A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing

被引:53
作者
Cheng, Guanjie [1 ]
Chen, Yan [1 ]
Deng, Shuiguang [1 ]
Gao, Honghao [2 ]
Yin, Jianwei [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[2] Shanghai Univ, Sch Comp Engn & Sci, Shanghai 200444, Peoples R China
基金
美国国家科学基金会;
关键词
Authentication; Internet of Things; Servers; Edge computing; Blockchain; Cryptography; Security; cross-domain authentication; edge computing; Internet of Things (IoT); mutual authentication; PRIVACY;
D O I
10.1109/TCSS.2021.3056540
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever-increasing requirements of delay-sensitive and mission-critical applications, it becomes a popular research trend to incorporate edge computing in the Internet of Things (IoT) to mitigate the pressure of traditional cloud-based IoT architecture. Edge computing delivers real-time computations and communications for IoT devices by leveraging edge servers deployed close to users, which creates a collaborative edge computing (CEC) paradigm. The capacity of edge servers is beneficial but risky, as vulnerable servers can be exploited to conduct surveillance or perform other nefarious activities. Besides, fake IoT devices would bring security threats and compromise the IoT system. This highlights the necessity of designing a secure and efficient mutual authentication scheme for CEC. In this direction, related works have proposed various authentication mechanisms, but most of them are found unfit due to the absence of decentralization, anonymity, and mobility. Motivated by this fact, we propose a blockchain-based mutual authentication scheme that bridges these gaps. Specifically, blockchain, certificateless cryptography, elliptic curve cryptography, and pseudonym-based cryptography are integrated into our scheme to provide mutual authentication between edge servers and IoT devices. Except for static conditions, both intraedge and interedge authentication are considered. Besides, we elaborate on the key generation procedures and design a session key negotiation mechanism. Extensive experiments and security analyses have been conducted to show the feasibility of the proposed scheme.
引用
收藏
页码:146 / 158
页数:13
相关论文
共 27 条
[1]  
Almadhoun R, 2018, I C COMP SYST APPLIC
[2]  
Arun M, 2020, IEEE CONF COMPUT, P37, DOI 10.1109/INFOCOMWKSHPS50562.2020.9162915
[3]  
Bao Z., 2018, ARXIV180602008
[4]   A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment [J].
Ben Amor, Arij ;
Abid, Mohamed ;
Meddeb, Aref .
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, :1225-1231
[5]   An Auction-Based Incentive Mechanism with Blockchain for IoT Collaboration [J].
Cheng, Guanjie ;
Deng, Shuiguang ;
Xiang, Zhengzhe ;
Chen, Yan ;
Yin, Jianwei .
2020 IEEE 13TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2020), 2020, :17-26
[6]  
Chow SSM, 2006, LECT NOTES COMPUT SC, V3958, P508
[7]  
Clack C. D., 2016, ARXIV161204496
[8]   A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN [J].
Cui, Zhihua ;
Xue, Fei ;
Zhang, Shiqiang ;
Cai, Xingjuan ;
Cao, Yang ;
Zhang, Wensheng ;
Chen, Jinjun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) :241-251
[9]  
Das R, 2018, IEEE ICC
[10]   Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce [J].
Deng, Shuiguang ;
Cheng, Guanjie ;
Zhao, Hailiang ;
Gao, Honghao ;
Yin, Jianwei .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (01)