Skip to main content

Advertisement

Log in

An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device nodes are connected to the network, generating massive amounts of data. Therefore, it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission. At present, blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability. Recently, Fan et al. proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme. We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes. To overcome these security flaws, this paper proposes an enhanced authentication and data transmission scheme, which is verified by formal security proofs and informal security analysis. Furthermore, Scyther is applied to prove the security of the proposed scheme. Moreover, it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Hasan M. State of IoT-Spring 2022. IOT Analytics, See https://iot-analytics.com/product/state-of-iot-spring-2022 website, 2022

  2. Wang X, Ning Z, Hu X, Wang L, Hu B, Cheng J, Leung V C M. Optimizing content dissemination for real-time traffic management in large-scale internet of vehicle systems. IEEE Transactions on Vehicular Technology, 2019, 68(2): 1093–1105

    Article  Google Scholar 

  3. Kelly J T, Campbell K L, Gong E, Scuffham P. The internet of things: impact and implications for health care delivery. Journal of Medical Internet Research, 2020, 22(11): e20135

    Article  Google Scholar 

  4. Zemrane H, Baddi Y, Hasbi A. Internet of things smart home ecosystem. In: Elhoseny M, Hassanien A E, eds. Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks. Cham: Springer, 2020, 101–125

    Chapter  Google Scholar 

  5. Miloslavskaya N, Tolstoy A. Internet of things: information security challenges and solutions. Cluster Computing, 2019, 22(1): 103–119

    Article  Google Scholar 

  6. Khan M A, Salah K. IoT security: review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018, 82: 395–411

    Article  Google Scholar 

  7. Fakhri D, Mutijarsa K. Secure IoT communication using blockchain technology. In: Proceedings of 2018 International Symposium on Electronics and Smart Devices (ISESD). 2018, 1–6

  8. Fan Q, Chen J H, Deborah L J, Luo M. A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. Journal of Systems Architecture, 2021, 117: 102112

    Article  Google Scholar 

  9. Liu S G, Dibaei M, Tai Y, Chen C, Zhang J, Xiang Y. Cyber vulnerability intelligence for internet of things binary. IEEE Transactions on Industrial Informatics, 2020, 16(3): 2154–2163

    Article  Google Scholar 

  10. Xu Z, Xu C, Chen H, Yang F. A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and Computation: Practice and Experience, 2019, 31(14): e5295

    Article  Google Scholar 

  11. Alzahrani B A, Irshad A, Albeshri A, Alsubhi K. A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wireless Personal Communications, 2021, 117(1): 47–69

    Article  Google Scholar 

  12. Adavoudi-Jolfaei H, Ashouri-Talouki M, Aghili S F. Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Networking and Applications, 2019, 12(1): 43–59

    Article  Google Scholar 

  13. Gope P, Hwang T. A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics, 2016, 63(11): 7124–7132

    Article  Google Scholar 

  14. Kumar P, Chouhan L. A secure authentication scheme for IoT application in smart home. Peer-to-Peer Networking and Applications, 2021, 14(1): 420–438

    Article  Google Scholar 

  15. Bera B, Vangala A, Das A K, Lorenz P, Khan M K. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Computer Standards & Interfaces, 2022, 80: 103567

    Article  Google Scholar 

  16. Islam T, Youki R A, Chowdhury B R, Hasan A S M T. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In: Proceedings of the International Conference on Big Data, IoT, and Machine Learning. 2022, 431–444

  17. Panda S S, Jena D, Mohanta B K, Ramasubbareddy S, Daneshmand M, Gandomi A H. Authentication and key management in distributed IoT using blockchain technology. IEEE Internet of Things Journal, 2021, 8(16): 12947–12954

    Article  Google Scholar 

  18. Kshetri N. Can blockchain strengthen the internet of things? IT Professional, 2017, 19(4): 68–72

    Article  Google Scholar 

  19. Cui Z, Xue F, Zhang S, Cai X, Cao Y, Zhang W, Chen J. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, 2020, 13(2): 241–251

    Google Scholar 

  20. Khalid U, Asim M, Baker T, Hung P C K, Tariq M A, Rafferty L. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Computing, 2020, 23(3): 2067–2087

    Article  Google Scholar 

  21. Yang X, Yang X, Yi X, Khalil I, Zhou X, He D, Huang X, Nepal S. Blockchain-based secure and lightweight authentication for internet of things. IEEE Internet of Things Journal, 2022, 9(5): 3321–3332

    Article  Google Scholar 

  22. Choi K Y, Hwang J Y, Lee D H, Seo I S. ID-based authenticated key agreement for low-power mobile devices. In: Proceedings of the 10th Australasian Conference on Information Security and Privacy. 2005, 494–505

  23. Guo Z, Ni Y, Wong W S, Shi L. Time synchronization attack and countermeasure for multisystem scheduling in remote estimation. IEEE Transactions on Automatic Control, 2021, 66(2): 916–923

    Article  MathSciNet  Google Scholar 

  24. Tabassum N, Geetha D D, Biradar R C. Joint position estimation and synchronization of clocks in WSN. In: Proceedings of the 6th International Congress on Information and Communication Technology. 2022, 409–418

  25. Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361–396

    Article  Google Scholar 

  26. Cremers C J F. The scyther tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification. 2008, 414–418

  27. Lowe G. A hierarchy of authentication specifications. In: Proceedings of the 10th Computer Security Foundations Workshop. 1997, 31–43

  28. Wu T Y, Wang T, Lee Y Q, Zheng W, Kumari S, Kumar S. Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Security and Communication Networks, 2021, 2021, 1–16

    Google Scholar 

  29. Li Y, Cheng Q, Liu X, Li X. A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal, 2021, 15(1): 935–946

    Article  Google Scholar 

  30. Jia X, He D, Kumar N, Choo K K R A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal, 2020, 14(1): 560–571

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61872449, U1804263, 62172435, 62172141, 61772173), the Zhongyuan Science and Technology Innovation Leading Talent Project, China (No. 214200510019), the Natural Science Foundation of Henan (No. 222300420004), the Major Public Welfare Special Projects of Henan Province (No. 201300210100) and the Key Research and Development Project of Henan Province (No. 221111321200).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo.

Additional information

Xingxing Chen received her MS degree in School of Information Science and Engineering from Henan University of Technology, China in 2021. She is currently pursuing the PhD degree at the State Key Laboratory of Mathematical Engineering and Advanced Computing, China. Her research interests are information security and blockchain.

Qingfeng Cheng received the MS degree from National University of Defense Technology, China in 2004 and PhD degree from Information Engineering University, China in 2011. He is now a professor in the State Key Laboratory of Mathematical Engineering and Advanced Computing, China. His research interests include cryptography and information security.

Weidong Yang received his BS in Industrial Automation, MS and PhD degree in Computer Science from Xidian University, China in 1999, 2005, and 2008, respectively. He is now a professor in Henan University of Technology, deputy chair of Henan Key Laboratory of Grain Photoelectric Detection and Control, Henan University of Technology, China. He is also a senior member of China Computer Federation (CCF). His research focuses on wireless networks security, privacy protection, vehicular ad-hoc networks, and so on.

Xiangyang Luo received his BS, MS and PhD degrees from the State Key Laboratory of Mathematical Engineering and Advanced Computing, China in 2001, 2004, and 2010, respectively. He is the author or co-author of more than 150 refereed international journal and conference papers. He is currently a professor of the State Key Laboratory of Mathematical Engineering and Advanced Computing, also with Key Laboratory of Cyberspace Situation Awareness of Henan Province. His research interests are multimedia security and network security.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, X., Cheng, Q., Yang, W. et al. An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain. Front. Comput. Sci. 18, 183807 (2024). https://doi.org/10.1007/s11704-023-2595-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-023-2595-x

Keywords