4.8 Article

Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 13, 页码 10766-10778

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3050562

关键词

Internet of Things; Blockchain; Encryption; Authentication; Servers; Cloud computing; Task analysis; Access control; blockchain; fog computing; key management; resource authentication

资金

  1. National Key Research and Development Program of China [2017YFB0802000]
  2. NSF of China [61972159, 61572198, 61321064]
  3. Open Research Fund of Engineering Research Center of Software/Hardware Co-Design Technology and Application, Ministry of Education (East China Normal University)
  4. Fundamental Research Funds for the Central Universities
  5. Cloud Technology Endowed Professorship

向作者/读者索取更多资源

The deployment of fog computing can reduce overheads at cloud servers and improve user experience, but it also requires attention to security implications. This study introduces a novel fog system and proposes a blockchain-based group key management scheme to address secure key establishment and resource authentication. Simulation findings and secure analysis demonstrate the effectiveness of the proposed system.
There are a number of benefits associated with the deployment of fog computing, for example, by analyzing and computing data from Internet-of-Things (IoT) devices at the fog nodes reduce the bandwidth, computational, and storage overheads at the cloud servers and improve user quality of experience (e.g., due to reduced latency). However, there are also additional security implications and requirements. For example, secure keys are needed to establish secure channels among these distributed fog nodes. Therefore, to facilitate fog nodes in managing secure keys and establishing secure group channels, we present a novel fog system and propose a blockchain-based group key management scheme that builds on an earlier work. We also design a new resource authentication mechanism based on Proof of Work (PoW), and when deployed in our fog system facilitates resource authentication (i.e., a fog node in a fog system can evaluate the capability of a fog device's computing power before the device is permitted to enter the system). Findings from our simulations and secure analysis demonstrate the utility of our system.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据