Public-Key Reinforced Blockchain Platform for Fog-IoT Network System Administration

被引:3
|
作者
Baucas, Marc Jayson [1 ]
Spachos, Petros [1 ]
Plataniotis, Konstantinos N. [2 ]
机构
[1] Univ Guelph, Sch Engn, Guelph, ON N1G 2W1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Blockchains; Security; Servers; Internet of Things; Cryptography; Public key; Edge computing; Fog computing; Fog-IoT network; Internet of Things (IoT); permissioned blockchain; privacy; security; SECURITY; INTERNET; CHALLENGES; PRIVACY; ARCHITECTURE; REQUIREMENTS; ISSUES;
D O I
10.1109/JIOT.2021.3104740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of embedded devices that connect to a wireless network has been growing for the past decade. This interaction creates a network of Internet-of-Things (IoT) devices where data travel continuously. With the increase of devices and the need for the network to extend via fog computing, we have fog-based IoT networks. However, with more endpoints introduced to it, the network becomes open to malicious attackers. This work attempts to protect fog-based IoT networks by creating a platform that secures the endpoints through public-key encryption. The servers are allowed to mask the data packets shared within the network. To be able to track all of the encryption processes, we incorporated the use of permissioned blockchains. This technology completes the security layer by providing an immutable and automated data structure to function as a hyper ledger for the network. Each data transaction incorporates a handshake mechanism with the use of a public-key pair. This design guarantees that only devices that have proper access through the keys can use the network. Hence, management is made convenient and secure. The implementation of this platform is through a wireless server-client architecture to simulate the data transactions between devices. The conducted qualitative tests provide an in-depth feasibility investigation on the network's levels of security. The results show the validity of the design as a means of fortifying the network against endpoint attacks.
引用
收藏
页码:22366 / 22374
页数:9
相关论文
共 50 条
  • [41] A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
    Luo, Yurong
    You, Wei
    Shang, Chao
    Ren, Xiongpeng
    Cao, Jin
    Li, Hui
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 139 (02): : 2237 - 2260
  • [42] Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
    Anada, Hiroaki
    Kanaoka, Akira
    Matsuzaki, Natsume
    Watanabe, Yohei
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (01) : 15 - 38
  • [43] Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
    Hiroaki Anada
    Akira Kanaoka
    Natsume Matsuzaki
    Yohei Watanabe
    International Journal of Information Security, 2020, 19 : 15 - 38
  • [44] Public-key system using DNA as a one-way function for key distribution
    Tanaka, K
    Okamoto, A
    Saito, I
    BIOSYSTEMS, 2005, 81 (01) : 25 - 29
  • [45] A Framework for Platform-Agnostic Blockchain and IoT Based Insurance System
    Guruprakash, J.
    Tokmakov, Dimitar
    Krithika, L. B.
    Koppu, Srinivas
    Perumal, R. Srinivasa
    Bekyarova-Tokmakova, Anna
    Milev, Mihail
    IEEE ACCESS, 2024, 12 : 64079 - 64102
  • [46] Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT
    Xu, Peng
    Tang, Xiaolan
    Wang, Wei
    Jin, Hai
    Yang, Laurence T.
    IEEE ACCESS, 2017, 5 : 24775 - 24784
  • [47] Random Seed Generation For IoT Key Generation and Key Management System Using Blockchain
    Choi, Jungyong
    Shin, WoonSeob
    Kim, Jonghyun
    Kim, Ki-Hyung
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 663 - 665
  • [48] CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments
    Alharbi, Fatemah
    Alrawais, Arwa
    Bin Rabiah, Abdulrahman
    Richelson, Silas
    Abu-Ghazaleh, Nael
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 609 - 626
  • [49] An improved public-key cipher system based upon diophantine equation
    Shaarawy, M
    Abd Rabou, F
    Zorkta, H
    COMPUTERS & INDUSTRIAL ENGINEERING, 1998, 35 (3-4) : 515 - 518
  • [50] A generalization of Paillier’s public-key system with applications to electronic voting
    Ivan Damgård
    Mads Jurik
    Jesper Buus Nielsen
    International Journal of Information Security, 2010, 9 : 371 - 385