Public-Key Reinforced Blockchain Platform for Fog-IoT Network System Administration

被引:3
|
作者
Baucas, Marc Jayson [1 ]
Spachos, Petros [1 ]
Plataniotis, Konstantinos N. [2 ]
机构
[1] Univ Guelph, Sch Engn, Guelph, ON N1G 2W1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Blockchains; Security; Servers; Internet of Things; Cryptography; Public key; Edge computing; Fog computing; Fog-IoT network; Internet of Things (IoT); permissioned blockchain; privacy; security; SECURITY; INTERNET; CHALLENGES; PRIVACY; ARCHITECTURE; REQUIREMENTS; ISSUES;
D O I
10.1109/JIOT.2021.3104740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of embedded devices that connect to a wireless network has been growing for the past decade. This interaction creates a network of Internet-of-Things (IoT) devices where data travel continuously. With the increase of devices and the need for the network to extend via fog computing, we have fog-based IoT networks. However, with more endpoints introduced to it, the network becomes open to malicious attackers. This work attempts to protect fog-based IoT networks by creating a platform that secures the endpoints through public-key encryption. The servers are allowed to mask the data packets shared within the network. To be able to track all of the encryption processes, we incorporated the use of permissioned blockchains. This technology completes the security layer by providing an immutable and automated data structure to function as a hyper ledger for the network. Each data transaction incorporates a handshake mechanism with the use of a public-key pair. This design guarantees that only devices that have proper access through the keys can use the network. Hence, management is made convenient and secure. The implementation of this platform is through a wireless server-client architecture to simulate the data transactions between devices. The conducted qualitative tests provide an in-depth feasibility investigation on the network's levels of security. The results show the validity of the design as a means of fortifying the network against endpoint attacks.
引用
收藏
页码:22366 / 22374
页数:9
相关论文
共 50 条
  • [21] Decentralizing IoT Public-Key Storage using Distributed Ledger Technology
    Dreyer, Julian
    Toenjes, Ralf
    Aschenbruck, Nils
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 172 - 177
  • [22] Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing
    Lei, Kai
    Du, Maoyu
    Huang, Jiyue
    Jin, Tong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) : 252 - 262
  • [23] Efficient and verifiable keyword search over public-key ciphertexts based on blockchain
    Han, Min
    Xu, Peng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [24] Public-Key Management System using Hamming Distance for Mobile Ad Hoc Network
    Lee, Seok-Lae
    Song, Joo-Seok
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 172 - 180
  • [25] A Group-Based NTRU-Like Public-Key Cryptosystem for IoT
    Shuai, Li
    Xu, Haitao
    Miao, Li
    Zhou, Xianwei
    IEEE ACCESS, 2019, 7 : 75732 - 75740
  • [26] Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems
    Chen, Tong
    Zhang, Lei
    Choo, Kim-Kwang Raymond
    Zhang, Rui
    Meng, Xinyu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10766 - 10778
  • [27] A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT
    Xiong, Hu
    Yao, Tianang
    Wang, Hanxiao
    Feng, Jun
    Yu, Shui
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 401 - 418
  • [28] Public-key based security scheme for wireless sensor network
    Chen, Jiann-Liang
    Lai, Yin-Fu
    Lu, Hsi-Feng
    Kuo, Quan-Cheng
    2008 IEEE RADIO AND WIRELESS SYMPOSIUM, VOLS 1 AND 2, 2008, : 255 - 258
  • [29] Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system
    Babu, Erukala Suresh
    Rao, Mekala Srinivasa
    Swain, Gandharba
    Nikhath, A. Kousar
    Kaluri, Rajesh
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (05)
  • [30] CRYPTANALYSIS OF A PUBLIC-KEY SYSTEM BASED ON DIOPHANTINE EQUATIONS
    CUSICK, TW
    INFORMATION PROCESSING LETTERS, 1995, 56 (02) : 73 - 75