Blockchain-Based Secure Key Management for Mobile Edge Computing

被引:37
作者
Li, Jiaxing [1 ]
Wu, Jigang [1 ]
Chen, Long [1 ]
Li, Jin [2 ]
Lam, Siew-Kei [3 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Blockchain; Security; key management; group communication; mobile edge computing;
D O I
10.1109/TMC.2021.3068717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) is a promising edge technology to provide high bandwidth and low latency shared services and resources to mobile users. However, the MEC infrastructure raises major security concerns when the shared resources involve sensitive and private data of users. This paper proposes a novel blockchain-based key management scheme for MEC that is essential for ensuring secure group communication among the mobile devices as they dynamically move from one subnetwork to another. In the proposed scheme, when a mobile device joins a subnetwork, it first generates lightweight key pairs for digital signature and communication, and broadcasts its public key to neighbouring peer users in the subnetwork blockchain. The blockchain miner in the subnetwork packs all the public key of mobile devices into a block that will be sent to other users in the subnetwork. This enables the mobile device to communicate with its peers in the subnetwork by encrypting the data with the public key stored in the blockchain. When the mobile device moves to another subnetwork in the tree network, all the mobile devices of the new subnetwork can quickly verify its identity by checking its record in the local or higher hierarchy subnetwork blockchain. Furthermore, when the mobile device leaves the subnetwork, it does not need to do anything and its records will remain in the blockchain which is an append-only database. Theoretical security analysis shows that the proposed scheme can defend against the 51 percent attack and malicious entities in the blockchain network utilizing Proof-of-Work consensus mechanism. Moreover, the backward and forward secrecy is also preserved. Experimental results demonstrate that the proposed scheme outperforms two baselines in terms of computation, communication and storage.
引用
收藏
页码:100 / 114
页数:15
相关论文
共 39 条
[21]  
MERKLE RC, 1988, LECT NOTES COMPUT SC, V293, P369
[22]   A survey of key management schemes in multi-phase wireless sensor networks [J].
Messai, Mohamed-Lamine ;
Seba, Hamida .
COMPUTER NETWORKS, 2016, 105 :60-74
[23]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[24]  
Mittra S., 1997, Computer Communication Review, V27, P277, DOI 10.1145/263109.263179
[25]  
Nakamoto S., 2008, BITCOIN PEER TO PEER
[26]   Dynamic balanced key tree management for secure multicast communications [J].
Ng, Wee Hock Desmond ;
Howarth, Michael ;
Sun, Zhili ;
Cruickshank, Haitham .
IEEE TRANSACTIONS ON COMPUTERS, 2007, 56 (05) :590-605
[27]   Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree [J].
Rao, Lu ;
Zhang, Hua ;
Tu, Tengfei .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) :451-463
[28]  
Roetteler Martin, 2017, Advances in Cryptology - ASIACRYPT 2017. 23rd International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings: LNCS 10625, P241, DOI 10.1007/978-3-319-70697-9_9
[29]   Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges [J].
Roman, Rodrigo ;
Lopez, Javier ;
Mambo, Masahiro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :680-698
[30]   Improved group key management region based cluster protocol in cloud [J].
Salma, B. Umi ;
Lawrence, A. Arul .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5) :11699-11711