Abstract
In the current background of highly digitized enterprise information systems, insider threats have become the main source of risk for enterprise network security. This paper proposes an internal threat authentication and traceability technology based on a cryptographic key-based identity authentication system. By integrating asymmetric keys, behavior signatures, and log analysis, the system binds user identity with actions and enables full-process traceability. After deploying the system in a real enterprise environment, simulation tests show that the authentication system identifies malicious behaviors such as permission abuse, phishing attacks, and script injection with a success rate as low as 1.1% to 3.3%, effectively preventing such operations. At the same time, the success rate of normal user authentication is as high as 99.9%, reflecting its high reliability. Through behavior chain structure recording and abnormal behavior map identification mechanism, the system can trace malicious operation paths within seconds, greatly improving emergency response efficiency. After the system is deployed, the average data leaked by enterprises in information leakage incidents has dropped from 512MB to 37MB, effectively shortening the life cycle of the attack chain. The analysis of security return on investment shows that the integrated key authentication system can maintain a return rate of more than 60% under medium and high intensity investment, and has good economic benefits and popularization prospects.
References
Wang, K., Hu, C., and Shan, C. “Process-oriented security assessment of network services,” Computer Networks, vol. 264, pp. 111225, 2025.
Zhong, Y., and Li, X. “Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background,” Egyptian Informatics Journal, vol. 30, pp. 100673, 2025.
Abdussami, M., Dwivedi, S. K., Al-Shehari, T., Saravanan, P., Kadrie, M., Alfakih, T., Alsalman, H., and Amin, R. “DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation,” Computers and Electrical Engineering, vol. 120, pp. 109696, 2024.
Ali, H., and Ahmed, I. “LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems,” Computers & Security, vol. 140, pp. 103770, 2024.
Babu, P. R., Kumar, S. A. P., Reddy, A. G., and Das, A. K. “Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges,” Computer Science Review, vol. 54, pp. 100676, 2024.
Braeken, A. “Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM,” Future Generation Computer Systems, vol. 166, pp. 107634, 2025.
Cai, J., Zhang, Z., Li, M., and Li, N. “A group authenticated key agreement protocol for secure communication between distributed power terminal devices,” Computers and Electrical Engineering, vol. 118, pp. 109214, 2024.
Chen, Y., Xin, Z., Zhang, B., and Jia, J. “A security authentication and key agreement scheme for railway space-ground integrated network based on ideal lattice,” Journal of Network and Computer Applications, vol. 240, pp. 104194, 2025.
Cheng, Q., Ma, Y., Wei, F., and Li, X. “An efficient anonymous certificateless authentication and key agreement scheme for smart grids,” Computers and Electrical Engineering, vol. 124, pp. 110369, 2025.
Liu, S., Chen, L., Chen, L., Wang, Y., and Zhu, Y. “CLE-based Authenticated Key Agreement with PUF-Secured Key for Vehicle-to-Infrastructure,” Vehicular Communications, pp. 100942, 2025.
Wang, X., Xie, Y., Shui, D., and Ge, S. “An improved biometric authentication and key agreement scheme based on fuzzy extractor for Wireless Body Area Networks,” Journal of Information Security and Applications, vol. 91, pp. 104047, 2025.
Ghani, A., Jan, S. U., Chaudhry, S. A., Ahmad, R., Das, A. K., and Kim, D. H. “Enhancing security and trust using efficient privacy-preserving authentication in vehicular edge computing networks,” Vehicular Communications, vol. 54, pp. 100921, 2025.
Goswami, C., Basak, A., Ghosh, R., Adhikari, A., and Sarkar, P. “Lightweight authenticated key agreement scheme for IoMT network using generalized Chinese Remainder Theorem,” Computer Networks, vol. 263, pp. 111212, 2025.
Jin, C., Zhou, P., Chen, Z., Qin, W., Chen, G., Zhang, H., and Weng, J. “EPAKA: An efficient and privacy-preserving authenticated key agreement scheme based on physical security for VANET,” Vehicular Communications, vol. 50, pp. 100847, 2024.
Kuang, Y., Wu, Q., Chen, R., and Liu, X. “Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm,” Computer Standards & Interfaces, vol. 93, pp. 103981, 2025.
Kumar, P., Pal, A. K., and Islam, S. H. “2F-MASK-VSS: Two-factor mutual authentication and session key agreement scheme for video surveillance system,” Journal of Systems Architecture, vol. 153, pp. 103196, 2024.
Jin, D., Hu, Y., Chen, B., He, G., Chen, J., and Shen, Z. “TIAN: A time series Imaging Association Network for human abnormal behavior detection,” Information Fusion, vol. 118, pp. 102906, 2025.
Lee, T.-F., Ye, X., and Huang, W.-J. “Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones,” Journal of Information Security and Applications, vol. 87, pp. 103915, 2024.
Magara, T., and Zhou, Y. “EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment,” Cyber Security and Applications, vol. 3, pp. 100066, 2025.
Pan, G., Tan, H., Zheng, W., Vijayakumar, P., Wu, Q. M. J., and Sivaraman, A. “Three-factor authentication and key agreement protocol with collusion resistance in VANETs,” Journal of Information Security and Applications, vol. 90, pp. 104029, 2025.
Prajapat, S., Rana, A., Kumar, P., Das, A. K., and Susilo, W. “Privacy-preserving authentication protocol for user personal device security in Brain–Computer Interface,” Computer Standards & Interfaces, vol. 94, pp. 104009, 2025.
Surapaneni, P., Bojjagani, S., and Khan, M. K. “VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment,” Vehicular Communications, vol. 49, pp. 100822, 2024.
Thapliyal, S., Wazid, M., Singh, D. P., Das, A. K., and Islam, S. H. “Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system,” Journal of Systems Architecture, vol. 142, pp. 102937, 2023.
Tong, Q., Yin, L., Liu, Y., and Xu, J. “Append-only Authenticated Data Sets based on RSA accumulators for transparent log system,” Computer Standards & Interfaces, vol. 93, pp. 103978, 2025.
Ullah, S., Nasir, H. M., Kadir, K., Khan, A., Memon, A., Azhar, S., Khan, I., and Ashraf, M. “End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network,” Computers, Materials and Continua, vol. 82, no. 2, pp. 3223–3249, 2025.
Wang, M., and Wang, Z. “A distributed identity management and cross-domain authentication scheme for the Internet of Things,” Future Generation Computer Systems, vol. 169, pp. 107818, 2025.
Wang, X., Xie, Y., Shui, D., and Ge, S. “An improved biometric authentication and key agreement scheme based on fuzzy extractor for Wireless Body Area Networks,” Journal of Information Security and Applications, vol. 91, pp. 104047, 2025.
Xia, Y., Zhang, J., Man, K. L., and Dong, Y. “Handover Authenticated Key Exchange for Multi-access Edge Computing,” Journal of Network and Computer Applications, vol. 234, pp. 104071, 2025.
Yalçın, G. C., Kara, K., Edinsel, S., Kaygısız, E. G., Simic, V., and Pamucar, D. “Authentication system selection for performance appraisal in human resource management using an intuitionistic fuzzy CIMAS-ARLON model,” Applied Soft Computing, vol. 171, pp. 112786, 2025.
Yu, X., Wang, Y., and Huang, X. “Quantum-resistant ring signature-based authentication scheme against secret key exposure for VANETs,” Computer Networks, vol. 262, pp. 111213, 2025.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
