Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough

被引:11
作者
Koe, Arthur Sandor Voundi [1 ,2 ]
Ai, Shan [1 ]
Huang, Pengfei [1 ]
Yan, Anli [3 ]
Tang, Juan [1 ]
Chen, Qi [1 ]
Mo, Kanghua [1 ]
Jie, Wanqing [1 ]
Zhang, Shiwen [4 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Peoples R China
[2] Pazhou Lab, Guangzhou 510330, Peoples R China
[3] Hainan Univ, Sch Cyberspace Secur, Sch Cryptol, Haikou 570228, Hainan, Peoples R China
[4] Hunan Univ Sci & Technol, Coll Comp Sci & Engn, Xiangtan 411201, Peoples R China
基金
中国国家自然科学基金;
关键词
Anonymity; Internet of things; Blockchain; Gateway; Eclipse attack; INTERNET;
D O I
10.1016/j.ins.2022.05.054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last decade, there has been extensive research into the security and privacy of blockchain technology, from the use of ring signatures to ring confidential transactions. Although existing cryptographic methods perform well on traditional blockchain architectures, they do not provide complete privacy in a hierarchical blockchain architecture for Internet of Things (IoT) devices. The blockchain technology is centered at the gateway layer in the hierarchical blockchain architecture, which can easily reveal the transaction sender using network traffic information, thereby violating the sender's anonymity. Furthermore, the gateway can perform eclipse attacks against transaction senders on a case-by-case basis. To this end, this paper proposes a novel security and privacy blockchain protocol that is better suited to the hierarchical blockchain architecture and thus more appropriate for the IoT environment. Specifically, it leverages the relationship among IoT devices at the perception layer of the hierarchical blockchain architecture for IoT, and constructs an overlay social IoT network by exploiting devices' multi-agent capabilities. Furthermore, circuit establishment based on multilayered encryption is applied to conceal the transaction propagation path through the overlay social IoT. Theoretical analysis shows that our novel protocol is flexible, evades a malicious gateway, and is secure under the decisional DiffieHellman assumption.(c) 2022 Published by Elsevier Inc.
引用
收藏
页码:60 / 71
页数:12
相关论文
共 47 条