You are currently on the new version of our website. Access the old version .
MathematicsMathematics
  • Feature Paper
  • Article
  • Open Access

17 November 2025

Decentralized Authentication and Data Access Control Scheme Using DID for Fog-Enabled Industrial Internet of Things

Department of Smart Security, Gachon University, Seongnam 13120, Republic of Korea
This article belongs to the Special Issue Data Protection and Communication Security in the Industrial Internet of Things and Smart Manufacturing

Abstract

The Industrial Internet of Things (IIoT) integrates a wide range of devices and identities, making the protection of sensitive industrial data a critical challenge. However, existing centralized systems still face limitations such as single points of failure, inefficient identity authentication, and dependence on trusted third parties (TTPs). To address these issues, we present a blockchain-based authentication and data access control scheme for IIoT systems. The proposed scheme eliminates TTP involvement by employing decentralized identifiers (DIDs) and key-aggregate searchable encryption (KASE), utilizing scalable authentication without requiring all industrial data to be stored on the blockchain. Security robustness is demonstrated through informal analysis, the Real-or-Random (ROR) model, and the AVISPA simulation tool (v1.6). Furthermore, performance evaluation using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) SDK shows that the proposed scheme achieves computational efficiency compared with existing solutions. Overall, the results confirm that the proposed scheme provides secure, efficient, scalable, and TTP-free data management for IIoT environments.

1. Introduction

The Industrial Internet of Things (IIoT) constitutes a large-scale ecosystem in which heterogeneous devices interconnect to exchange data and collaborate for intelligent decision-making. It was projected that by 2020, more than 25 billion smart devices would be deployed worldwide [1]. Such rapid growth, however, imposes substantial burdens on existing infrastructures, particularly in terms of computation, storage, and security. To mitigate these limitations, the integration of IIoT with cloud computing has been extensively explored, leveraging the cloud’s virtually unlimited computational and storage resources.
Cloud-assisted IIoT systems are envisioned to underpin critical infrastructures such as smart manufacturing, intelligent transportation, and advanced energy systems. These systems depend on massive volumes of industrial data to enable analytics-driven operations. However, the geographical separation between centralized cloud servers (CSs) and edge devices introduces latency, limiting their effectiveness in delay-sensitive and mobile applications. Fog computing has thus been introduced as a complementary paradigm that extends cloud capabilities to the network edge [2]. By deploying fog nodes between CSs and end devices, data can be preprocessed and temporarily stored closer to its source, thereby reducing latency and improving overall system efficiency compared with the traditional device–cloud model.
In cloud-assisted IIoT systems, data sharing typically involves multiple categories of industrial information distributed among various organizations and individuals. For example, a smart factory gathers production, environmental, and energy data through gateway nodes and grants selective access to external parties. Specifically, production and energy data may be shared with the energy management provider, whereas production and environmental data may be disclosed to the quality inspection department. While such fine-grained sharing enhances collaboration and decision-making, it simultaneously heightens the risk of data breaches. To address these concerns, searchable encryption (SE) [3,4] has been adopted to enable secure keyword searches over encrypted datasets [5,6,7,8]. Nonetheless, managing multiple data categories across different entities requires numerous encryption keys, resulting in high communication and storage overhead for secure distribution and maintenance. To alleviate this issue, key-aggregate searchable encryption (KASE) [9] has been introduced and further advanced in subsequent studies [10,11]. As illustrated in Figure 1, with KASE, a factory can distribute a single aggregate key to each authorized user, thereby streamlining key management and enabling a single trapdoor to retrieve multiple classes of data.
Figure 1. DID architecture.
In parallel, blockchain technology has emerged as a promising solution due to its decentralization, immutability, and capability to enable trustless interactions without reliance on trusted third parties (TTPs) [12]. Nonetheless, cloud-assisted infrastructures remain vulnerable to adversarial attacks seeking to exploit inherent weaknesses [13]. Furthermore, most existing protocols continue to rely on trusted authorities, reintroducing centralization and associated risks such as performance bottlenecks, privacy leakage, and single points of failure. In cloud-assisted IIoT, these dependencies extend beyond data management to include user identity and access rights, which are often still governed by TTPs.
To overcome these challenges, recent studies have explored decentralized schemes that eliminate reliance on TTPs. For example, attribute-based encryption (ABE) [14] combined with blockchain supports fine-grained access control. However, such schemes remain only partially decentralized, as they still require a TTP for private key issuance and policy management, thereby exposing systems to insider threats and privacy risks. More recently, decentralized identifiers (DIDs) [15] have been proposed as a promising alternative for privacy-preserving identity management. DIDs enable devices to autonomously generate and manage their identifiers and cryptographic keys without TTP involvement, thus achieving verifiable and self-sovereign identity in distributed settings.
In this work, we propose a blockchain-enabled authentication and access control framework tailored for IIoT environments. The scheme integrates DIDs and KASE to eliminate reliance on centralized authorities for identity management, enhance self-sovereign identity, and achieve scalable, fine-grained access control. The proposed design ensures secure, efficient, and resilient authentication, thereby addressing the stringent requirements of next-generation industrial infrastructures.

1.1. Motivations

Cloud/Fog-assisted IIoT environments must support secure and efficient sharing of heterogeneous industrial data. Existing solutions introduce significant key management overhead and still rely on TTPs. This reliance creates centralization risks, privacy leakage, and single points of failure. Blockchain-based schemes attempt to reduce trust dependence, but many of them keep identity issuance and authentication under centralized control. In addition, these schemes often utilize static identity information, which increases exposure to linkability attacks and replay attacks. Furthermore, current data access control mechanisms are often insufficient for multi-category industrial data, and many existing models lack the ability to support fine-grained access policies across diverse entities in IIoT settings. These issues demonstrate the need for a decentralized authentication and access control scheme that can simplify key management for multi-category data, provide self-sovereign and privacy-preserving identity control without TTPs, and support fine-grained and flexible access control. Motivated by these requirements, this work combines DIDs and KASE within a blockchain-supported scheme to offer scalable, resilient, and fine-grained authentication and access control in Fog-assisted IIoT systems.

1.2. Contributions

The main contributions of this work can be summarized as follows:
  • We present a decentralized protocol for authentication and access control in cloud-assisted IIoT environments. To guarantee scalability and strong security for participating nodes, the scheme employs DIDs and KASE. Our scheme addresses the challenges of TTP dependence, achieves efficient key management, and supports fine-grained access control in industrial data sharing.
  • Within the proposed scheme, the data owner, data user, and fog node reveal only a minimal portion of personal information when exchanging messages over public networks. Each entity is capable of independently creating and maintaining its identity, along with corresponding public and private keys. Importantly, during the authentication process among the data owner, data user, and fog node, all session-related parameters are renewed in every session, with the exception of the user’s DID. These features mitigate the vulnerabilities associated with static identifiers and reduce exposure to linkability and replay attacks.
  • The security guarantees of the proposed scheme are examined through a series of evaluations, including informal analysis, the Real-or-Random (ROR) model [16], and formal verification conducted using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool [17]. These analyses demonstrate that the protocol remains secure even without any TTP involvement and confirm its robustness against a wide range of attacks.
  • To analyze performance of our scheme, we measure and compare the computational costs of the proposed protocol against existing schemes. The cryptographic operations are implemented and tested using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) SDK [18]. The results demonstrate that the protocol maintains practical efficiency while providing enhanced decentralization and stronger protection against the potential attacks.

1.3. Organization

The remainder of this paper is structured as follows. Section 2 reviews the existing state-of-the-art solutions. The preliminaries and threat model are discussed in Section 3. Section 4 details the proposed scheme, followed by a comprehensive security analysis in Section 5. Section 6 presents experimental results for cryptographic primitives, and compares the proposed scheme with related works. Finally, Section 7 concludes the paper.

3. Preliminaries

3.1. Decentralized Identifiers

Decentralized Identifiers (DIDs) [15] serve as unique identifiers for entities by leveraging distributed ledger technologies, without reliance on centralized authorities. Within the DID ecosystem, three key roles exist: issuers (e.g., government agencies) that generate verifiable credentials, holders who maintain these credentials in digital wallets, and verifiers responsible for validating their authenticity. The interactions among these roles and the corresponding information flows are illustrated in Figure 1.
As shown in Figure 1, the DID architecture is built upon DID Documents [15], which contain cryptographic materials, verification methods, and service endpoints used to interact with the entity represented by the DID. A DID consists of a method and a method-specific identifier that designates the DID subject, which may be a person, device, organization, or software system. The DID controller is the entity authorized to modify the DID Document, typically through possession of the relevant cryptographic keys, and the controller may or may not be identical to the DID subject. A DID URL extends the basic DID syntax by including path, query, or fragment components, enabling the precise identification of specific resources—such as a public key or service endpoint—either within the DID Document or external to it. DID Methods define the procedures for creating, resolving, updating, and deactivating DIDs and DID Documents on a verifiable data registry, such as a blockchain or decentralized storage network. DID resolvers use the corresponding DID Method to retrieve DID Documents through DID resolution, while DID URL dereferencers fetch the specific resource indicated by a DID URL. These components also form a unified and interoperable system that supports decentralized, verifiable, and fine-grained identity management across heterogeneous environment.

3.2. Threat Model

We evaluate the security of the proposed scheme using the “Dolev–Yao (DY) model” [25], which is commonly adopted for rigorous protocol analysis. In this setting, all communications are assumed to traverse untrusted channels, giving an adversary extensive control over the network. Under these assumptions, the adversary can monitor, block, or store transmitted messages, as well as manipulate their contents, fabricate new ones, and insert malicious data into ongoing exchanges.

3.3. Mathematical Preliminaries

We have outlined several mathematical definitions and cryptographic primitives to facilitate readers’ understanding of the proposed approach. The scheme is constructed on elliptic curve cryptography (ECC) and its security relies on the hardness of the elliptic curve discrete logarithm problem (ECDLP) and the elliptic curve decisional Diffie–Hellman problem (ECDDHP). Utilizing these computational assumptions, we provide a formal analysis to demonstrate the security of the proposed scheme.

Elliptic Curve Cryptography

Elliptic curve cryptography (ECC) is a public-key cryptographic scheme that employs the algebraic properties of elliptic curves to achieve security. To apply ECC in a security setting, one must first choose a large finite field F p , a large prime p, another prime q, and elliptic curve parameters w and v. Based on these parameters, an elliptic curve is defined as E ( w , v ) : y 2 = x 3 + w x + v , subject to the condition 4 w 3 + 27 v 2 0 . The points on this curve form an additive group, for which a base point P is specified. For an integer n Z q , scalar multiplication is expressed as:
n · P = P + P + + P n times
The cryptographic strength of ECC relies on the intractability of the following problems:
  • Elliptic Curve Discrete Logarithm (ECDL) Problem: Determine n Z q given n · P .
  • Elliptic Curve Decisional Diffie–Hellman (ECDDH) Problem: Given n, s, and t, decide whether n · s · P = t · P .
  • Elliptic Curve Computational Diffie–Hellman (ECCDH) Problem: Compute n · s · P given n · P and s · P .

3.4. Bilinear Pairing

Bilinear maps constitute a fundamental building block of pairing-based cryptography, which underlies schemes such as identity-based encryption [36] and KASE [9]. Consider two cyclic groups G 1 and G 2 of prime order p, and let g be a generator of G 1 . A bilinear map is defined as a function e : G 1 × G 1 G 2 that satisfies the following conditions:
(1)
Bilinearity: For all x , y Z p * and g G 1 , e ( g x , g y ) = e ( g , g ) x y .
(2)
Non-degeneracy: e ( g , g ) 1 .
When both the group operation in G 1 and the evaluation of e can be performed efficiently, the pair ( G 1 , G 2 ) is termed a bilinear group.

4. Proposed Scheme

In this section, we describe the system model and access control workflow of the proposed scheme. The primary objective is to enable patients to manage and share their data securely in a real-time and a self-sovereign manner. IIoT data are stored on fog nodes, while the big data center collects only metadata required for analytical purposes rather than the raw data itself. The notations used throughout this paper are summarized in Table 2.
Table 2. Notations for our scheme.

4.1. System Model

We begin by outlining the system model, as shown in Figure 2. The architecture is composed of four primary entities: the data user (DU), the data owner (DO), the fog node (FN), and the big data center (BDC).
Figure 2. System model.
  • Big data center ( B D C ): The B D C is composed of multiple cloud servers and analytical tools, which receive data from fog nodes to perform large-scale processing. Data uploaded from the IoT network is analyzed within the B D C and subsequently utilized to provide requested services to users. This hierarchical architecture supports efficient and secure management of IoT data in fog-enabled systems.
  • Fog node ( F N ): Each FN is responsible for managing a single IoT network, while interconnected F N s collectively form a resilient fog-enabled infrastructure. This infrastructure enables secure data processing and facilitates data sharing. Data collected from IoT devices are transmitted to the BDC upon request for advanced services.
  • Data owner ( D O ): The D O serves as a domain administrator, responsible for collecting data from IIoT devices deployed in designated areas to capture and deliver real-time information to data users. Each device is associated with a data owner who oversees the IoT network and supports scalability by managing the integration of new devices. Acting as the IIoT device owner, the D O establishes the connection between the IoT network and the FN.
  • Data user ( D U ): The D U refers to a domain administrator in another network domain who requests access to data managed by the D O and utilizes the shared data within their own domain.
The communication flow of the proposed scheme can be described as follows:
S1:
Both the D O and the D U generate their respective DIDs and perform DID-based authentication with their associated FN to initiate IIoT service access. Once the authentication is completed, the D O encrypts the IIoT data and uploads it to the F N .
S2:
When the D U intends to access the IIoT data of the D O , it sends a data request message to the DO and performs DID authentication. After successful authentication, the D O issues and transmits an aggregate key corresponding to the requested data to the D U .
S3:
To retrieve the encrypted data, the D O generates a trapdoor and forwards it to its F N . The F N then communicates with the D O ’s domain F N and performs DID authentication. Upon successful verification, the requested encrypted data is transferred to the D O ’s FN and subsequently decrypted. The D U then receives the encrypted data, decrypts it using the aggregate key, and utilizes the retrieved information within its own IIoT domain.

4.2. Initialization Phase

In this initialization phase, the D O , D U , and F N generate their respective parameters required for subsequent operations. Once these parameters are produced, they are recorded on the blockchain to enable the next phase. The initialization procedure is identical for the D O , D U , and F N .
S1:
The D O begins by constructing a bilinear group ( G 1 , G 2 ) of prime order q, an elliptic curve E ( a , b ) : y 2 = x 3 + a x + b ( mod q ) , and defining a non-degenerate bilinear map e : G 1 × G 1 G 2 . The D O also specifies the maximum number of documents n with indices i n d , selects a generator g G 1 , a random secret α Z q , and a cryptograhpic hash function h : 0 , 1 * Z q * .
S2:
The D O first creates its decentralized identifier D I D D O and then computes g i = g α i G 1 for every 1 i 2 n . A polynomial f ( x ) of degree i n d is subsequently constructed. In addition, the D O generates two distinct key pairs: ( s k D O , p k D O ) = ( s k D O , g s k D O ) , which is used for authentication, and ( s k S D O , p k S D O ) = ( s k S D O , g s k S D O ) , which is employed for data sharing. Each key pair includes a secret key and its associated public key.
S3:
Finally, the D O publishes the document D D o c D O = { E ( a , b ) , q , G 1 , G 2 , e , g , n , p k D O / S D O , i n d , ( g i ) 1 i 2 n , h , ( g f ( x ) ) 0 x i n d } on the blockchain.

4.3. Registration Phase

To join the proposed network, both the D O and D U undergo a registration phase by performing DID-based authentication with their respective F N s. Through this process, each of them establishes a pre-shared key with the F N in its domain. The registration procedure of the D O is identical to that of the DU and proceeds as follows:
S1:
The D O begins the process by generating a random nonce n 1 Z q and sending a registration request, which includes D I D D O , to F N i through a secure communication channel.
S2:
Upon reception, F N i resolves the on-chain DID document D o c D O to obtain the public parameters together with p k D O . It then creates a challenge c 1 and transmits it back to the D O via the secure channel.
S3:
Once the challenge is received, the D O computes C 1 D O = n 1 · G and C 2 D O = n 1 + c 1 · s k D O , and subsequently returns the tuple C 1 D O , C 2 D O to F N i .
S4:
F N i then verifies the response by checking the equality C 2 D O · G C 1 D O = ? c 1 · p k D O . If the condition holds, both entities compute the shared session key, where the D O derives s k D O / F N i = p k F N i · c 1 · s k D O and F N i derives s k F N i / D O = p k D O · c 1 · s k F N i .

4.4. Data Upload Phase

Once the initialization phase is completed, the D O proceeds to encrypt the data before uploading it to the F N . The detailed steps are as follows:
S1:
The D O chooses a random value r n 1 Z q * and generates the public parameters for each index i, represented as P P i = ( c p 1 , c p 2 , c p 3 ) for i = 1 , , n . These values are computed as c p 1 = g r n 1 , c p 2 = ( g i · p k S D O ) r n 1 , and c p 3 = D · e ( g 1 , g n ) r n 1 . The data index value is then derived as I N D X i = e ( g , h 1 ( i n d ) ) r n 1 e ( g 1 , g n ) r n 1 .
S2:
The D O encrypts the data P P i , I N D X i using the pre-shared session key s k D O / F N i . Finally, the encrypted data P P i , I N D X i s k D O / F N i are uploaded by the D O to the F N .

4.5. Data Request and Aggregate Key Sharing Phase

To initiate the data access phase, the D U issues a request to the D O to obtain the aggregate key. Upon confirming the validity of the request, the D O delegates authorization to F N i to handle subsequent access control procedures. The detailed process of this phase is outlined below.
S1:
The D U begins by generating a random nonce r n 1 and a challenge value c 1 . It then computes C T 1 D U = r n 1 · G and transmits the tuple C T 1 D U , D I D D U , c 1 to the D O .
S2:
Upon receiving the message, the D O selects a random nonce r n 2 and generates a challenge c 2 . It retrieves the public key p k D U of the D U from its DID document stored on the blockchain. Subsequently, the D O computes C T 1 D O = r n 2 · G , m 1 = ( D I D D O | | D I D D U | | c 1 | | c 2 | | C T 1 D U | | C T 1 D O ) , and C T 2 D O = r n 2 + h ( m 1 ) · s k D O . It then derives the session key s k D O D U = r n 2 · C T 1 D U and computes the aggregate key as a k e y = j D g n + 1 j s k D M D O . The aggregate key is encrypted using the session key to obtain E a k e y = ( a k e y ) s k D O D U . Finally, the D O sends E a k e y , c 2 , C T 1 D O to the D U .
S3:
Upon receiving the response, D U retrieves the D O ’s public key p k D O from the DID document recorded on the blockchain. It then constructs m 2 = ( D I D D O | | D I D D U | | c 1 | | c 2 | | C T 1 D U | | C T 1 D O ) and verifies the validity of the received message by checking whether C T 2 D O · G C T 1 D O = ? h ( m 2 ) · p k D O . If it is hold, the D U computes the session key as s k D U D O = r n 1 · C T 1 D O and decrypts E a k e y using this session key to recover the aggregate key a k e y . Finally, the D U securely stores a k e y for use in subsequent data access operations.

4.6. Fog-Enabled Data Sharing Phase

The D U initiates a data access request to its domain-specific fog node F N j . During this process, the D U communicates with F N j using their established pre-shared key and transmits the corresponding trapdoor. Subsequently, the fog node F N i in the D O ’s domain performs DID-based authentication with F N j . Upon successful verification, F N i shares the requested encrypted data with F N j based on the received trapdoor information.
S1:
D U selects the random number r n 1 and computes C 1 D U = r n 1 · G , C T 2 D U = r n 1 + h ( D r e q ) · s k D U , and the trapdoor T D j = a k e y · h ( i n d ) . Subsequently, { C T 1 D U , C T 2 D U , T r j } is encrypted using pre-shared key s k D U F N j and transmitted to F N j .
S2:
Upon receiving the message, F N j decrypts it using s k D U F N j to obtain { C T 1 D U , C T 2 D U , T r j } . It verifies the correctness of the message by checking C T 2 D O · G C T 1 D U = ? h ( D r e q ) · p k D O . If the verification succeeds, F N j generates a random value r n 2 and challenge c 1 , computes C 1 F N j = r n 2 · G , and sends { C T 1 F N j , D I D F N j , c 1 } to F N i .
S3:
After receiving the request, F N i generates a random number r n 3 and challenge c 2 , computes C 1 F N i = r n 3 · G , m 1 = ( D I D F N i | | D I D F N j | | c 1 | | c 2 | | C T 1 F N i | | C T 1 F N j ) , and C T 2 F N i = r n 3 + h ( m 1 ) · s k F N i . It then derives the session key s k F N i / j = r n 3 · C T 1 F N j . F N i and transmits { C T 1 F N i , C T 1 F N i , D I D F N i , c 2 } to F N j .
S4:
Upon receiving the response, F N j retrieves the F N i ’s public key p k F N i from the blockchain and computes m 2 = m 1 = ( D I D F N i | | D I D F N j | | c 1 | | c 2 | | C T 1 F N i | | C T 1 F N j ) . It verifies whether C T 2 F N i · G C T 1 F N i = ? h ( m 2 ) · p k F N i . If valid, it derives the session key s k F N j / i = r n 2 · C T 1 F N i . F N j , encrypt the trapdoor T r j using s k F N j / i , and forwards it to F N i .
S5:
After decrypting T r j using s k F N i / j , F N i computes c c p 1 = k S , k i g n + 1 k + i , c c p 2 = k D g n + 1 k , c c p 3 = c p 3 · e ( c c p 1 , c p 1 ) e ( c c p 2 , c p 2 ) , and T r = T r j · c p 1 . It then verifies the data index by checking C I N D X i = e ( T r , c p 1 ) e ( c c p 2 , c p 2 ) . Finally, F N i encrypts { c p 1 , c c p 3 } using the session key s k F N i / j and forwards it to F N j .
S6:
F N j decrypts { c p 1 , c c p 3 } using s k F N j / i , and re-encrypts them with the session key s k F N j D U , and transmit the result to the D U . Upon decryption, the D U recovers the data D as c c p 3 · e ( a k e y , c p 1 ) .

Correctness of Data Decryption

Proof. 
p 3 · e ( a k e y , c p 1 ) = c p 3 · e ( c c p 1 , c p 1 ) e ( c c p 2 , c p 2 ) · e ( a k e y , c p 1 ) = c p 3 e ( a k e y · c c p 1 , c p 1 ) e ( c c p 2 , c p 2 ) = c p 3 · e ( a k e y · k S , k i g n + 1 k + i , g r 1 ) e ( k D g n + 1 k , ( g i · p k S D O ) r 1 ) = c p 3 · e ( a k e y , g r 1 ) · e ( k D , k i g n + 1 k + i , g r 1 ) e ( k D g n + 1 k , g r S D O · r 1 ) · e ( k D g n + 1 k , g i r 1 ) = c p 3 · e ( a k e y , g r 1 ) e ( k D g n + 1 k , g r S D O · r 1 ) · e ( g n + 1 , g r 1 ) = D a t a · e ( g 1 , g n ) r 1 · e ( k S g n + 1 k r S D O , g r 1 ) e ( k D g n + 1 k , g r S D O · r 1 ) · e ( g 1 , g n r 1 ) ) = D a t a
S1:
We begin with the expression p 3 · e ( a k e y , c p 1 ) and substitute the definition of p 3 . The expression then becomes
p 3 · e ( a k e y , c p 1 ) = c p 3 · e ( c c p 1 , c p 1 ) e ( c c p 2 , c p 2 ) · e ( a k e y , c p 1 ) .
S2:
Using the bilinearity property of the pairing, specifically e ( X Y , Z ) = e ( X , Z ) e ( Y , Z ) , we combine the two pairings involving c p 1 as follows:
= c p 3 · e ( a k e y · c c p 1 , c p 1 ) e ( c c p 2 , c p 2 ) .
This transformation merges structurally related factors and prepares the expression for substitution of the explicit form of c c p 1 .
S3:
We expand the internal product a k e y · c c p 1 according to the ciphertext definition:
= c p 3 · e a k e y · k S , k i g n + 1 k + i · g 1 r 1 , c p 1 e k D g n + 1 k · ( g i · p k S D O ) r 1 , c p 2 .
This step makes explicit the dependency of the expression on the structural index sets associated with the ciphertext components.
S4:
Exploiting the multiplicative distributivity of the pairing, e ( A B , C ) = e ( A , C ) e ( B , C ) , we distribute the pairing over all factors in both numerator and denominator:
= c p 3 · e ( a k e y , g 1 r 1 ) · e k D , k i g n + 1 k + i , g 1 r 1 e k D g n + 1 k , g r S D O r 1 · e k D g n + 1 k , g i r 1 .
S5:
Rearranging symmetric terms and isolating cancellable components, we obtain
= c p 3 · e ( a k e y , g r 1 ) e k D g n + 1 k , g r S D O r 1 · e ( g n + 1 , g 1 r 1 ) ,
where duplicated factors in the distributed pairings have been consolidated.
S6:
We substitute the definition of the ciphertext component c p 3 = D a t a · e ( g 1 , g n ) r 1 , obtaining
= D a t a · e ( g 1 , g n ) r 1 · e k S g r S D O , g 1 r 1 e k D g n + 1 k , g r S D O r 1 .
S7:
Finally, we complete the derivation by canceling the symmetric pairing terms. The bilinear map satisfies e ( g , h x ) = e ( g , h ) x . This rule implies e ( g 1 , g n ) r 1 = e ( g 1 , g n r 1 ) . Both terms appear in opposite positions in the expression. As a result, they cancel. The entire expression then reduces to D a t a .

5. Security Analysis

In this section, we evaluate the security strength of the proposed protocol through multiple analyses, including informal reasoning, the ROR model [16], and formal verification using the AVISPA tool [17].

5.1. ROR Model

In most authentication protocols, each entity verifies the legitimacy of its communication partner and establishes a shared session key. To assess the security of this session key, the ROR model [16] is employed. This model enables the evaluation of a protocol’s resistance against both passive and active adversarial behaviors. Specifically, the adversary interacts with instantiated participants through a series of games and attempts to distinguish between a random nonce and a real session key using a test query.
To formally analyze session key security under the ROR model, we define the participating entities, the adversary A , and the corresponding query operations. In particular, we focus our formal security analysis on the key agreement and aggregate key sharing processes between the D U and D O . This analysis involves two entities: data owner P D O i and data user P D U i , where i represent specific instance of each participants. The adversary A is assumed to have full control over public communication channels, with the capability to intercept, modify, delete, and replay transmitted messages. Based on these capabilities, A can perform the following types of queries:
  • E x e c u t e ( Π D O t 1 , Π D U t 2 ) : This query models a passive attack, in which the adversary A eavesdrops on the message exchanges between D O and D U over an insecure public channel. The A can record all transmitted data without altering any message content.
  • S e n d ( P t , msg ) : This query represents an active attack, allowing A to inject crafted messages into an oracle session P t and observe the resulting responses. This enables A to attempt to manipulate or replay protocol messages.
  • S ( P M a ) : This query initiates the security experiment. A fair coin c 0 , 1 is flipped to determine the response. If the session key s s k shared between P t and A is considered fresh, then A receives a random value when c = 0 , and the actual s s k when c = 1 . If the freshness condition is not met, the oracle returns ⊥.

ROR Proof

In accordance with the ECDDHP and ECDLP previously defined in Section Elliptic Curve Cryptography, this game is executed to prove the Theorem 1 presented below and to confirm the session key security of the proposed scheme.
Theorem 1.
Assume that A is an adversary operating within polynomial time t against our scheme P. Then, A ’s advantage in violating the semantic security of P is expressed as:
A d v P E C D D H P q h 2 | H a s h | + 2 A d v E C D D H P ( t )
Here, q h and q s correspond to the number of hash and send queries issued by the adversary, respectively. The function H a s h denotes the range of a collision-resistant hash function H, while A d v E C D D H P ( t ) represents the success probability of A in solving the ECDDHP within polynomial time t.
Proof. 
The proof proceeds through a sequence of four games, G i ( i = 0 , 1 , 2 , 3 ) , where W i n A i denotes the event that the adversary A wins the corresponding game. The formal reasoning for each game is detailed below.
  • Game G 0 : The initial game, denoted as G 0 , models the real interaction between the adversary A and the our protocol. A random bit c is chosen at the beginning of the game, and the corresponding winning advantage of A is computed as:
    A d v P E C D D H P = | 2 . P r [ W i n A 0 ] 1 |
  • Game G 1 : In this game, denoted G 1 , the adversary A passively eavesdrops on all communications within our scheme using the E x e c u t e ( P D O t 1 , P D U t 2 ) query. It then invokes T e s t ( Π t ) to decide whether the returned value represents the true session key s s k or a random bitstring. The session key s s k , computed as s k D O D U = r n 2 · C T 1 D U and s k D U D O = r n 1 · C T 1 D O , can only be derived by obtaining the secret keys of both D O and D U , which is infeasible under the ECDDHP assumption. Therefore, A ’s advantage in this game satisfies the bound:
    P r [ W i n A 1 ] = P r [ W i n A 0 ]
  • Game G 2 : Game G 2 represents an active attack in which the adversary A interacts with the system by issuing S e n d ( P t , msg ) and H a s h queries. In this phase, A attempts to impersonate a legitimate participant ( D O or D U ) by manipulating multiple H a s h queries. However, A is unable to derive the participants’ secret keys or the random value r n , since both rely on the hardness of the ECDDHP and ECDLP problems. Moreover, due to the collision resistance of the hash function, A cannot produce a valid hash collision within polynomial time. Consequently, by applying the birthday paradox, the adversary’s advantage can be expressed as follows:
    | P r [ W i n A 1 ] P r [ W i n A 2 | q h 2 2 | H a s h |
  • Game G 3 : The final game, denoted G 3 , simulates an extended active attack scenario. Similarly to the conditions in Game G 1 , A must recover both s k D O and s k D U to reconstruct the correct session key s s k . Nevertheless, even after executing the eavesdropping attack, distinguishing these keys from s k D O D U = r n 2 · C T 1 D U or s k D U D O = r n 1 · C T 1 D O , would require solving the ECDDHP. As this problem remains computationally infeasible, A cannot obtain the valid session key, implying that
    | P r [ W i n A 2 ] P r [ W i n A 3 | A d v P E C D D H P ( t )
Once all four games ( G 0 , G 1 , G 2 , G 3 ) have been executed, A ’s final task is to determine the correct value of the bit c. Given this setting, the advantage of A in distinguishing the real session key from a random one is given by
A d v P , G 3 E C D D H P = 1 2
From Equations (1) and (2), the following result can be derived.
1 2 . A d v P E C D D H P = | P r [ W i n A 0 ] 1 2 | = | P r [ W i n A 1 ] 1 2 |
Using the triangular inequality along with Equations (3)–(5), the following conclusion can be drawn:
| P r [ W i n A 1 ] 1 2 | = | P r [ W i n A 1 ] P r [ W i n A 3 ] | | P r [ W i n A 1 ] P r [ W i n A 2 ] | + | P r [ W i n A 2 ] P r [ W i n A 3 ] | q h 2 2 | H a s h | + A d v P E C D D H P ( t )
Subsequently, multiplying both sides of Equation (7) by 2 provides the final result.
A d v P E C D D H P q h 2 | H a s h | + 2 A d v E C D D H P ( t )

5.2. Informal Analysis

5.2.1. Impersonation Attacks

In an impersonation attack, an adversary A attempts to masquerade as a legitimate DO or DU to gain unauthorized access to the DO’s data. However, such an attack is infeasible in our scheme, as the adversary A is unable to derive the shared key s k D O D U = r n 2 · C T 1 D U , which relies on secret values accessible only to legitimate participants. Obtaining a valid secret key would require solving the ECDDHP, while deriving valid authentication parameters would involve computing the proof values r n 1 , r n 2 , C T 2 D O = r n 2 + h ( m 1 ) · s k D O . As these depend on private random values, such computations are infeasible, ensuring robustness against impersonation attacks.

5.2.2. Replay Attacks

A replay attack occurs when an adversary intercepts and re-transmits valid messages to gain data access. Our scheme prevents such attacks by including random number in important verification messages to verify freshness. Even if A attempts to reuse previous messages, it would need to derive the shared key s k D O D U , the random number { r n 1 , r n 2 } , and the secret key { s k D O , s k D U } , which is infeasible. Therefore, the proposed scheme remains secure against replay attacks.

5.2.3. Man-in-the-Middle Attacks

Section 5.2.1 shows that the adversary A cannot derive the shared key s k D O D U = r n 2 · C T 1 D U or the proof parameters C T 1 D O = r n 1 · G , r n 1 , r n 2 , C T 2 D O = r n 2 + h ( m 1 ) · s k D O without solving the ECDDHP. As a result, A is unable to reconstruct valid verification parameters or impersonate legitimate entities. Consequently, the proposed scheme is resistant to man-in-the-middle attacks.

5.2.4. Privileged Insider Attacks

This attack arises when a F N associated with a TTP attempts to compromise the confidentiality of data belonging to the D O or D U . In the proposed scheme, no centralized TTP is involved in managing the entities’ key pairs, owing to the DIDs. Each participant independently generates, maintains, and controls its own private credentials. Consequently, the absence of centralized key management effectively eliminates insider privileges, making the scheme inherently resilient against privileged insider attacks.

5.2.5. Fine-Grained Control and Self-Sovereignty

In the proposed scheme, the D O and D U initializes system parameters independently of any TTP. Data is secured using KASE, with ciphertexts maintained in the F N . The KASE mechanism enables flexible ciphertext updates and single-key decryption across multiple datasets. Because users locally create their own key pairs, the design eliminates reliance on a key generation center or central trust body, ensuring decentralized, fine-grained, and self-sovereign access management.

5.2.6. Providing Password Update Mechanism

In the proposed scheme, entities do not need to request assistance from a TTP to update their secret keys. Each participant can independently renew its key pair and corresponding public parameters by updating the associated public/private key entries within its own DID document on the blockchain.

5.2.7. Secure Mutual Authentication

Section 5.2.1, Section 5.2.2 and Section 5.2.3 demonstrate that deriving secret parameters is computationally infeasible for an adversary A without solving the ECDDHP. In the data request and aggregate key sharing process, the D O and D U derive session keys s k D O D U = r n 2 · C T 1 D U and s k D U D O = r n 1 · C T 1 D O based on the intractability of the ECDLP and ECDDHP. Consequently, the proposed scheme guarantees secure mutual authentication.

5.3. Formal Security Verification Using AVISPA

In this section, the proposed scheme is implemented and verified using the AVISPA tool [17], an AVISPA-based formal analysis extensively adopted in cryptographic protocol research. AVISPA evaluates the robustness of security schemes, focusing on their resistance to replay and man-in-the-middle attacks. Protocols are first described using the High-Level Protocol Specification Language (HLPSL) [37] and automatically converted into an Intermediate Format (IF) by the HLPSL2IF translator. The generated IF model is analyzed through one of four verification engines—OFMC [38], CL-AtSe [39], SATMC [40], or TA4SP [41]. Each backend provides an independent simulation report verifying the security soundness of the proposed protocol.

Simulation Results

As shown in Figure 3 and Figure 4, the OFMC and CL-AtSe backends report consistent verification results. The analysis confirms that the proposed D O D U aggregate key sharing process withstands potential replay and man-in-the-middle attacks within the specified threat models [42].
Figure 3. Result of OFMC.
Figure 4. Result of CLAtSe.

6. Comparative Analysis

In this section, we compare the performance and security features of our scheme with those of recent schemes in [10,31,32,33,34].
Limitations: This study aims to design a theoretically sound security protocol applicable to real-world industrial environments. However, implementing and testing the proposed scheme in a full-scale system equipped with an actual fog computing infrastructure remains challenging due to practical constraints such as resource availability and deployment cost. Therefore, the experimental evaluation was conducted in a controlled testbed environment using a Raspberry Pi platform, which serves as a lightweight representative model for mobile or edge devices. While this setup effectively validates the feasibility and performance of the proposed scheme, further large-scale deployment and real-world verification will be pursued in future work.

6.1. Security Features

Table 3 presents a summary of the security features of the proposed scheme alongside existing schemes [10,31,32,33,34]. Earlier studies overlook several vital security aspects; however, the proposed scheme successfully meets all major security objectives while maintaining decentralization and supporting fine-grained access control without the need for a TTP.
Table 3. Security features comparison.

6.2. Computational Cost

The performance evaluation was conducted on a Raspberry Pi 4B platform equipped with a 64-bit quad-core 1.5 GHz processor, 8 GB memory, and Ubuntu 20.04.2 LTS. The MIRACL [18] cryptographic library was employed to implement the proposed scheme. This configuration enabled direct measurement of computational overhead and facilitated comparison with previously proposed schemes.
The metrics T h , T s m , T s a , T b p , T e x p , and T P U F represent the mean execution times for hashing, scalar point multiplication and addition, bilinear pairing, modular exponentiation, and PUF operations, respectively. Each cryptographic primitive was executed 100 times to obtain reliable averages. Table 4 summarizes the computational requirements, and Table 5 reports the comparative evaluation results.
Table 4. Performance evaluation—computation cost.
Table 5. Comparative Analysis—Computational Cost.
The assessment involves three major operational phases: (1) data encryption and upload conducted by the D O , (2) search and ciphertext retrieval performed by the F N or server, and (3) decryption by the D U . The parameters m, m ¯ , and α indicate the total number of indices generated, search results obtained, and ciphertexts decrypted, respectively.
For comparison with existing fog-assisted schemes that do not adopt KASE, the computation performed by users was treated as data encryption and upload, the fog node’s intermediary tasks were regarded as data sharing, and the server’s operations were considered as data decryption when estimating total computational overhead.
While the proposed scheme incurs slightly higher computational cost than prior schemes, it achieves broader and more robust security guarantees. Schemes such as those by Guo et al. [32], Vangala et al. [33], and Ponnuru et al. [34] lack fine-grained access control and formal analysis, whereas Niu et al. [10] and Trivedi and Patel [31] do not support decentralization. Moreover, none of the previous schemes preserve data self-sovereignty. In KASE-based approaches, the computational cost varies depending on the number of keywords associated with the requested data; as the number of keywords increases, the computation overhead also grows. However, schemes that do not adopt KASE cannot achieve the same level of fine-grained and flexible data access control. Thus, our scheme attains comprehensive security while ensuring decentralized operation and self-sovereign data management.

7. Conclusions

The proposed integration allows data owners, data users, and fog nodes to independently manage their identities and cryptographic credentials without reliance on a TTP. Security verification through informal analysis, the Real-or-Random model, and the AVISPA tool confirmed resistance to major network attacks, including replay, impersonation, and man-in-the-middle scenarios. Moreover, implementation results using the MIRACL library demonstrate that the proposed scheme achieves strong security with only moderate computational overhead compared with existing methods. Overall, the proposed scheme achieves secure authentication, fine-grained access control, and data self-sovereignty for industrial IoT networks. The proposed scheme provides a promising foundation for building scalable and trustworthy IIoT infrastructures in next-generation industrial ecosystems.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Botta, A.; De Donato, W.; Persico, V.; Pescapé, A. Integration of cloud computing and Internet of Things: A survey. Future Gener. Comput. Syst. 2016, 56, 684–700. [Google Scholar] [CrossRef]
  2. Hu, P.; Dhelim, S.; Ning, H.; Qiu, T. Survey on fog computing: Architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 2017, 98, 27–42. [Google Scholar] [CrossRef]
  3. Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the IEEE Symposium on Security and Privacy 2025, Berkeley, CA, USA, 14–17 May 2020; IEEE Computer Societ: Washington, DC, USA, 2000; pp. 44–55. [Google Scholar]
  4. Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G. Public key encryption with keyword search. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 506–522. [Google Scholar]
  5. Li, J.; Lin, X.; Zhang, Y.; Han, J. KSF-OABE: Outsourced attributebased encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 2017, 10, 715–725. [Google Scholar] [CrossRef]
  6. Hoang, T.; Yavuz, A.A.; Guajardo, J. A secure searchable encryption framework for privacy-critical cloud storage services. IEEE Trans. Serv. Comput. 2021, 14, 1675–1689. [Google Scholar] [CrossRef]
  7. Yin, H.; Zhang, W.; Deng, H.; Qin, Z.; Li, K. An attribute-based searchable encryption scheme for cloud-assisted IIoT. IEEE Internet Things J. 2023, 10, 11014–11023. [Google Scholar] [CrossRef]
  8. Gao, H.; Huang, H.; Xue, L.; Xiao, F.; Li, Q. Blockchain-enabled finegrained searchable encryption with cloud–edge computing for electronic health records sharing. IEEE Internet Things J. 2023, 10, 18414–18425. [Google Scholar] [CrossRef]
  9. Cui, B.; Liu, Z.; Wang, L. Key-aggregate searchable encryption for group data sharing via cloud storage. IEEE Trans. Comput. 2016, 65, 2374–2385. [Google Scholar] [CrossRef]
  10. Niu, J.; Li, X.; Gao, J.; Han, Y. Blockchain-based anti-key-leakage key aggregation searchable encryption for IoT. IEEE Internet Things J. 2020, 7, 1502–1518. [Google Scholar] [CrossRef]
  11. Liu, Z.; Li, T.; Li, P.; Jia, C.; Li, J. Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 2018, 78, 778–788. [Google Scholar] [CrossRef]
  12. Rajasekaran, A.S.; Azees, M.; Al-Turjman, F. A comprehensive survey on blockchain technology. Sustain. Energy Technol. Assess. 2022, 52, 102039. [Google Scholar] [CrossRef]
  13. Babu, P.R.; Palaniswamy, B.; Reddy, A.G.; Odelu, V.; Kim, H.S. A survey on security challenges and protocols of electric vehicle dynamic charging system. Secur. Privacy 2022, 5, e210. [Google Scholar] [CrossRef]
  14. Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-Policy Attribute-Based Encryption. In Proceedings of the IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 20–23 May 2007; IEEE Computer Societ: Washington, DC, USA, 2007; pp. 321–334. [Google Scholar]
  15. Sporny, M.; Longley, D.; Sabadello, M.; Reedm, D.; Steele, O.; Allen, C. Decentralized Identifiers (DIDs) v1.1, W3C Proposed Recommendation, July 2025. Available online: https://www.w3.org/TR/did-1.1/ (accessed on 3 September 2025).
  16. Abdalla, M.; Fouque, P.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Public Key Cryptography—PKC 2005, Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, 23–26 January 2005; Lecture Notes in Computer Science (LNCS); Springer: Berlin/Heidelberg, Germany, 2005; pp. 65–84. [Google Scholar]
  17. Automated Validation of Internet Security Protocols and Applications. Available online: https://people.irisa.fr/Thomas.Genet/span/ (accessed on 3 September 2025).
  18. MIRACL Cryptographic SDK. Available online: https://github.com/miracl/MIRACL (accessed on 19 August 2025).
  19. Shuai, M.; Xiong, L.; Wang, C.; Yu, N. A secure authentication scheme with forward secrecy for Industrial Internet of Things using Rabin cryptosystem. Comput. Commun. 2020, 160, 215–227. [Google Scholar] [CrossRef]
  20. Srinivas, J.; Das, A.K.; Wazid, M.; Kumar, N. Anonymous lightweight chaotic map-based authenticated key agreement protocol for Industrial Internet of Things. IEEE Trans. Depend. Secure Comput. 2018, 17, 1133–1146. [Google Scholar] [CrossRef]
  21. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Depend. Secure Comput. 2017, 17, 391–406. [Google Scholar] [CrossRef]
  22. Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Giri, D. Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture. In Proceedings of the 5th International Conference on Mathematics and Computing, Bhubaneswar, India, 6–9 February 2019; pp. 1–18. [Google Scholar]
  23. Mubarakali, A. Healthcare services monitoring in cloud using secure and robust healthcare-based BLOCKCHAIN (SRHB) approach. Mobile Netw. Appl. 2020, 25, 1330–1337. [Google Scholar] [CrossRef]
  24. Park, K.; Park, Y. MIoT-CDPS: Complete decentralized privacy-preserving scheme for medical internet of things. Internet Things 2024, 27, 101250. [Google Scholar] [CrossRef]
  25. Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  26. Eddine, M.S.; Ferrag, M.A.; Friha, O.; Maglaras, L. EASBF:An efficient authentication scheme over blockchain for fog computing enabled Internet of Vehicles. J. Inf. Secur. Appl. 2021, 59, 102802. [Google Scholar]
  27. Tomar, A.; Tripathi, S. Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. Clust. Comput. 2022, 25, 451–468. [Google Scholar] [CrossRef]
  28. Zhang, J.; Yang, Y.; Liu, X.; Ma, J. An efficient blockchain-based hierarchical data sharing for healthcare Internet of Things. IEEE Trans. Ind. Inform. 2022, 18, 7139–7150. [Google Scholar] [CrossRef]
  29. Jia, X.; Luo, M.; Wang, H.; Shen, J.; He, D. A blockchain-assisted privacy-aware authentication scheme for Internet of Medical Things. IEEE Internet Things J. 2022, 9, 21838–21850. [Google Scholar] [CrossRef]
  30. Karankar, N.; Seth, A. An IoT system for access control using blockchain and message queuing system. EURASIP J. Inf. Secur. 2025, 2025, 31. [Google Scholar] [CrossRef]
  31. Trivedi, H.S.; Patel, S.J. Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. Trans. Emerg. Telecommun. Technol. 2023, 34, 4. [Google Scholar] [CrossRef]
  32. Guo, Y.; Zhang, Z.; Guo, Y.; Xiong, P. BSRA: Blockchain-based secure remote authentication scheme for fog-enabled Internet of Things. IEEE Internet Things J. 2024, 11, 3348–3361. [Google Scholar] [CrossRef]
  33. Vangala, A.; Das, A.K.; Mitra, A.; Das, S.K.; Park, Y. Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 904–919. [Google Scholar] [CrossRef]
  34. Ponnuru, R.B.; Kumar, S.A.P.; Azab, M.; Alavalapati, G.R. BAAP-FIoT: Blockchain-Assisted Authentication Protocol for Fog-Enabled Internet of Things Environment. IEEE Internet Things J. 2025, 12, 15681–15696. [Google Scholar] [CrossRef]
  35. Lee, J.; Oh, J.; Kwon, D.; Kim, M.; Kim, K.; Park, Y. Blockchain-enabled key aggregate searchable encryption scheme for personal health record sharing with multidelegation. IEEE Internet Things J. 2024, 11, 17482–17494. [Google Scholar] [CrossRef]
  36. Boneh, D.; Franklin, M. Identity-Based Encryption from the Weil Pairing. In Proceedings of the CRYPTO: Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; pp. 213–229. [Google Scholar]
  37. Oheimb, D.V. The High-Level Protocol Specification Language HLPSL Developed in the EU Project AVISPA. Available online: https://www.davoh.de/cs/talks/AVISPA-HLPSL.pdf (accessed on 2 August 2025).
  38. Basin, D.; Modersheim, S.; Vigano, L. OFMC: A Symbolic Model Checker for Security Protocols. Int. J. Inf. Secur. 2005, 4, 181–208. [Google Scholar] [CrossRef]
  39. Turuani, M. The CL-Atse Protocol Analyser. In Proceedings of the RTA: International Conference on Rewriting Techniques and Applications, Seattle, WA, USA, 12–14 August 2006; pp. 277–286. [Google Scholar]
  40. Armando, A.; Compagna, L. SATMC: A SAT-Based Model Checker for Security Protocols. In Proceedings of the European Workshop on Logics in Artificial Intelligence, Lisbon, Portugal, 27–30 September 2004; pp. 730–733. [Google Scholar]
  41. Boichut, Y.; Ham, P.C.; Kouchnarenko, O. Automatic Verification of Security Protocols Using Approximations; INRIA: Rocquencourt, France, 2005; Research Report inria-00070291. [Google Scholar]
  42. Park, K. The AVISPA Simulation of Our Scheme. Available online: https://github.com/ISNPL/AVISPA_DADAC (accessed on 6 November 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.