Blockchain-Based Secure Key Management for Mobile Edge Computing

被引:37
作者
Li, Jiaxing [1 ]
Wu, Jigang [1 ]
Chen, Long [1 ]
Li, Jin [2 ]
Lam, Siew-Kei [3 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Blockchain; Security; key management; group communication; mobile edge computing;
D O I
10.1109/TMC.2021.3068717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) is a promising edge technology to provide high bandwidth and low latency shared services and resources to mobile users. However, the MEC infrastructure raises major security concerns when the shared resources involve sensitive and private data of users. This paper proposes a novel blockchain-based key management scheme for MEC that is essential for ensuring secure group communication among the mobile devices as they dynamically move from one subnetwork to another. In the proposed scheme, when a mobile device joins a subnetwork, it first generates lightweight key pairs for digital signature and communication, and broadcasts its public key to neighbouring peer users in the subnetwork blockchain. The blockchain miner in the subnetwork packs all the public key of mobile devices into a block that will be sent to other users in the subnetwork. This enables the mobile device to communicate with its peers in the subnetwork by encrypting the data with the public key stored in the blockchain. When the mobile device moves to another subnetwork in the tree network, all the mobile devices of the new subnetwork can quickly verify its identity by checking its record in the local or higher hierarchy subnetwork blockchain. Furthermore, when the mobile device leaves the subnetwork, it does not need to do anything and its records will remain in the blockchain which is an append-only database. Theoretical security analysis shows that the proposed scheme can defend against the 51 percent attack and malicious entities in the blockchain network utilizing Proof-of-Work consensus mechanism. Moreover, the backward and forward secrecy is also preserved. Experimental results demonstrate that the proposed scheme outperforms two baselines in terms of computation, communication and storage.
引用
收藏
页码:100 / 114
页数:15
相关论文
共 39 条
[1]  
[Anonymous], 2014, Cryptography and Security Systems
[2]  
Ao L., 2016, ZTE Commun, V14, P21
[3]  
Baugher M., 2005, 4046 RFC
[4]  
Challal Yacine, 2018, 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), P187, DOI 10.1109/WETICE.2018.00043
[5]   Host mobility key management in dynamic secure group communication [J].
Daghighi, Babak ;
Kiah, Miss Laiha Mat ;
Iqbal, Salman ;
Rehman, Muhammad Habib Ur ;
Martin, Keith .
WIRELESS NETWORKS, 2018, 24 (08) :3009-3027
[6]   Distributed Group Key Management for Event Notification Confidentiality Among Sensors [J].
Esposito, Christian ;
Ficco, Massimo ;
Castiglione, Aniello ;
Palmieri, Francesco ;
De Santis, Alfredo .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) :566-580
[7]  
Gervais A., 2016, P 2016 ACM SIGSAC C, P3, DOI [DOI 10.1145/2976749, 10.1145/2976749.2978341, DOI 10.1145/2976749.2978341]
[8]  
Gharout S., 2008, International Journal of Network Security, V7, P142
[9]   An efficient key management scheme for user access control in outsourced databases [J].
Hong, Seungtae ;
Kim, Hyeong-Il ;
Chang, Jae-Woo .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017, 20 (03) :467-490
[10]   KeyChain: Blockchain-based Key Distribution [J].
Hu, Yifei ;
Xiong, Yan ;
Huang, Wenchao ;
Bao, Xianglin .
2018 4TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2018), 2018, :126-131