Cargando…
Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better ac...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218864/ https://www.ncbi.nlm.nih.gov/pubmed/32326501 http://dx.doi.org/10.3390/s20082231 |
_version_ | 1783532878844395520 |
---|---|
author | Han, Daoqi Du, Xiaofeng Lu, Yueming |
author_facet | Han, Daoqi Du, Xiaofeng Lu, Yueming |
author_sort | Han, Daoqi |
collection | PubMed |
description | Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better access control and privacy protection, furthermore, blockchain architecture has achieved a trusted store of value by open-source and distributed consensus mechanisms. To embrace these new paradigms, we propose a scheme that employs one-time association multitasking proofs for peer to local authentication (OTMP-P2L). The scheme chooses relevant nondeterministic polynomial (NP) problem tasks, and manages localized trust and anonymity by using smart devices such as phones and pads, thereby enabling IoT devices to autonomously perform consensus validation with an enhanced message authentication code. This nested code is a one-time zero-knowledge proof that comprises multiple logic verification arguments. To increase diversity and reduce the workload of each one, these arguments are chained by a method that establishes some of the inputs of the following task from the output of previous tasks. We implemented a smart lock system and confirmed that the scheme outperforms IoT authentication methods. The result demonstrates superior flexibility through dynamic difficulty strategies and succinct non-interactive peer-to-peer (P2P) verification. |
format | Online Article Text |
id | pubmed-7218864 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-72188642020-05-22 Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † Han, Daoqi Du, Xiaofeng Lu, Yueming Sensors (Basel) Article Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better access control and privacy protection, furthermore, blockchain architecture has achieved a trusted store of value by open-source and distributed consensus mechanisms. To embrace these new paradigms, we propose a scheme that employs one-time association multitasking proofs for peer to local authentication (OTMP-P2L). The scheme chooses relevant nondeterministic polynomial (NP) problem tasks, and manages localized trust and anonymity by using smart devices such as phones and pads, thereby enabling IoT devices to autonomously perform consensus validation with an enhanced message authentication code. This nested code is a one-time zero-knowledge proof that comprises multiple logic verification arguments. To increase diversity and reduce the workload of each one, these arguments are chained by a method that establishes some of the inputs of the following task from the output of previous tasks. We implemented a smart lock system and confirmed that the scheme outperforms IoT authentication methods. The result demonstrates superior flexibility through dynamic difficulty strategies and succinct non-interactive peer-to-peer (P2P) verification. MDPI 2020-04-15 /pmc/articles/PMC7218864/ /pubmed/32326501 http://dx.doi.org/10.3390/s20082231 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Han, Daoqi Du, Xiaofeng Lu, Yueming Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † |
title | Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † |
title_full | Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † |
title_fullStr | Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † |
title_full_unstemmed | Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † |
title_short | Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † |
title_sort | trustworthiness and a zero leakage otmp-p2l scheme based on np problems for edge security access † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218864/ https://www.ncbi.nlm.nih.gov/pubmed/32326501 http://dx.doi.org/10.3390/s20082231 |
work_keys_str_mv | AT handaoqi trustworthinessandazeroleakageotmpp2lschemebasedonnpproblemsforedgesecurityaccess AT duxiaofeng trustworthinessandazeroleakageotmpp2lschemebasedonnpproblemsforedgesecurityaccess AT luyueming trustworthinessandazeroleakageotmpp2lschemebasedonnpproblemsforedgesecurityaccess |