Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains

被引:2
|
作者
Tacyildiz, Yasar Berkay [1 ]
Ermis, Orhan [2 ]
Gur, Gurkan [3 ]
Alagoz, Fatih [1 ]
机构
[1] Bogazici Univ, Dept Comp Engn, Istanbul, Turkey
[2] EURECOM, Sophia Antipolis, France
[3] Zurich Univ Appl Sci ZHAW, Winterthur, Switzerland
关键词
Group key agreement; Blockchain; Hyperledger fabric; IoT; EFFICIENT; PROTOCOL; IDENTIFICATION; SECURITY;
D O I
10.1007/978-3-030-61638-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic group key agreement (DGKA) protocols are one of the key security primitives to secure multiparty communications in decentralized and insecure environments while considering the instant changes in a communication group. However, with the ever-increasing number of connected devices, traditional DGKA protocols have performance challenges since each member in the group has to make several computationally intensive operations while verifying the keying materials to compute the resulting group key. To overcome this issue, we propose a new approach for DGKA protocols by utilizing Hyperledger Fabric framework as a blockchain platform. To this end, we migrate the communication and verification overhead of DGKA participants to the blockchain network in our developed scheme. This paradigm allows a flexible DGKA protocol that considers resource-constrained entities and trade-offs regarding distributed computation. According to our performance analysis, participants with low computing resources can efficiently utilize our protocol. Furthermore, we have demonstrated that our protocol has the same security features as other comparable protocols in the literature.
引用
收藏
页码:58 / 76
页数:19
相关论文
共 50 条
  • [1] A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
    Wen, Mi
    Lei, Jingsheng
    Tang, Zhong
    Tian, Xiuxia
    Chen, Kefei
    Qiu, Weidong
    [J]. WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 413 - +
  • [2] A resource-constrained group key agreement protocol for imbalanced wireless networks
    Tseng, Yuh-Min
    [J]. COMPUTERS & SECURITY, 2007, 26 (04) : 331 - 337
  • [3] On The Logical Verification of a Group Key Agreement Protocol for Resource Constrained Mobile Devices
    Li, Yue
    Newe, Thomas
    [J]. 2007 AUSTRALASIANTELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE, 2007, : 98 - 102
  • [4] Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT
    Hsu, Chingfang
    Harn, Lein
    Xia, Zhe
    Zhao, Zhuo
    Xu, Hang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2403 - 2417
  • [5] Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT
    Chingfang Hsu
    Lein Harn
    Zhe Xia
    Zhuo Zhao
    Hang Xu
    [J]. Wireless Personal Communications, 2023, 129 : 2403 - 2417
  • [6] Public Blockchains for Resource-Constrained IoT Devices-A State-of-the-Art Survey
    Khor, Jing Huey
    Sidorov, Michail
    Woon, Peh Yee
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) : 11960 - 11982
  • [7] Reliable Group Communication for Dynamic and Resource-Constrained Environments
    Mayes, Ken
    Ortiz, Juan Carlos Garcia
    Emiedes, Emili
    Beyer, Stefan
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 14 - 18
  • [8] Enhancing IoT security using lightweight key management with PRESENT for resource-constrained devices
    Ohal, Hemlata Sandip
    Fatangare, Mrunal Pravinkumar
    Aware, Mrunal Swapnil
    Nehete, Pallavi Utkarsh
    Dongre, Nita Ganesh
    Kothoke, Priyanka M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 879 - 888
  • [9] A Full-Healing Key Distribution Scheme for Resource-Constrained Devices
    Messai, Sarra
    Messai, Mohamed-Lamine
    Seba, Hamida
    Aliouat, Zibouda
    [J]. 2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 2019,
  • [10] SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices
    Bejder, Emil
    Mathiasen, Adam Krog
    De Donno, Michele
    Dragoni, Nicola
    Fafoutis, Xenofon
    [J]. 2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,