Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains

被引:2
|
作者
Tacyildiz, Yasar Berkay [1 ]
Ermis, Orhan [2 ]
Gur, Gurkan [3 ]
Alagoz, Fatih [1 ]
机构
[1] Bogazici Univ, Dept Comp Engn, Istanbul, Turkey
[2] EURECOM, Sophia Antipolis, France
[3] Zurich Univ Appl Sci ZHAW, Winterthur, Switzerland
关键词
Group key agreement; Blockchain; Hyperledger fabric; IoT; EFFICIENT; PROTOCOL; IDENTIFICATION; SECURITY;
D O I
10.1007/978-3-030-61638-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic group key agreement (DGKA) protocols are one of the key security primitives to secure multiparty communications in decentralized and insecure environments while considering the instant changes in a communication group. However, with the ever-increasing number of connected devices, traditional DGKA protocols have performance challenges since each member in the group has to make several computationally intensive operations while verifying the keying materials to compute the resulting group key. To overcome this issue, we propose a new approach for DGKA protocols by utilizing Hyperledger Fabric framework as a blockchain platform. To this end, we migrate the communication and verification overhead of DGKA participants to the blockchain network in our developed scheme. This paradigm allows a flexible DGKA protocol that considers resource-constrained entities and trade-offs regarding distributed computation. According to our performance analysis, participants with low computing resources can efficiently utilize our protocol. Furthermore, we have demonstrated that our protocol has the same security features as other comparable protocols in the literature.
引用
收藏
页码:58 / 76
页数:19
相关论文
共 50 条
  • [31] Dynamic Soundness in Resource-Constrained Workflow Nets
    Martos-Salgado, Maria
    Rosa-Velardo, Fernando
    [J]. FORMAL TECHNIQUES FOR DISTRIBUTED SYSTEMS, 2011, 6722 : 259 - 273
  • [32] An Authentication Client Proxy Mechanism for Resource-Constrained Devices
    Ohba, Yoshihiro
    Kanda, Mitsuru
    [J]. 2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
  • [33] Jini lookup service for resource-constrained mobile devices
    Kim, CH
    Oh, M
    Choi, H
    [J]. PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 1575 - 1578
  • [34] Efficient Pattern Detection in Extremely Resource-Constrained Devices
    Zoumboulakis, Michael
    Roussos, George
    [J]. 2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 10 - +
  • [35] A Study of Emergency Siren Recognition on Resource-Constrained Devices
    Caetano dos Santos, Davi Francisco
    Boccato, Levy
    [J]. INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 154 - 168
  • [36] Runtime Classification of Mobile Malware for Resource-Constrained Devices
    Milosevic, Jelena
    Malek, Miroslaw
    Ferrante, Alberto
    [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215
  • [37] Resource-Constrained Neural Architecture Search on Edge Devices
    Lyu, Bo
    Yuan, Hang
    Lu, Longfei
    Zhang, Yunye
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01): : 134 - 142
  • [38] A Survey on Federated Learning for Resource-Constrained IoT Devices
    Imteaj, Ahmed
    Thakker, Urmish
    Wang, Shiqiang
    Li, Jian
    Amini, M. Hadi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 1 - 24
  • [39] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [40] Resource-adaptive Control for Resource-constrained Robot Using Dynamic Reconfiguration of FPGA
    Kim, Byung Hwa
    [J]. WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, 2010, : 180 - 185