{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T15:25:41Z","timestamp":1743780341927,"version":"3.37.3"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20190346","61971131","3209002102C3","6709010003"],"award-info":[{"award-number":["BK20190346","61971131","3209002102C3","6709010003"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["BK20190346","61971131","3209002102C3","6709010003"],"award-info":[{"award-number":["BK20190346","61971131","3209002102C3","6709010003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["BK20190346","61971131","3209002102C3","6709010003"],"award-info":[{"award-number":["BK20190346","61971131","3209002102C3","6709010003"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["BK20190346","61971131","3209002102C3","6709010003"],"award-info":[{"award-number":["BK20190346","61971131","3209002102C3","6709010003"]}],"id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008081","name":"Southeast University","doi-asserted-by":"publisher","award":["BK20190346","61971131","3209002102C3","6709010003"],"award-info":[{"award-number":["BK20190346","61971131","3209002102C3","6709010003"]}],"id":[{"id":"10.13039\/501100008081","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,1,3]]},"abstract":"<jats:p>Internet of Things (IoT) has been ubiquitous in both industrial and living areas, but also known for its weak security. Being as the first defense line against various cyberattacks, authentication is even more critical to IoT applications. Moreover, there has been a growing demand for cross-domain collaboration, leading to an increasing need for cross-domain authentication. Recently, certificate-based authentication schemes have been extensively studied. However, many of these schemes are not efficient in computation, storage, and communication, which are highly required in IoT. In this paper, we propose a lightweight authentication scheme based on consortium blockchain and design a cryptocurrency-like digital token to build trust. Furthermore, trust lifecycle management is performed by manipulating the amount of tokens. The comprehensive analysis and evaluation demonstrate that the proposed scheme is resistant to various common attacks and more efficient than competitor schemes in terms of storage, communication, and authentication cost.<\/jats:p>","DOI":"10.1155\/2022\/9686049","type":"journal-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:35:07Z","timestamp":1641256507000},"page":"1-15","source":"Crossref","is-referenced-by-count":7,"title":["A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9531-9828","authenticated-orcid":true,"given":"Yujian","family":"Zhang","sequence":"first","affiliation":[{"name":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"},{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Yuhao","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Xing","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0629-4543","authenticated-orcid":true,"given":"Fei","family":"Tong","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"},{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"},{"name":"Purple Mountain Laboratories, Nanjing, China"}]},{"given":"Yuwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"},{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"},{"name":"Purple Mountain Laboratories, Nanjing, China"}]},{"given":"Jun","family":"Tao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"},{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"},{"name":"Purple Mountain Laboratories, Nanjing, China"}]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"},{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"},{"name":"Purple Mountain Laboratories, Nanjing, China"}]}],"member":"311","reference":[{"key":"1","article-title":"Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2030"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"first-page":"1093","article-title":"Understanding the Mirai botnet","author":"M. Antonakakis","key":"3"},{"article-title":"Forecast: IoT security, worldwide, 2018","year":"2018","author":"P. Middleton","key":"4"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2016.2634623"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2925071"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.006"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2019.8737423"},{"issue":"6","key":"11","doi-asserted-by":"crossref","first-page":"9762","DOI":"10.1109\/JIOT.2019.2931372","article-title":"Certificate-based anonymous device access control scheme for IoT environment","volume":"6","author":"S. Malani","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02036-0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/3277593.3277595"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.002"},{"first-page":"410","article-title":"IKP: turning a PKI around with decentralized automated incentives","author":"S. Matsumoto","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/iscc.2016.7543884"},{"key":"17","first-page":"1","article-title":"Blockchain-based certificate transparency and revocation transparency","author":"Z. Wang","year":"2020","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"article-title":"Certcoin: a namecoin based decentralized authentication system","year":"2014","author":"C. Fromknecht","key":"18"},{"first-page":"1","article-title":"AuthCoin: validation and authentication in decentralized networks","author":"L. Benjamin","key":"19"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.025"},{"issue":"4","key":"21","first-page":"1","article-title":"IRBA: an identity-based cross-domain authentication scheme for the Internet of Things","volume":"9","author":"X. Jia","year":"2020","journal-title":"Electronics"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2020.2980916"},{"key":"23","article-title":"Research on multidomain authentication of IoT based on cross-chain technology","volume":"2020","author":"D. Li","year":"2020","journal-title":"Security and Communication Networks"},{"author":"S. Nakamoto","key":"24","article-title":"Bitcoin: a peer-to-peer electronic cash system"},{"year":"2021","key":"25","article-title":"Ethereum"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2020-fall49728.2020.9348497"},{"key":"27","first-page":"1","article-title":"Towards multiple-mix-attack detection via consensus-based trust management in IoT networks","volume":"96","author":"Z. Ma","year":"2020","journal-title":"Computers & Security"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2794991"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"30","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.inffus.2020.12.006","article-title":"Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration","volume":"70","author":"W. Meng","year":"2020","journal-title":"Information Fusion"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/bloc.2019.8751452"},{"first-page":"105","article-title":"Is the Web ready for OCSP must-staple?","author":"T. Chung","key":"32"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/9686049.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/9686049.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/9686049.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:35:17Z","timestamp":1641256517000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/9686049\/"}},"subtitle":[],"editor":[{"given":"Wenjuan","family":"Li","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":32,"alternative-id":["9686049","9686049"],"URL":"https:\/\/doi.org\/10.1155\/2022\/9686049","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2022,1,3]]}}}