NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals
Abstract
1. Introduction
1.1. Motivations
1.2. Contributions
- We propose NIABIAuth, a non-interactive attribute binding identity authentication protocol, to address the challenge of secure, scalable, and privacy-preserving authentication in decentralized IoT environments. NIABIAuth is designed to support lightweight verifiable authentication of heterogeneous IoT terminals under real-time high-concurrency conditions while taking into account privacy protection and fine-grained access control.
- We introduce a lightweight attribute aware authentication mechanism that enables verifiable binding without revealing device identity and its application-specific attribute values. Specifically, NIABIAuth incorporates Pedersen commitments into the Schnorr proof structure, allowing devices to cryptographically commit to attribute values in a hiding and binding manner. These commitments are then embedded into non-interactive authentication proofs, ensuring that only devices satisfying predefined policy constraints are granted access. This enables fine-grained access control in privacy-sensitive IoT scenarios, while its non-interactive proof design ensures efficiency even under high concurrency conditions.
- We provide both comprehensive formal validation and experimental evaluation of NIABIAuth to demonstrate its effectiveness, security, and practicality. Security is formally proven under the random oracle model, covering threats such as impersonation, replay and key compromise. Meanwhile, extensive experiments conducted on heterogeneous hardware platforms have demonstrated the low-latency performance, minimal encryption cost, and stable throughput of NIABIAuth under high concurrency conditions. These results jointly confirm that NIABIAuth achieves a strong balance between lightweight design, provable security, and deployment scalability, making it suitable for real-time and large-scale IoT deployments.
2. Related Work
2.1. Centralized Authentication Protocols
2.2. Decentralized and ZKP-Based Protocols
2.3. Attribute Binding Identity Authentication Protocols
3. NIABIAuth: Non-Interactive Attribute Binding Identity Authentication Protocol
3.1. NIABIAuth
3.1.1. Overall Protocol Design
- Terminal devices: These devices act as authentication requesters in peer-to-peer communication scenarios. Each device locally generates its cryptographic identity, including a public-private key pair and a zero-knowledge commitment to its attribute. During the authentication phase, a device constructs a non-interactive zero-knowledge proof that binds its public key and attribute commitment, and submits this proof to the blockchain network for verification. This process enables devices to demonstrate identity legitimacy and attribute compliance without disclosing sensitive identity information or attribute values.
- Peer nodes: They are full participants in the blockchain network and serve two main roles: (a) as identity registrars, they receive registration submissions from terminal devices and invoke smart contracts to validate and store public keys and attribute commitments in the distributed ledger; (b) as identity verifiers, they receive proof submissions from communicating devices, retrieve the corresponding identity records from the ledger, and execute verification logic as defined in the NIABIAuth smart contract. After completing verification, the peer node returns the authentication result to the involved devices and logs the transaction details on-chain to ensure non-repudiation and traceability. The selection of peer nodes may consider computational capabilities and storage availability, as they are responsible for executing verifications and maintaining the blockchain state.
- Blockchain ledger: The blockchain functions as a tamper-resistant, append-only ledger that maintains all device identity records and authentication transaction logs. It stores the public key of each device and attribute commitment, as well as inputs and outputs of authentication sessions. By decentralizing trust and removing reliance on traditional certificate authorities, the blockchain enhances system transparency and integrity. It also enables independent verification and auditing of authentication events across administrative domains without exposing underlying sensitive information.
3.1.2. Smart Contract Design
- Identity Registration Contract. This contract is responsible for anchoring the public identity information of IoT devices to the blockchain. Each device independently generates its public-private key pair and computes a Pedersen commitment to its private attribute during the registration phase. The device then submits its identifier, public key, and attribute commitment to the blockchain network through a designated peer node. The peer node invokes the registration contract, which validates and stores the identity record immutably on-chain. This enables tamper-resistant identity management without relying on centralized certificate authorities or cloud-based key issuers, and establishes the foundational trust required for subsequent authentication interactions.
- Identity Authentication Contract. This contract verifies the proofs generated by IoT devices based on the NIABIAuth. A device submits a non-interactive proof consisting of a Schnorr tuple , an attribute commitment C, and session metadata. The peer node invokes the contract, which retrieves the corresponding public key and commitment from the blockchain. It then reconstructs the challenge and verifies the proof using elliptic curve operations. Upon successful verification, the contract logs the result and emits a confirmation event. This contract supports low-latency, privacy-preserving authentication without revealing sensitive identity or attribute information.
3.2. NIABIAuth Workflow
3.2.1. NIABIAuth Registration Phase
| Algorithm 1: NIABIAuth Registration | |
Input: Elliptic curve parameters: , elliptic curve second generator: H, device: D, device identity: , attribute value: , peer node: P. Output: Write registration information into the blockchain. | |
| // Generate the private key |
| // Compute the public key |
| // Generate randomness for commitment |
| // Compute Pedersen attribute commitment |
| // Construct the registration message |
| |
| // Verify format and uniqueness |
| // Store registration info on blockchain |
3.2.2. NIABIAuth Authentication Phase
| Algorithm 2: NIABIAuth Verification |
![]() |
3.3. Security Analysis
3.3.1. Correctness of NIABIAuth
3.3.2. Trust Model, Threat Model, and Security Goals
- Correctness: Any legitimate device following the protocol must always be authenticated successfully by the verifier.
- Impersonation Resistance: No adversary without knowledge of a device’s private key should be able to generate a valid authentication proof.
- Replay Resistance: Old authentication transcripts replayed by an adversary should be rejected by the verifier.
- Key Secrecy: Private keys and session-related randomness must remain computationally infeasible to derive from public messages.
- Forward Secrecy: Compromise of a long-term private key must not enable the adversary to derive session-specific randomness or reconstruct past authentication proofs.
- Attribute Integrity: Device attributes bound to an identity must remain unforgeable and verifiable.
3.3.3. Formal Simulation and Verification
3.3.4. Theoretical Analysis of Security Properties
- Resistance to Impersonation AttacksProof: The authentication proof in NIABIAuth is based on the Schnorr identification protocol transformed into a non-interactive zero-knowledge form via the Fiat-Shamir heuristic. Under the discrete logarithm assumption in cyclic group , an adversary without knowledge of the private key cannot compute a valid response s satisfying the verification equation . Moreover, since the challenge c is derived via a collision-resistant hash function over public parameters and session-specific metadata, the protocol resists impersonation attack.
- Resistance to Attribute Inference AttacksProof: The NIABIAuth effectively resists attribute inference attacks through the use of Pedersen commitments, which are known to be statistically hiding under standard cryptographic assumptions. Given a commitment , where is the private attribute value and r is randomly selected blinding factor, the distribution of C is computationally indistinguishable for different values of due to the presence of high entropy randomness r. Consequently, even if an adversary intercepts multiple authentication messages containing distinct or repeated commitments, the inherent randomness ensures that no information about the underlying attribute can be extracted. Moreover, since the commitment is bound to the device identity and submitted as part of a zero-knowledge proof, an adversary cannot isolate or manipulate C independently to perform correlation-based or frequency-based inference. This property ensures that NIABIAuth achieves strong contextual privacy, preserving the confidentiality of device attributes even under full transcript exposure.
- Resistance to Man-in-the-Middle (MITM) AttacksProof: In each session, the challenge value c is deterministically computed as a hash over public inputs, including the temporary commitment R, the public key , the attribute commitment C, and the session metadata . This binding ensures that any modification of message components by a MITM adversary will result in an inconsistent challenge and thus an invalid proof. Furthermore, because the authentication message includes only the proof tuple , and no round-trip interaction occurs between prover and verifier, the attacker has no opportunity to alter or inject values dynamically during a challenge-response exchange. Any attempt to relay or modify previously captured authentication messages is rendered ineffective due to the inclusion of session metadata, which are verified during the proof validation. Therefore, NIABIAuth provides robust protection against MITM attacks and ensures the authenticity and integrity of each authentication session under adversarial relay conditions.
- Resistance to Replay AttacksProof: Session metadata comprising a timestamp T and a unique session identifier is incorporated into the hash that defines c. This prevents reuse of old proofs, as each session yields a unique challenge. The verifier additionally checks that T is within a freshness window and that has not been seen before, effectively resisting replay attacks.
- Forward SecurityProof: The NIABIAuth achieves forward security by ensuring that each authentication session is cryptographically independent from previous ones. In every session, the device generates fresh ephemeral randomness r for the temporary commitment and includes session metadata in the challenge computation c. As a result, even if the long-term private key is compromised after certain sessions have been completed, the transcripts of prior authentications cannot be retroactively linked to or used to recover the session-specific randomness r, due to the one-way nature of the hash function and the computational hardness of the discrete logarithm problem. Furthermore, because the attribute commitment C also involves blinding randomness , the values observed in earlier sessions remain unlinkable and resistant to retrospective analysis. Thus, the confidentiality of past interactions remains preserved even in the event of private key exposure, satisfying the requirement of forward security.
- Backward SecurityProof: Backward security is ensured in NIABIAuth by incorporating fresh, per-session randomness and context-specific challenge computation that tightly binds each proof to a unique session. Even if an adversary intercepts a valid proof tuple from a past session, they cannot use this information to forge valid authentication messages for future sessions. This is because the challenge c is derived from session-specific metadata including a fresh timestamp and session identifier which change with each execution. Reusing a prior proof in a new session context will result in challenge mismatch during verification, causing the proof to fail. Moreover, since the Schnorr response s depends on the freshly ephemeral r, the adversary cannot adaptively derive a new valid response for a modified c without knowing the secret key . Therefore, past transcripts offer no computational advantage in generating valid proofs for future sessions, and the protocol maintains resistance to forward-forging or predictive attacks, thereby achieving strong backward security.
3.4. Attribute Update and Revocation Mechanism
4. Experiments and Results
4.1. Experimental Setup
4.1.1. Experimental Configuration
4.1.2. Experimental Methods
4.2. Performance Analysis
4.2.1. Performance Stress Test and Functions Efficiency Comparison Analysis
4.2.2. Computational and Communication Cost Comparison
4.2.3. Energy and Memory Overhead Analysis
5. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Dargaoui, S.; Azrour, M.; El Allaoui, A.; Guezzaz, A.; Alabdulatif, A.; Alnajim, A. An exhaustive survey on authentication classes in the IoT environments. Indones. J. Electr. Eng. Inform. 2024, 12, 15–31. [Google Scholar] [CrossRef]
- Alotaibi, A.; Aldawghan, H.; Aljughaiman, A. A review of the authentication techniques for internet of things devices in smart cities: Opportunities, challenges, and future directions. Sensors 2025, 25, 1649. [Google Scholar] [CrossRef]
- Wang, W.; Yan, B.; Chai, B.; Shen, R.; Dong, A.; Yu, J. EBIAS: ECC-enabled blockchain-based identity authentication scheme for IoT device. High-Confid. Comput. 2025, 5, 100240. [Google Scholar] [CrossRef]
- Yu, H.; Wang, G.; Dong, A.; Han, Y.; Wang, Y.; Yu, J. Blockchain-enabled privacy protection scheme for IoT digital identity management. High-Confid. Comput. 2025, 5, 100320. [Google Scholar] [CrossRef]
- Zhao, X.; Peng, C.; Tan, W.; Ding, H. Blockchain-based access control dynamic key authentication protocol in IoT. In Proceedings of the 2024 7th International Conference on Blockchain Technology and Applications, Xi’an, China, 6–8 December 2024; pp. 55–59. [Google Scholar]
- Cao, Z.; Wen, X.; Ai, S.; Shang, W.; Huan, S. A decentralized authentication scheme for smart factory based on blockchain. Sci. Rep. 2024, 14, 24640. [Google Scholar] [CrossRef] [PubMed]
- Saleem, J.; Raza, U.; Hammoudeh, M.; Holderbaum, W. Machine learning-enhanced attribute-based authentication for secure IoT access control. Sensors 2025, 25, 2779. [Google Scholar] [CrossRef]
- Yang, Z.; Liu, Y.; Jin, X.; Luo, X.; Xu, Y.; Li, M.; Chen, P.; Tang, B.; Lin, B. BDIDA-IoT: A blockchain-based decentralized identity architecture enhances the efficiency of IoT data flow. Appl. Sci. 2024, 14, 1807. [Google Scholar] [CrossRef]
- Yalli, J.S.; Hasan, M.H.B.; Jung, L.T.; Al-Selwi, S.M. Authentication schemes for Internet of Things (IoT) networks: A systematic review and security assessment. Internet Things 2025, 30, 100000. [Google Scholar] [CrossRef]
- Almarri, S.; Aljughaiman, A. Blockchain technology for IoT security and trust: A comprehensive SLR. Sustainability 2024, 16, 10177. [Google Scholar] [CrossRef]
- Li, M.; Hu, S. A lightweight ECC-based authentication and key agreement protocol for IoT with dynamic authentication credentials. Sensors 2024, 24, 7967. [Google Scholar] [CrossRef]
- Höglund, J.; Bouget, S.; Furuhed, M.; Mattsson, J.P.; Selander, G.; Raza, S. AutoPKI: Public key infrastructure for IoT with automated trust transfer. Int. J. Inf. Secur. 2024, 23, 1859–1875. [Google Scholar] [CrossRef]
- Pathak, A.; Al-Anbagi, I.; Hamilton, H.J. Blockchain-enhanced zero knowledge proof-based privacy-preserving mutual authentication for IoT networks. IEEE Access 2024, 12, 118618–118636. [Google Scholar] [CrossRef]
- Rivera, J.J.D.; Muhammad, A.; Song, W.C. Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open J. Commun. Soc. 2024, 5, 2792–2814. [Google Scholar] [CrossRef]
- Tanveer, M.; Alasmary, H.; Kumar, N.; Nayak, A. SAAF-IoD: Secure and anonymous authentication framework for the Internet of Drones. IEEE Trans. Veh. Technol. 2023, 73, 232–244. [Google Scholar] [CrossRef]
- Seifelnasr, M.; AlTawy, R.; Youssef, A. SKAFS: Symmetric key authentication protocol with forward secrecy for edge computing. IEEE Internet Things J. 2023, 11, 510–525. [Google Scholar] [CrossRef]
- Ji, L.; Li, J.; Zhang, Y.; Lu, Y. Verifiable Searchable Symmetric Encryption over Additive Homomorphism. IEEE Trans. Inf. Forensics Secur. 2025, 20, 1320–1332. [Google Scholar] [CrossRef]
- Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 2019, 14, 39–50. [Google Scholar] [CrossRef]
- Abdi Nasib Far, H.; Bayat, M.; Das, A.K.; Fotouhi, M.; Pournaghi, S.M.; Doostari, M.A. LAPTAS: Lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wirel. Netw. 2021, 27, 1389–1412. [Google Scholar] [CrossRef]
- Kabi, M.; Dayal, N.; Raikwal, P. ECC-Based Lightweight Authentication for Resource-Constrained Devices Leveraging the Edge Node. IEEE Trans. Reliab. 2025, 74, 2605–2612. [Google Scholar] [CrossRef]
- Tentu, A.N.; Cheeturi, R. An ECC based Anonymous Authentication Protocol for Internet of Things. In Proceedings of the 2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), Bangalore, India, 8–9 September 2023; pp. 1–6. [Google Scholar]
- Hu, S.; Jiang, S.; Miao, Q.; Yang, F.; Zhou, W.; Duan, P. Provably secure ECC-based anonymous authentication and key Agreement for IoT. Appl. Sci. 2024, 14, 3187. [Google Scholar] [CrossRef]
- Jiang, Y.; Ge, S.; Shen, X. AAAS: An anonymous authentication scheme based on group signature in VANETs. IEEE Access 2020, 8, 98986–98998. [Google Scholar] [CrossRef]
- Cao, Y.; Xu, S.; Chen, X.; He, Y.; Jiang, S. A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios. Comput. Netw. 2022, 214, 109149. [Google Scholar] [CrossRef]
- Chen, S.; Chen, J. Lattice-based group signatures with forward security for anonymous authentication. Heliyon 2023, 9, e14917. [Google Scholar] [CrossRef] [PubMed]
- Cui, Z.; Fei, X.; Zhang, S.; Cai, X.; Cao, Y.; Zhang, W.; Chen, J. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans. Serv. Comput. 2020, 13, 241–251. [Google Scholar] [CrossRef]
- Zhaofeng, M.; Jialin, M.; Jihui, W.; Zhiguang, S. Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J. 2020, 8, 2116–2123. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Bitcoin 2008, 4. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 27 September 2025).
- Xu, Y.; Xiao, S.; Wang, H.; Zhang, C.; Ni, Z.; Zhao, W.; Wang, G. Redactable blockchain-based secure and accountable data management. IEEE Trans. Netw. Serv. Manag. 2023, 21, 1764–1776. [Google Scholar] [CrossRef]
- Yun, D.; Wu, X.; Chen, X.; Yang, Y.; Shang, Y.; Liu, S.; Gunasekeran, D.V.; Lin, D.; Liu, L.; Zhao, L.; et al. An Artificial Intelligence and Blockchain technology-based data management framework for multicenter randomized controlled trials. Science Bull. 2025, 70, 856–860. [Google Scholar] [CrossRef]
- Xu, R.; Chang, Z.; Zhang, X.; Hämäläinen, T. Blockchain-Based Resource Trading in Multi-UAV Edge Computing System. IEEE Internet Things J. 2024, 11, 21559–21573. [Google Scholar] [CrossRef]
- Luo, H.; Sun, G.; Chi, C.; Yu, H.; Guizani, M. Convergence of Symbiotic Communications and Blockchain for Sustainable and Trustworthy 6G Wireless Networks. IEEE Wirel. Commun. 2025, 32, 18–25. [Google Scholar] [CrossRef]
- Merlec, M.M.; In, H.P. SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems. IEEE Internet Things J. 2024, in press. [Google Scholar] [CrossRef]
- Han, S.; Bai, Y.; Zhang, T.; Chen, Y.; Tellambura, C. Parallel Management of IoV Information Enabled by Blockchain and Decentralized Autonomous Organizations. IEEE Trans. Intell. Veh. 2024, 9, 4759–4768. [Google Scholar] [CrossRef]
- Mahmoud, N.; Abdelkader, H.; Aly, A. BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS. J. Netw. Comput. Appl. 2024, 226, 103870. [Google Scholar] [CrossRef]
- Khashan, O.A.; Khafajah, N.M. Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 726–739. [Google Scholar] [CrossRef]
- Mao, W.; Jiang, P.; Zhu, L. BTAA: Blockchain and TEE-assisted authentication for IoT systems. IEEE Internet Things J. 2023, 10, 12603–12615. [Google Scholar] [CrossRef]
- Maria, A.; Pandi, V.; Lazarus, J.D.; Karuppiah, M.; Christo, M.S. BBAAS: Blockchain-based anonymous authentication scheme for providing secure communication in VANETs. Secur. Commun. Netw. 2021, 6679882. [Google Scholar] [CrossRef]
- Maria, A.; Rajasekaran, A.S.; Al-Turjman, F.; Altrjman, C.; Mostarda, L. Baiv: An efficient blockchain-based anonymous authentication and Integrity Preservation Scheme for secure communication in VANETs. Electronics 2022, 11, 488. [Google Scholar] [CrossRef]
- Ramezan, G.; Meamari, E. ZK-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms. In Proceedings of the 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dublin, Ireland, 27–31 May 2024; pp. 1–7. [Google Scholar]
- Commey, D.; Hounsinou, S.; Crosby, G.V. Securing Blockchain-Based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs. In Proceedings of the 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 8–10 October 2024. [Google Scholar]
- Li, E.J.; Lin, H.T.; Yang, H.R. A Blockchain-PUF-Based Secure Mutual Authentication Scheme for IoT. In Proceedings of the 2024 IEEE Conference on Communications and Network Security (CNS), Taipei, Taiwan, 30 September–3 October 2024; pp. 1–9. [Google Scholar]
- Narkedimilli, S.; P, P.; Sriram, A.V.; Raghav, S.; Vangapandu, P. FL-DABE-BC: A Privacy-Enhanced Decentralized Authentication and Secure Communication Framework for FL in IoT-Enabled Smart Cities. In Proceedings of the 2nd International Workshop on Foundation Models for Cyber-Physical Systems & Internet of Things, Irvine, CA, USA, 6–9 May 2025. [Google Scholar]
- Li, S.; Zhang, H.; Shi, H.; Ma, M.; Wang, C. A Novel Blockchain-Enabled Zero-Trust-Based Authentication Scheme in Power IoT Environments. J. Supercomput. 2024, 80, 20682–20714. [Google Scholar] [CrossRef]
- Tian, H.; Li, M. A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain. Comput. Mater. Contin. 2025, 83, 5539–5559. [Google Scholar] [CrossRef]







| Protocol | Blockchain Trust Model | Attribute Binding | Privacy Preservation | Communication Pattern | Deployment Complexity |
|---|---|---|---|---|---|
| Li [18] | Centralized server | None | No | Multi-round | Low |
| Abdi [19] | Centralized server | None | Partial | Multi-round | Low |
| Tentu [21] | Permissioned blockchain | Static | Partial | Multi-round | Medium |
| Hu [22] | Trusted third party | None | No | Multi-round | Low |
| Wang [3] | Permissioned blockchain | Static | Full | Multi-round | Medium |
| Rivera [14] | Public blockchain | Dynamic | Full | Multi-round | High |
| NIABIAuth | Permissioned blockchain | Static | Full | Single-round | High |
| Symbol | Meaning of Symbols |
|---|---|
| A cyclic group of prime order q, used for cryptographic operations | |
| G | Generator of group |
| Identity identifier | |
| Ephemeral pseudonymous identifier | |
| Public key of the device derived from the private key | |
| Private key of the IoT terminal device | |
| Attribute value to be privately bound to the identity | |
| H | A secondary generator independent of G, used for commitments |
| r | Ephemeral randomness for Schnorr signing |
| Randomness used in attribute commitment | |
| R | Commitment used in the Schnorr style proof |
| c | Challenge computed as a hash over public parameters and session info |
| C | Pedersen commitment to the device attribute |
| s | Schnorr response in non-interactive form |
| P | Authentication proof submitted by the prover |
| Session metadata | |
| Connector symbol | |
| T | Timestamp |
| Session Identifier |
| Protocol | Computational Composition | Time Cost (ms) |
|---|---|---|
| Li [18] | 1.98 | |
| Abdi [19] | 3.72 | |
| Tentu [21] | 3.72 | |
| Hu [22] | 2.90 | |
| Wang [3] | 2.97 | |
| Rivera [14] | 1.89 | |
| NIABIAuth | 1.86 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Han, Z.; Li, X.; Kang, C.; Sun, H.; Gao, Y. NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals. Information 2025, 16, 1040. https://doi.org/10.3390/info16121040
Han Z, Li X, Kang C, Sun H, Gao Y. NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals. Information. 2025; 16(12):1040. https://doi.org/10.3390/info16121040
Chicago/Turabian StyleHan, Zilong, Xinge Li, Chaoqun Kang, Haowen Sun, and Yali Gao. 2025. "NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals" Information 16, no. 12: 1040. https://doi.org/10.3390/info16121040
APA StyleHan, Z., Li, X., Kang, C., Sun, H., & Gao, Y. (2025). NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals. Information, 16(12), 1040. https://doi.org/10.3390/info16121040


