Netinfo Security ›› 2024, Vol. 24 ›› Issue (5): 709-718.doi: 10.3969/j.issn.1671-1122.2024.05.005

Previous Articles     Next Articles

A Hierarchical Lightweight Authentication Scheme Based on Merkle Tree and Hash Chain

SHEN Zhuowei1,2, WANG Renbo1,2, SUN Xianjun3()   

  1. 1. School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
    2. Key Laboratory of Computer Network and Information Integration of Ministry of Education, Southeast University, Nanjing 211189, China
    3. Security and Preventive Technology Division, The Third Research Institute of Ministry of Public Security, Shanghai 200031, China
  • Received:2024-03-06 Online:2024-05-10 Published:2024-06-24
  • Contact: SUN Xianjun E-mail:sxj_sun8110@163.com

Abstract:

Distributed systems such as cloud computing and the Internet of Things are widely used in various critical application domains, and their security issues are receiving increasing attention. Due to the complex deployment environment, the characteristics such as decentralization, heterogeneity, and dynamics, the security guarantee of distributed systems faces severe challenges. Traditional authentication schemes usually have the limitations of high computational cost, complex certificate management, and untimely member dynamic updates, which cannot meet the requirements of large-scale distributed systems. In this paper, aiming at the typical application scenarios where a large number of clients interact with application servers, a hierarchical lightweight authentication scheme based on Merkle tree and hash chain was proposed. In this scheme, there were several neighborhoods in the system, each client belongs to a neighborhood, and an authentication proxy node was set in each neighborhood to manage the clients in the neighborhood and report authentication information to the application server. The scheme adopted both Merkle tree and hash chain to realize identity authentication for the client, one-time pad encryption, and message authentication, and used efficient operations of hash and XOR to achieve lower computational costs. Security analysis and performance analysis show that the scheme has comprehensive security and better performance.

Key words: Merkle tree, hash chain, one-time pad, authentication

CLC Number: