A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT

被引:3
作者
Zhang, Shiqiang [1 ]
Cao, Dongzhi [2 ]
机构
[1] Beijing Wuzi Univ, Sch Informat, Beijing 101149, Peoples R China
[2] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
关键词
Edge computing; Edge computing enabled IoT; Authentication; Key agreement; Provably; KEY EXCHANGE; INTERNET; SCHEME; THINGS;
D O I
10.1007/s11227-023-05696-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing server deployed at the edge of the network has promoted the development of the Internet of Things (IoT) but also brings some security problems. Traditional IoT security solutions have not met the requirements of the current rapid growth of equipment, real-time and lightweight. Therefore, the development of new authentication and key agreement is becoming an important means to solve the security problems of the IoT. To address this challenge, we propose an authentication framework for the edge computing-enabled IoT environment. This framework aims to facilitate the establishment of secure communication among devices and between devices and edge servers. This authentication framework achieves secure communication and identity verification among edge computing-enabled IoT devices and between devices and edge servers by incorporating a portion of the local private key during registration and leveraging a distributed blockchain network. Formal and informal security analyses of the proposed protocol show that the protocol effectively responds to numerous security threats while satisfying various security attributes. In addition, the study provides a comprehensive assessment of the computational and transmission overheads associated with the protocol. The results show that the protocol's commendable performance in terms of both computational efficiency and transmission cost-effectiveness.
引用
收藏
页码:6778 / 6808
页数:31
相关论文
共 37 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Al-Riyami SS., 2003, CERTIFICATELESS PUBL, DOI [10.1007/978-3-540-40061-5_29, DOI 10.1007/978-3-540-40061-5_29]
[3]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[4]   Blockchain for healthcare systems: Architecture, security challenges, trends and future directions [J].
Andrew, J. ;
Isravel, Deva Priya ;
Sagayam, K. Martin ;
Bhushan, Bharat ;
Sei, Yuichi ;
Eunice, Jennifer .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 215
[5]  
Bellare M, 2000, AUTHENTICATED KEY EX, DOI [10.1007/3-540-45539-6-11, DOI 10.1007/3-540-45539-6-11]
[6]   Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions [J].
Bhushan, Bharat ;
Sinha, Preeti ;
Sagayam, K. Martin ;
Andrew, J. .
COMPUTERS & ELECTRICAL ENGINEERING, 2021, 90
[7]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[8]   A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN [J].
Cui, Zhihua ;
Xue, Fei ;
Zhang, Shiqiang ;
Cai, Xingjuan ;
Cao, Yang ;
Zhang, Wensheng ;
Chen, Jinjun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) :241-251
[9]   Blockchain for Internet of Things: A Survey [J].
Dai, Hong-Ning ;
Zheng, Zibin ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8076-8094
[10]   Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Yannam, Animi Reddy ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2019, 7 :55382-55397