MSKNP: Multistage Key Negotiation Protocol for IoT-Blockchain Environment

被引:4
作者
Diao, Zipeng [1 ]
Wang, Qian [1 ]
Gong, Bei [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Internet of Things (IoT); key negotiation; random oracle (RO) model; secure and performance balance; WIRELESS SENSOR NETWORKS; AUTHENTICATION PROTOCOL; SECURITY; INTERNET; THINGS;
D O I
10.1109/JIOT.2021.3140128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the Internet, the technical framework that integrates Internet of Things (IoT) and blockchain has gradually developed. However, how to ensure the secure with balanced performance of devices becomes a key issue. In this article, we design a new multistage session key negotiation protocols for the Internet of Things-blockchain environment by using "Agents." We transfer bilinear operations to Agents, which has strong computing capabilities. Based on this, the resource of IoT devices in the key negotiation process is reduced without simplifying bilinear pairing compute and making them more secure. The simplified BPR model and the random oracle model ID-BJM are used to test the security of requirements in different stages of the scheme, furthermore, theoretically analyze its performance overhead. This protocol can reduce the computing overhead of IoT devices in the key negotiation process under the premise of ensuring security.
引用
收藏
页码:11975 / 11984
页数:10
相关论文
共 25 条
[1]   A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography [J].
Al Hamid, Hadeal Abdulaziz ;
Rahman, Sk Md Mizanur ;
Hossain, M. Shamim ;
Almogren, Ahmad ;
Alamri, Atif .
IEEE ACCESS, 2017, 5 :22313-22328
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[5]  
[Anonymous], 2021, ETH AV BLOCK TIM CHA
[6]  
[Anonymous], 2009, INTERNET THINGS THIN
[7]  
Barbosa M., 2008, P ACM S INF COMP COM, P369
[8]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[9]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[10]   A survey of lightweight-cryptography implementations [J].
Eisenbarth, Thomas ;
Kumar, Sandeep ;
Paar, Christof ;
Poschmann, Axel ;
Uhsadel, Leif .
IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06) :522-533