{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:10:56Z","timestamp":1774541456092,"version":"3.50.1"},"reference-count":45,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Huaian Science and Technology Plan Project Natural Science Research","award":["HAB2024048"],"award-info":[{"award-number":["HAB2024048"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The Industrial Internet of Things (IIoT), a key enabler of Industry 4.0, integrates advanced communication technologies with the industrial economy to enable intelligent manufacturing and interconnected systems. Secure and reliable identity authentication in the IIoT becomes essential as connectivity expands across devices, systems, and domains. Blockchain technology presents a promising solution due to its decentralized, tamper-resistant, and traceable characteristics, facilitating secure and transparent identity verification. However, current blockchain-based cross-domain authentication schemes often lack a lightweight design, rendering them unsuitable for latency-sensitive and resource-constrained industrial environments. This paper proposes a lightweight cross-domain authentication scheme that combines blockchain with Chebyshev chaotic mapping. Unlike existing schemes relying heavily on Elliptic Curve Cryptography or bilinear pairing, our design circumvents such computationally intensive primitives entirely through the algebraic structure of Chebyshev polynomials. A formal security analysis using the Real-Or-Random (ROR) model demonstrates the scheme\u2019s robustness. Furthermore, performance evaluations conducted with Hyperledger Fabric and the MIRACL cryptographic library validate the method\u2019s effectiveness and superiority over existing approaches in terms of both security and operational efficiency.<\/jats:p>","DOI":"10.3390\/fi17080338","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T14:05:47Z","timestamp":1753711547000},"page":"338","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7410-8677","authenticated-orcid":false,"given":"Zhonghao","family":"Zhai","sequence":"first","affiliation":[{"name":"Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai\u2019an 223025, China"}]},{"given":"Junyi","family":"Liu","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai\u2019an 223025, China"}]},{"given":"Xinying","family":"Liu","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai\u2019an 223025, China"}]},{"given":"Yanqin","family":"Mao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210049, China"}]},{"given":"Xinjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210049, China"}]},{"given":"Jialin","family":"Ma","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai\u2019an 223025, China"}]},{"given":"Chunhua","family":"Jin","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai\u2019an 223025, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"19143","DOI":"10.1109\/JIOT.2024.3367692","article-title":"Industrial internet of things intelligence empowering smart manufacturing: A literature review","volume":"11","author":"Hu","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_2","unstructured":"(2025, June 18). Industrial IoT Industry Worth $286.3 Billion by 2029. Available online: https:\/\/www.marketsandmarkets.com\/PressReleases\/industrial-internet-of-things.asp."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3703444","article-title":"IoT Authentication Protocols: Challenges, and Comparative Analysis","volume":"57","author":"Alsheavi","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"ref_4","first-page":"100848","article-title":"Blockchain-based fast handover authentication protocol for Internet of Vehicles in small industrial parks","volume":"50","author":"Tian","year":"2024","journal-title":"Veh. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/TNSE.2023.3292624","article-title":"A Blockchain-Based Cross-Domain Authentication Management System for IoT Devices","volume":"11","author":"Liu","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1109\/COMST.2023.3323640","article-title":"A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies","volume":"25","author":"Khan","year":"2023","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2664","DOI":"10.1109\/TNSM.2022.3180357","article-title":"A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network","volume":"19","author":"Wang","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"24035","DOI":"10.1109\/JIOT.2024.3387934","article-title":"BCAE: A Blockchain-Based Cross Domain Authentication Scheme for Edge Computing","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3789","DOI":"10.1109\/TIFS.2022.3214733","article-title":"CCAP: A complete cross-domain authentication based on blockchain for Internet of Things","volume":"17","author":"Tong","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"16325","DOI":"10.1109\/JIOT.2024.3351892","article-title":"Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIoT","volume":"11","author":"Cui","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/TNSE.2022.3224453","article-title":"Efficient and anonymous cross-domain authentication for IIoT based on blockchain","volume":"10","author":"Cui","year":"2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"100096","DOI":"10.1016\/j.hcc.2022.100096","article-title":"Cross-domain identity authentication scheme based on blockchain and PKI system","volume":"3","author":"Zhang","year":"2023","journal-title":"High-Confid. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"109069","DOI":"10.1016\/j.comnet.2022.109069","article-title":"ProofChain: An X. 509-compatible blockchain-based PKI framework with decentralized trust","volume":"213","author":"Saleem","year":"2022","journal-title":"Comput. Networks"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"8078","DOI":"10.1109\/JIOT.2021.3107443","article-title":"A Blockchain-Based Multidomain Authentication Scheme for Conditional Privacy Preserving in Vehicular Ad-Hoc Network","volume":"9","author":"Yang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3209","DOI":"10.1109\/TNSM.2024.3379587","article-title":"Split-chain based efficient blockchain-assisted cross-domain authentication for IoT","volume":"21","author":"Luo","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/TSUSC.2024.3350343","article-title":"Oracle based privacy-preserving cross-domain authentication scheme","volume":"9","author":"Su","year":"2024","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_17","first-page":"2409","article-title":"A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums","volume":"19","author":"Xue","year":"2022","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4260","DOI":"10.1109\/TITS.2025.3528932","article-title":"Identity-Based Authentication in VANETs: A Review","volume":"26","author":"Manasrah","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5340","DOI":"10.1109\/TCE.2024.3426101","article-title":"Blockchain-enabled distributed identity-based ring signature with identity abort for consumer electronics","volume":"70","author":"Xiong","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/JSAC.2023.3345392","article-title":"Privacy-preserving identity-based data rights governance for blockchain-empowered human-centric metaverse communications","volume":"42","author":"Zhang","year":"2023","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3770","DOI":"10.1109\/TCE.2024.3372506","article-title":"Efficient blockchain-assisted distributed identity-based signature scheme for integrating consumer electronics in metaverse","volume":"70","author":"Li","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s10922-022-09689-x","article-title":"An advanced hierarchical identity-based security mechanism by blockchain in named data networking","volume":"31","author":"Li","year":"2023","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.1109\/TGCN.2022.3163596","article-title":"An efficient identity-based aggregate signcryption scheme with blockchain for IoT-enabled maritime transportation system","volume":"6","author":"Yang","year":"2022","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"e12941","DOI":"10.1111\/exsy.12941","article-title":"A distributed identity-based authentication scheme for internet of things devices using permissioned blockchain system","volume":"39","author":"Babu","year":"2022","journal-title":"Expert Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"9853","DOI":"10.1109\/TVT.2022.3176755","article-title":"Blockchain-envisioned provably secure multivariate identity-based multi-signature scheme for Internet of Vehicles environment","volume":"71","author":"Srivastava","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"6688","DOI":"10.1109\/JIOT.2021.3111552","article-title":"Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"e12915","DOI":"10.1111\/exsy.12915","article-title":"Blockchain-based IoT architecture to secure healthcare system using identity-based encryption","volume":"39","author":"Sharma","year":"2022","journal-title":"Expert Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"10574","DOI":"10.1109\/JIOT.2024.3511627","article-title":"Blockchain-Based Secure and Efficient ADS-B Authentication via Certificateless Signature With Packet Loss Tolerance","volume":"12","author":"Yao","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3065","DOI":"10.1109\/TNSE.2025.3556400","article-title":"An Enhanced Certificateless Blockchain-Assisted Authentication and Key Agreement Protocol for Internet of Drones","volume":"12","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"5880","DOI":"10.1109\/TCSS.2024.3378719","article-title":"Revocable Certificateless Cross-Domain Authentication Scheme Based on Primary\u2014Secondary Blockchain","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.future.2024.04.042","article-title":"CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT","volume":"158","author":"Feng","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1109\/JSYST.2023.3345370","article-title":"Blockchain-based certificateless conditional anonymous authentication for IIoT","volume":"18","author":"Wang","year":"2024","journal-title":"IEEE Syst. J."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3316","DOI":"10.1109\/JIOT.2023.3296506","article-title":"Blockchain-based certificate-free cross-domain authentication mechanism for industrial internet","volume":"11","author":"Dong","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3488977","DOI":"10.1155\/2022\/3488977","article-title":"Certificateless Anonymous Cross-Domain Authentication Scheme Assisted by Blockchain for Internet of Vehicles","volume":"2022","author":"Liu","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018). Hyperledger fabric: A distributed operating system for permissioned blockchains. Proc. Thirteen. Eurosys Conf., 1\u201315.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_36","first-page":"95","article-title":"Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries","volume":"1","author":"Pigatto","year":"2011","journal-title":"J. Appl. Comput. Res."},{"key":"ref_37","unstructured":"Nakamoto, S. (2025, June 18). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_38","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Gavin","year":"2008","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_39","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Miguel","year":"1999","journal-title":"OsDI"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TR.2018.2850966","article-title":"Efficient design of a novel ECC-based public key scheme for medical data protection by utilization of NanoPi fire","volume":"67","author":"Nikooghadam","year":"2018","journal-title":"IEEE Trans. Reliab."},{"key":"ref_41","first-page":"326","article-title":"Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model","volume":"18","author":"Zhu","year":"2016","journal-title":"Int. J. Netw. Secur."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"7287","DOI":"10.1109\/TII.2020.2974258","article-title":"Provably secure escrow-less Chebyshev chaotic map-based key agreement protocol for vehicle to grid connections with privacy protection","volume":"16","author":"Mazinani","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_43","first-page":"103281","article-title":"A robust authentication scheme for remote diagnosis and maintenance in 5G V2N","volume":"198","author":"Ma","year":"2022","journal-title":"Veh. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1109\/TITS.2020.3024000","article-title":"Delegating authentication to edge: A decentralized authentication architecture for vehicular networks","volume":"23","author":"Yang","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","article-title":"Design of blockchain-based lightweight V2I handover authentication protocol for VANET","volume":"9","author":"Son","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/8\/338\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:17:22Z","timestamp":1760033842000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/8\/338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,28]]},"references-count":45,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["fi17080338"],"URL":"https:\/\/doi.org\/10.3390\/fi17080338","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,28]]}}}