A Multi-Blockchain-Based Cross-Domain Authentication and Authorization Scheme for Energy Internet

نویسندگان

چکیده

The expansion of the scale Power Internet Things stimulated by development Energy makes growth in demand for effective authentication and access control technologies cross-domain data exchange. Based on cross-chain technology blockchain cuckoo filter, this paper proposes a scheme Things. Firstly, architecture is established. Combined with existing used intra-domain authentication, process based proposed to realize automatic transmission credentials from application domain domain. filter deployed as smart contracts, user certificate fingerprint inserted into registration, query, revocation, which reduces cost management. Experimental results show effectiveness feasibility our scheme. scheme, roles object classes presented, treating controlled objects then applying role-based classes, condition that heterogeneous domains have same kinds resources.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Cross-Domain Alliance Authentication Scheme based on Bilinear Group

With the development of grid computing, cloud computing and other large distributed network technology, users need them to provide services of unlimited space and unlimited speed. In order to meeting this request of users, all the domains in these large distributed networks need coordination for each other. For ensuring the safety to access resources in all domains, we propose a crossdomain uni...

متن کامل

Authentication , Authorization , Accounting , and Charging for the Mobile Internet

Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location. This will ease the way of business and private life, such as for the travelling field engineer repairing electronic devices at the customers’ premises by downloading a new control software or the family on vacation accessin...

متن کامل

An Authentication and Authorization Architecture for the Mobile Internet

The paper describes an authentication and authorization architecture for mobile Internet users. The architecture is based on the Shibboleth middleware that has been developed by the Middleware Architecture Committee for Education of the Internet2 Middleware Initiative. The initial goal of this middleware was access control to digital content available in the Internet. We propose to use this mid...

متن کامل

- 1 - Authentication , Authorization , Accounting , and Charging for the Mobile Internet

Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location, which will ease the way of business and private life, such as for the traveling field engineer repairing electronic devices at the customers’ premises by downloading a new control software or the family on vacation accessin...

متن کامل

Multi-Factor Authentication and Authorization using Attribute Based Identification

Access control (authentication, authorization, and verification) is the most frequently occurring security action in the electric sector, and a multi-factor technique is recommended as one of the most promising solutions. However, the technique, despite its huge potential, has been underutilized with limitations, e.g., applied only to authentication and requiring human presence for fingerprinti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2023

ISSN: ['1530-8669', '1530-8677']

DOI: https://doi.org/10.1155/2023/4778967