HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT

被引:27
作者
Wan, Zhiguo [1 ]
Liu, Wei [2 ]
Cui, Hui [3 ,4 ]
机构
[1] Zhejiang Lab, Hangzhou 311121, Zhejiang, Peoples R China
[2] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266510, Shandong, Peoples R China
[3] Murdoch Univ, Discipline Informat Technol Math & Stat, Perth, WA 6150, Australia
[4] CSIRO, Data61, Melbourne, ACT 2601, Australia
基金
中国国家自然科学基金;
关键词
Blockchain; IoT; key management; identity-based signature; SECURE;
D O I
10.1109/TDSC.2022.3152797
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-of-Things enables interconnection of billions of devices, which perform autonomous operations and collect various types of data. These things, along with their generated huge amount of data, need to be handled efficiently and securely. Centralized solutions are not desired due to security concerns and scalability issue. In this article, we propose HIBEChain, a hierarchical blockchain system that realizes scalable and accountable management of IoT devices and data. HIBEChain consists of multiple permissioned blockchains that form a hierarchical tree structure. To support the hierarchical structure of HIBEChain, we design a decentralized hierarchical identity-based signature (DHIBS) scheme, which enables IoT devices to use their identities as public keys. Consequently, HIBEChain achieves high scalability through parallel processing as blockchain sharding schemes, and it also implements accountability by use of identity-based keys. Identity-based keys not only make HIBEChain more user-friendly, they also allow private key recovery by validators when necessary. We provide detailed analysis of its security and performance, and implement HIBEChain based on Ethereum source code. Experiment results show that a 6-ary, (7,10)-threshold, 4-level HIBEChain can achieve 32,000 TPS, and it needs only 9 seconds to confirm a transaction.
引用
收藏
页码:1286 / 1301
页数:16
相关论文
共 38 条
[1]  
Androulaki C., 2016, HYPERLEDGER FABRIC P
[2]  
[Anonymous], 2015, DRAFT COPY ADV REV
[3]  
Baek J, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P124
[4]  
Bahga A, 2016, J. Softw. Eng. Appl., V9, P533, DOI DOI 10.4236/JSEA.2016.910036
[5]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[6]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[7]   Towards Better Availability and Accountability for IoT Updates by means of a Blockchain [J].
Boudguiga, Aymen ;
Bouzerna, Nabil ;
Granboulan, Louis ;
Olivereau, Alexis ;
Quesnel, Flavien ;
Roger, Anthony ;
Sirdey, Renaud .
2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, :50-58
[8]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[9]  
Chow SSM, 2004, LECT NOTES COMPUT SC, V3269, P480
[10]   Centrally Banked Cryptocurrencies [J].
Danezis, George ;
Meiklejohn, Sarah .
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,