{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T05:21:05Z","timestamp":1764739265321,"version":"3.46.0"},"reference-count":45,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2021YFB2401200"],"award-info":[{"award-number":["2021YFB2401200"]}]},{"name":"the Research and Development Project of State Grid Shanghai Energy Internet Research Institute Co., Ltd","award":["SH81-24-003"],"award-info":[{"award-number":["SH81-24-003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The large-scale deployment of distributed devices in the Internet of Things (IoT) brings urgent demands for secure, scalable, and lightweight identity authentication. For example, virtual power plants integrate numerous heterogeneous energy terminals to support grid dispatch and market operations, while posing challenges such as real-time access, resource constraints, and identity privacy protection. To address these challenges, this paper proposes NIABIAuth, a non-interactive attribute binding identity authentication protocol for IoT terminals. NIABIAuth supports dynamic challenge computation and binds cryptographic identity proofs with terminal attributes, enabling fine-grained and privacy preserving access control. By storing identity credentials and verification records on the chain, this protocol ensures traceability and tamper resistance. Experiments demonstrate that NIABIAuth maintains low authentication latency and is consistent throughput, even under constrained conditions. Compared with baseline methods, NIABIAuth achieves substantial reductions in communication and computation cost. The proposed NIABIAuth was formally verified using the AVISPA tool, which proved that it could resist common attacks, including replay attacks, man-in-the-middle attacks, etc. A large number of simulation experiments have demonstrated that the proposed protocol can provide real-time identity authentication for Internet of Things terminals.<\/jats:p>","DOI":"10.3390\/info16121040","type":"journal-article","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T08:13:49Z","timestamp":1764576829000},"page":"1040","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5348-9652","authenticated-orcid":false,"given":"Zilong","family":"Han","sequence":"first","affiliation":[{"name":"State Grid Shanghai Energy Internet Research Institute Co., Ltd., Shanghai 201203, China"},{"name":"China Electric Power Research Institute Co., Ltd., Beijing 100192, China"}]},{"given":"Xinge","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Shanghai Energy Internet Research Institute Co., Ltd., Shanghai 201203, China"}]},{"given":"Chaoqun","family":"Kang","sequence":"additional","affiliation":[{"name":"State Grid Shanghai Energy Internet Research Institute Co., Ltd., Shanghai 201203, China"},{"name":"China Electric Power Research Institute Co., Ltd., Beijing 100192, China"}]},{"given":"Haowen","family":"Sun","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunications, Ministry of Education, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0458-8481","authenticated-orcid":false,"given":"Yali","family":"Gao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunications, Ministry of Education, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"ref_1","first-page":"15","article-title":"An exhaustive survey on authentication classes in the IoT environments","volume":"12","author":"Dargaoui","year":"2024","journal-title":"Indones. J. Electr. Eng. Inform."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Alotaibi, A., Aldawghan, H., and Aljughaiman, A. (2025). A review of the authentication techniques for internet of things devices in smart cities: Opportunities, challenges, and future directions. Sensors, 25.","DOI":"10.3390\/s25061649"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"100240","DOI":"10.1016\/j.hcc.2024.100240","article-title":"EBIAS: ECC-enabled blockchain-based identity authentication scheme for IoT device","volume":"5","author":"Wang","year":"2025","journal-title":"High-Confid. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"100320","DOI":"10.1016\/j.hcc.2025.100320","article-title":"Blockchain-enabled privacy protection scheme for IoT digital identity management","volume":"5","author":"Yu","year":"2025","journal-title":"High-Confid. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Zhao, X., Peng, C., Tan, W., and Ding, H. (2024, January 6\u20138). Blockchain-based access control dynamic key authentication protocol in IoT. Proceedings of the 2024 7th International Conference on Blockchain Technology and Applications, Xi\u2019an, China.","DOI":"10.1145\/3708622.3708625"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Cao, Z., Wen, X., Ai, S., Shang, W., and Huan, S. (2024). A decentralized authentication scheme for smart factory based on blockchain. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-76065-x"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Saleem, J., Raza, U., Hammoudeh, M., and Holderbaum, W. (2025). Machine learning-enhanced attribute-based authentication for secure IoT access control. Sensors, 25.","DOI":"10.3390\/s25092779"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yang, Z., Liu, Y., Jin, X., Luo, X., Xu, Y., Li, M., Chen, P., Tang, B., and Lin, B. (2024). BDIDA-IoT: A blockchain-based decentralized identity architecture enhances the efficiency of IoT data flow. Appl. Sci., 14.","DOI":"10.3390\/app14051807"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"100000","DOI":"10.1016\/j.iot.2024.101469","article-title":"Authentication schemes for Internet of Things (IoT) networks: A systematic review and security assessment","volume":"30","author":"Yalli","year":"2025","journal-title":"Internet Things"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Almarri, S., and Aljughaiman, A. (2024). Blockchain technology for IoT security and trust: A comprehensive SLR. Sustainability, 16.","DOI":"10.3390\/su162310177"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Li, M., and Hu, S. (2024). A lightweight ECC-based authentication and key agreement protocol for IoT with dynamic authentication credentials. Sensors, 24.","DOI":"10.3390\/s24247967"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1007\/s10207-024-00825-z","article-title":"AutoPKI: Public key infrastructure for IoT with automated trust transfer","volume":"23","author":"Bouget","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"118618","DOI":"10.1109\/ACCESS.2024.3450313","article-title":"Blockchain-enhanced zero knowledge proof-based privacy-preserving mutual authentication for IoT networks","volume":"12","author":"Pathak","year":"2024","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2792","DOI":"10.1109\/OJCOMS.2024.3391728","article-title":"Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication","volume":"5","author":"Rivera","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/TVT.2023.3306813","article-title":"SAAF-IoD: Secure and anonymous authentication framework for the Internet of Drones","volume":"73","author":"Tanveer","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/JIOT.2023.3285513","article-title":"SKAFS: Symmetric key authentication protocol with forward secrecy for edge computing","volume":"11","author":"Seifelnasr","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1109\/TIFS.2025.3526062","article-title":"Verifiable Searchable Symmetric Encryption over Additive Homomorphism","volume":"20","author":"Ji","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","article-title":"A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems","volume":"14","author":"Li","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1007\/s11276-020-02523-9","article-title":"LAPTAS: Lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT","volume":"27","author":"Bayat","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2605","DOI":"10.1109\/TR.2025.3562300","article-title":"ECC-Based Lightweight Authentication for Resource-Constrained Devices Leveraging the Edge Node","volume":"74","author":"Kabi","year":"2025","journal-title":"IEEE Trans. Reliab."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Tentu, A.N., and Cheeturi, R. (2023, January 8\u20139). An ECC based Anonymous Authentication Protocol for Internet of Things. Proceedings of the 2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), Bangalore, India.","DOI":"10.1109\/PKIA58446.2023.10262739"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Hu, S., Jiang, S., Miao, Q., Yang, F., Zhou, W., and Duan, P. (2024). Provably secure ECC-based anonymous authentication and key Agreement for IoT. Appl. Sci., 14.","DOI":"10.20944\/preprints202401.1761.v1"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"98986","DOI":"10.1109\/ACCESS.2020.2997840","article-title":"AAAS: An anonymous authentication scheme based on group signature in VANETs","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"109149","DOI":"10.1016\/j.comnet.2022.109149","article-title":"A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios","volume":"214","author":"Cao","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"e14917","DOI":"10.1016\/j.heliyon.2023.e14917","article-title":"Lattice-based group signatures with forward security for anonymous authentication","volume":"9","author":"Chen","year":"2023","journal-title":"Heliyon"},{"key":"ref_26","first-page":"241","article-title":"A hybrid blockchain-based identity authentication scheme for multi-WSN","volume":"13","author":"Cui","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2116","DOI":"10.1109\/JIOT.2020.3037733","article-title":"Blockchain-based decentralized authentication modeling scheme in edge and IoT environment","volume":"8","author":"Zhaofeng","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_28","unstructured":"Nakamoto, S. (2025, September 27). Bitcoin: A peer-to-peer electronic cash system. Bitcoin 2008, 4. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1764","DOI":"10.1109\/TNSM.2023.3255265","article-title":"Redactable blockchain-based secure and accountable data management","volume":"21","author":"Xu","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"856","DOI":"10.1016\/j.scib.2025.01.041","article-title":"An Artificial Intelligence and Blockchain technology-based data management framework for multicenter randomized controlled trials","volume":"70","author":"Yun","year":"2025","journal-title":"Science Bull."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"21559","DOI":"10.1109\/JIOT.2024.3375918","article-title":"Blockchain-Based Resource Trading in Multi-UAV Edge Computing System","volume":"11","author":"Xu","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MWC.001.2400245","article-title":"Convergence of Symbiotic Communications and Blockchain for Sustainable and Trustworthy 6G Wireless Networks","volume":"32","author":"Luo","year":"2025","journal-title":"IEEE Wirel. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Merlec, M.M., and In, H.P. (2024). SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems. IEEE Internet Things J., in press.","DOI":"10.1109\/JIOT.2024.3371504"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"4759","DOI":"10.1109\/TIV.2024.3368510","article-title":"Parallel Management of IoV Information Enabled by Blockchain and Decentralized Autonomous Organizations","volume":"9","author":"Han","year":"2024","journal-title":"IEEE Trans. Intell. Veh."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"103870","DOI":"10.1016\/j.jnca.2024.103870","article-title":"BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS","volume":"226","author":"Mahmoud","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1016\/j.jksuci.2023.01.011","article-title":"Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems","volume":"35","author":"Khashan","year":"2023","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"12603","DOI":"10.1109\/JIOT.2023.3252565","article-title":"BTAA: Blockchain and TEE-assisted authentication for IoT systems","volume":"10","author":"Mao","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Maria, A., Pandi, V., Lazarus, J.D., Karuppiah, M., and Christo, M.S. (2021). BBAAS: Blockchain-based anonymous authentication scheme for providing secure communication in VANETs. Secur. Commun. Netw., 6679882.","DOI":"10.1155\/2021\/6679882"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Maria, A., Rajasekaran, A.S., Al-Turjman, F., Altrjman, C., and Mostarda, L. (2022). Baiv: An efficient blockchain-based anonymous authentication and Integrity Preservation Scheme for secure communication in VANETs. Electronics, 11.","DOI":"10.3390\/electronics11030488"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Ramezan, G., and Meamari, E. (2024, January 27\u201331). ZK-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms. Proceedings of the 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dublin, Ireland.","DOI":"10.1109\/ICBC59979.2024.10634342"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Commey, D., Hounsinou, S., and Crosby, G.V. (2024, January 8\u201310). Securing Blockchain-Based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs. Proceedings of the 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France.","DOI":"10.1109\/LCN60385.2024.10639679"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Li, E.J., Lin, H.T., and Yang, H.R. (October, January 30). A Blockchain-PUF-Based Secure Mutual Authentication Scheme for IoT. Proceedings of the 2024 IEEE Conference on Communications and Network Security (CNS), Taipei, Taiwan.","DOI":"10.1109\/CNS62487.2024.10735610"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Narkedimilli, S., P, P., Sriram, A.V., Raghav, S., and Vangapandu, P. (2025, January 6\u20139). FL-DABE-BC: A Privacy-Enhanced Decentralized Authentication and Secure Communication Framework for FL in IoT-Enabled Smart Cities. Proceedings of the 2nd International Workshop on Foundation Models for Cyber-Physical Systems & Internet of Things, Irvine, CA, USA.","DOI":"10.1145\/3722565.3727194"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"20682","DOI":"10.1007\/s11227-024-06262-y","article-title":"A Novel Blockchain-Enabled Zero-Trust-Based Authentication Scheme in Power IoT Environments","volume":"80","author":"Li","year":"2024","journal-title":"J. Supercomput."},{"key":"ref_45","first-page":"5539","article-title":"A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain","volume":"83","author":"Tian","year":"2025","journal-title":"Comput. Mater. Contin."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/12\/1040\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T05:17:33Z","timestamp":1764739053000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/12\/1040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":45,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["info16121040"],"URL":"https:\/\/doi.org\/10.3390\/info16121040","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2025,11,28]]}}}