DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things

被引:2
|
作者
Chen, Jiahui [1 ]
Xiao, Hang [1 ]
Zheng, Yushan [2 ]
Hassan, Mohammad Mehedi [3 ]
Ianni, Michele [4 ]
Guzzo, Antonella [4 ]
Fortino, Giancarlo [4 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Peoples R China
[2] Shenzhen Customs, Informat Ctr, Shenzhen 518000, Peoples R China
[3] King Saud Univ, Coll Comp & Informat Sci, Informat Syst Dept, Riyadh 11543, Saudi Arabia
[4] Univ Calabria, Dept Informat Modeling Elect & Syst, I-87036 Arcavacata Di Rende, CS, Italy
基金
中国国家自然科学基金;
关键词
Internet of Things; Kerberos; Blockchain; Service security; BLOCKCHAIN;
D O I
10.1016/j.iot.2023.100871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Kerberos is a widely used authentication protocol that protects distributed services on the Internet of Things (IoT) and big data. In a distributed scenario, entities must prove their identity to a trusted third party using shared secrets, such as secret keys. Traditional schemes typically use a trusted central organization, like a Key Distribution Center, for identity authentication. However, Kerberos has some downsides, such as a single point of failure, vulnerability to replay attacks, and potential credential exposure, which can compromise system security. To address these problems, researchers have been working on various solutions, but most have their own drawbacks. In this paper, we propose a Decentralized Kerberos Secure Service-Management Protocol (DKSM) based on blockchain technology and Ciphertext-policy Attribute-based Encryption (CP-ABE) schema. Compared with existing protocols, DKSM fulfills decentralization, fine-grained access control with effective cost, and scalability simultaneously. DKSM uses AES and Fast Attribute-Based Encryption with Optimal Security (FABEO) as its cryptographic basis. We also discuss the security of DKSM and demonstrate how our protocol can defend against attacks. Finally, tests on the Ethereum testnet and FISCO consortium platform have shown that our designed protocol is efficient and cost-effective.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Secure Mobility Management using CoAP in the Internet of Things
    Oryema, Brian
    Lee, Byunghoon
    Park, Jongtae
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 514 - 524
  • [42] Flexible and Scalable Decentralized Identity Management for Industrial Internet of Things
    Bian, Yunqing
    Wang, Xin
    Jin, Jian
    Jiao, Zhenzhen
    Duan, Sisi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27058 - 27072
  • [43] Distributed Customer Service Management for Internet of Things
    Zhu, Shuren
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1618 - 1624
  • [44] A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things
    Kandi, Mohamed Ali
    Kouicem, Djamel Eddine
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1868 - 1873
  • [45] Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things
    Patil, Akash Suresh
    Hamza, Rafik
    Yan, Hongyang
    Hassan, Alzubair
    Li, Jin
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 331 - 338
  • [46] Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
    Almusaylim, Zahrah A.
    Alhumam, Abdulaziz
    Jhanjhi, N. Z.
    [J]. AD HOC NETWORKS, 2020, 101
  • [47] Trust and Mobility-Based Protocol for Secure Routing in Internet of Things
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    Jhanjhi, N. Z.
    Hossain, M. Shamim
    Yassine, Abdulsalam
    [J]. SENSORS, 2022, 22 (16)
  • [48] Secure Cloud Storage Service Using Bloom Filters for the Internet of Things
    Jeong, Junho
    Joo, Jong Wha J.
    Lee, Yangsun
    Son, Yunsik
    [J]. IEEE ACCESS, 2019, 7 : 60897 - 60907
  • [49] Secure Data Management in Internet-of-Things Based on Blockchain
    Thakker, Jenil
    Chang, Ikwhan
    Park, Younghee
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 190 - 194
  • [50] Group and hierarchical key management for secure communications in internet of things
    Karrothu, Aravind
    Norman, Jasmine
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)