Chao Geng , Yang Zhang , Xin Xu , Yingbiao Yao , Conghui Lu , Zhongqiang Zhi
{"title":"Blockchain-based identity authentication and data interaction scheme for Industrial Internet of Things","authors":"Chao Geng , Yang Zhang , Xin Xu , Yingbiao Yao , Conghui Lu , Zhongqiang Zhi","doi":"10.1016/j.compeleceng.2025.110143","DOIUrl":null,"url":null,"abstract":"<div><div>There are numerous identities in the Industrial Internet of Things (IIoT), and the security of the industrial data generated by these identity devices is crucial. However, problems such as single point of failure caused by centralization and inefficiencies of participant identity authentication are still persistent in the current IIoT. To address these problems, we propose a blockchain-based identity authentication and data interaction scheme for IIoT. In our scheme, we first design a decentralized and staged key generation authentication method based on the Sign Identity Composite (SIC), which uses key generation in stages to realize efficient identity authentication based on Schnorr’s non-interactive zero-knowledge proof. Then, we propose asynchronous data interaction based on the Diffie–Hellman (DH) key negotiation algorithm and SIC. Finally, we prove the security of our scheme through security analysis, and the performance is evaluated and analyzed by simulation experiments. The results show that our scheme can perform identity authentication and asynchronous data interaction while maintaining security, outperforms the comparison scheme.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"123 ","pages":"Article 110143"},"PeriodicalIF":4.0000,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625000862","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
There are numerous identities in the Industrial Internet of Things (IIoT), and the security of the industrial data generated by these identity devices is crucial. However, problems such as single point of failure caused by centralization and inefficiencies of participant identity authentication are still persistent in the current IIoT. To address these problems, we propose a blockchain-based identity authentication and data interaction scheme for IIoT. In our scheme, we first design a decentralized and staged key generation authentication method based on the Sign Identity Composite (SIC), which uses key generation in stages to realize efficient identity authentication based on Schnorr’s non-interactive zero-knowledge proof. Then, we propose asynchronous data interaction based on the Diffie–Hellman (DH) key negotiation algorithm and SIC. Finally, we prove the security of our scheme through security analysis, and the performance is evaluated and analyzed by simulation experiments. The results show that our scheme can perform identity authentication and asynchronous data interaction while maintaining security, outperforms the comparison scheme.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.