Next Article in Journal
Fairness-Aware Intelligent Reinforcement (FAIR): An AI-Powered Hospital Scheduling Framework
Previous Article in Journal
A Machine Learning Framework for Harvesting and Harmonizing Cultural and Touristic Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals

1
State Grid Shanghai Energy Internet Research Institute Co., Ltd., Shanghai 201203, China
2
China Electric Power Research Institute Co., Ltd., Beijing 100192, China
3
Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunications, Ministry of Education, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Information 2025, 16(12), 1040; https://doi.org/10.3390/info16121040 (registering DOI)
Submission received: 28 September 2025 / Revised: 24 November 2025 / Accepted: 25 November 2025 / Published: 28 November 2025

Abstract

The large-scale deployment of distributed devices in the Internet of Things (IoT) brings urgent demands for secure, scalable, and lightweight identity authentication. For example, virtual power plants integrate numerous heterogeneous energy terminals to support grid dispatch and market operations, while posing challenges such as real-time access, resource constraints, and identity privacy protection. To address these challenges, this paper proposes NIABIAuth, a non-interactive attribute binding identity authentication protocol for IoT terminals. NIABIAuth supports dynamic challenge computation and binds cryptographic identity proofs with terminal attributes, enabling fine-grained and privacy preserving access control. By storing identity credentials and verification records on the chain, this protocol ensures traceability and tamper resistance. Experiments demonstrate that NIABIAuth maintains low authentication latency and is consistent throughput, even under constrained conditions. Compared with baseline methods, NIABIAuth achieves substantial reductions in communication and computation cost. The proposed NIABIAuth was formally verified using the AVISPA tool, which proved that it could resist common attacks, including replay attacks, man-in-the-middle attacks, etc. A large number of simulation experiments have demonstrated that the proposed protocol can provide real-time identity authentication for Internet of Things terminals.
Keywords: identity authentication; blockchain; zero-knowledge proof; attribute binding identity authentication; blockchain; zero-knowledge proof; attribute binding

Share and Cite

MDPI and ACS Style

Han, Z.; Li, X.; Kang, C.; Sun, H.; Gao, Y. NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals. Information 2025, 16, 1040. https://doi.org/10.3390/info16121040

AMA Style

Han Z, Li X, Kang C, Sun H, Gao Y. NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals. Information. 2025; 16(12):1040. https://doi.org/10.3390/info16121040

Chicago/Turabian Style

Han, Zilong, Xinge Li, Chaoqun Kang, Haowen Sun, and Yali Gao. 2025. "NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals" Information 16, no. 12: 1040. https://doi.org/10.3390/info16121040

APA Style

Han, Z., Li, X., Kang, C., Sun, H., & Gao, Y. (2025). NIABIAuth: A Non-Interactive Attribute Binding Identity Authentication Protocol for Internet of Things Terminals. Information, 16(12), 1040. https://doi.org/10.3390/info16121040

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop