Cargando…

Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †

Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better ac...

Descripción completa

Detalles Bibliográficos
Autores principales: Han, Daoqi, Du, Xiaofeng, Lu, Yueming
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218864/
https://www.ncbi.nlm.nih.gov/pubmed/32326501
http://dx.doi.org/10.3390/s20082231
_version_ 1783532878844395520
author Han, Daoqi
Du, Xiaofeng
Lu, Yueming
author_facet Han, Daoqi
Du, Xiaofeng
Lu, Yueming
author_sort Han, Daoqi
collection PubMed
description Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better access control and privacy protection, furthermore, blockchain architecture has achieved a trusted store of value by open-source and distributed consensus mechanisms. To embrace these new paradigms, we propose a scheme that employs one-time association multitasking proofs for peer to local authentication (OTMP-P2L). The scheme chooses relevant nondeterministic polynomial (NP) problem tasks, and manages localized trust and anonymity by using smart devices such as phones and pads, thereby enabling IoT devices to autonomously perform consensus validation with an enhanced message authentication code. This nested code is a one-time zero-knowledge proof that comprises multiple logic verification arguments. To increase diversity and reduce the workload of each one, these arguments are chained by a method that establishes some of the inputs of the following task from the output of previous tasks. We implemented a smart lock system and confirmed that the scheme outperforms IoT authentication methods. The result demonstrates superior flexibility through dynamic difficulty strategies and succinct non-interactive peer-to-peer (P2P) verification.
format Online
Article
Text
id pubmed-7218864
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-72188642020-05-22 Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access † Han, Daoqi Du, Xiaofeng Lu, Yueming Sensors (Basel) Article Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better access control and privacy protection, furthermore, blockchain architecture has achieved a trusted store of value by open-source and distributed consensus mechanisms. To embrace these new paradigms, we propose a scheme that employs one-time association multitasking proofs for peer to local authentication (OTMP-P2L). The scheme chooses relevant nondeterministic polynomial (NP) problem tasks, and manages localized trust and anonymity by using smart devices such as phones and pads, thereby enabling IoT devices to autonomously perform consensus validation with an enhanced message authentication code. This nested code is a one-time zero-knowledge proof that comprises multiple logic verification arguments. To increase diversity and reduce the workload of each one, these arguments are chained by a method that establishes some of the inputs of the following task from the output of previous tasks. We implemented a smart lock system and confirmed that the scheme outperforms IoT authentication methods. The result demonstrates superior flexibility through dynamic difficulty strategies and succinct non-interactive peer-to-peer (P2P) verification. MDPI 2020-04-15 /pmc/articles/PMC7218864/ /pubmed/32326501 http://dx.doi.org/10.3390/s20082231 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Han, Daoqi
Du, Xiaofeng
Lu, Yueming
Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
title Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
title_full Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
title_fullStr Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
title_full_unstemmed Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
title_short Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
title_sort trustworthiness and a zero leakage otmp-p2l scheme based on np problems for edge security access †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218864/
https://www.ncbi.nlm.nih.gov/pubmed/32326501
http://dx.doi.org/10.3390/s20082231
work_keys_str_mv AT handaoqi trustworthinessandazeroleakageotmpp2lschemebasedonnpproblemsforedgesecurityaccess
AT duxiaofeng trustworthinessandazeroleakageotmpp2lschemebasedonnpproblemsforedgesecurityaccess
AT luyueming trustworthinessandazeroleakageotmpp2lschemebasedonnpproblemsforedgesecurityaccess