A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps
Zhonghao Zhai,
Junyi Liu,
Xinying Liu,
Yanqin Mao,
Xinjun Zhang,
Jialin Ma and
Chunhua Jin ()
Additional contact information
Zhonghao Zhai: Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an 223025, China
Junyi Liu: Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an 223025, China
Xinying Liu: Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an 223025, China
Yanqin Mao: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210049, China
Xinjun Zhang: School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210049, China
Jialin Ma: Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an 223025, China
Chunhua Jin: Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an 223025, China
Future Internet, 2025, vol. 17, issue 8, 1-27
Abstract:
The Industrial Internet of Things (IIoT), a key enabler of Industry 4.0, integrates advanced communication technologies with the industrial economy to enable intelligent manufacturing and interconnected systems. Secure and reliable identity authentication in the IIoT becomes essential as connectivity expands across devices, systems, and domains. Blockchain technology presents a promising solution due to its decentralized, tamper-resistant, and traceable characteristics, facilitating secure and transparent identity verification. However, current blockchain-based cross-domain authentication schemes often lack a lightweight design, rendering them unsuitable for latency-sensitive and resource-constrained industrial environments. This paper proposes a lightweight cross-domain authentication scheme that combines blockchain with Chebyshev chaotic mapping. Unlike existing schemes relying heavily on Elliptic Curve Cryptography or bilinear pairing, our design circumvents such computationally intensive primitives entirely through the algebraic structure of Chebyshev polynomials. A formal security analysis using the Real-Or-Random (ROR) model demonstrates the scheme’s robustness. Furthermore, performance evaluations conducted with Hyperledger Fabric and the MIRACL cryptographic library validate the method’s effectiveness and superiority over existing approaches in terms of both security and operational efficiency.
Keywords: Industrial Internet of Things; authentication; blockchain; Chebyshev chaotic maps (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/17/8/338/pdf (application/pdf)
https://www.mdpi.com/1999-5903/17/8/338/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:17:y:2025:i:8:p:338-:d:1711837
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().