Blockchain-based cloud-fog collaborative smart home authentication scheme

被引:13
作者
Yang, Huan [1 ]
Guo, Yajun [1 ]
Guo, Yimin [2 ]
机构
[1] Cent China Normal Univ, Sch Comp Sci, Wuhan 430079, Hubei, Peoples R China
[2] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Fog computing; Blockchain; Smart home; Cloud-fog collaboration; COMPUTING-BASED INTERNET; KEY MANAGEMENT PROTOCOL; LIGHTWEIGHT; SECURITY; THINGS; SYSTEM;
D O I
10.1016/j.comnet.2024.110240
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of IoT technology, smart homes have emerged. At the same time, data security and privacy protection are also of great concern. However, the traditional centralized authentication scheme has defects such as single point of failure, poor scalability, center dependence, vulnerability to attacks, etc., and is not suitable for the distributed and dynamically changing smart home environment. Thus, many researchers have proposed decentralized authentication schemes based on blockchain technology. Although many characteristics of blockchain technology such as decentralization, non -tampering, and solving single point of failure have good application scenarios in authentication, the mature integration of the two applications has to be further explored. For example, the introduction of blockchain also brings security issues; the balance between security and performance in most blockchain-based authentication schemes remains to be investigated; and resource -constrained IoT devices tend to perform a large number of intensive computations, which is clearly inappropriate. Consequently, this paper introduces fog computing in blockchain-based authentication schemes, proposes a network architecture in which cloud and fog computing work together, and investigates the security and performance issues of authentication schemes under this architecture. Finally, formal and informal security analysis show that our scheme has multiple security properties, and our scheme has better performance than existing solutions.
引用
收藏
页数:15
相关论文
共 75 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing [J].
Abuhasel, Khaled Ali ;
Khan, Mohammad Ayoub .
IEEE ACCESS, 2020, 8 :117354-117364
[3]  
AbuNaser M, 2019, 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), P58, DOI [10.1109/jeeit.2019.8717441, 10.1109/JEEIT.2019.8717441]
[4]   A Blockchain-Enabled Multi-Settlement Quasi-Ideal Peer-to-Peer Trading Framework [J].
AlAshery, Mohamed Kareem ;
Yi, Zhehan ;
Shi, Di ;
Lu, Xiao ;
Xu, Chunlei ;
Wang, Zhiwei ;
Qiao, Wei .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) :885-896
[5]   Novel Security Models for IoT-Fog-Cloud Architectures in a Real-World Environment [J].
Aleisa, Mohammed A. ;
Abuhussein, Abdullah ;
Alsubaei, Faisal S. ;
Sheldon, Frederick T. .
APPLIED SCIENCES-BASEL, 2022, 12 (10)
[6]   Authentication in mobile cloud computing: A survey [J].
Alizadeh, Mojtaba ;
Abolfazli, Saeid ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Sakurai, Kouichi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :59-80
[7]  
[Anonymous], 2019, Clustering Methods for Big Data Analytics: Techniques, Toolboxes and Applications
[8]   Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment [J].
Bera, Basudeb ;
Chattaraj, Durbadal ;
Das, Ashok Kumar .
COMPUTER COMMUNICATIONS, 2020, 153 :229-249
[9]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[10]   A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT [J].
Chen, Chien-Ming ;
Liu, Shuangshuang ;
Li, Xuanang ;
Islam, S. K. Hafizul ;
Das, Ashok Kumar .
JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136