y.S., Lee, S.H., Chen, W.C., Yang, C.S., Huang, Y.M., Hou, T.W.: TTAS: trusted token authentication service of securing SCADA network in energy management system for industrial Internet of Things. Sensors 21, 2685 (2021)

    Article  Google Scholar 

  18. Qi, R., Zhou, J., Liu, Y.: Research on the network security system of water resources management decision support system based on token. Hydropower, pp. 1–7 (2021)

    Google Scholar 

  19. Zou, J.: Application research of token-based identity authentication in university training interactive platform. In: Wireless Internet Technology (2018)

    Google Scholar 

  20. Xu, Z., Liao, H.: Intuitionistic fuzzy analytic hierarchy process. IEEE Trans. Fuzzy Syst. 22(4), 749–761 (2014). https://doi.org/10.1109/TFUZZ.2013.2272585

    Article  Google Scholar 

  21. Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)

    Google Scholar 

  22. Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236–247. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52015-5_24

    Chapter  Google Scholar 

  23. Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)

    Google Scholar 

  24. Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM Conference, pp. 1–5 (2008)

    Google Scholar 

  25. Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59–67 (2020)

    Article  Google Scholar 

  26. Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) Smart Blockchain: First International Conference, SmartBlock 2018, pp. 159–166. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05764-0_17

    Chapter  Google Scholar 

Download references

Acknowledgement

Supported by the science and technology project of State Grid Corporation of China: “Research on Dynamic Access Authentication and Trust Evaluation Technology of Power Mobile Internet Services Based on Zero Trust” (Grand No. 5700-202158183A-0-0-00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, J., Li, B., Du, P., Xin, Z., Zhang, J., Chen, J. (2022). Multi-attribute Authentication Method Based on Continuous Trust Evaluation. In: Qiu, M., Gai, K., Qiu, H. (eds) Smart Computing and Communication. SmartCom 2021. Lecture Notes in Computer Science, vol 13202. Springer, Cham. https://doi.org/10.1007/978-3-030-97774-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-97774-0_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-97773-3

  • Online ISBN: 978-3-030-97774-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics