TY - JOUR
T1 - Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems
AU - Chen, Tong
AU - Zhang, Lei
AU - Choo, Kim Kwang Raymond
AU - Zhang, Rui
AU - Meng, Xinyu
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2021/7/1
Y1 - 2021/7/1
N2 - There are a number of benefits associated with the deployment of fog computing, for example, by analyzing and computing data from Internet-of-Things (IoT) devices at the fog nodes reduce the bandwidth, computational, and storage overheads at the cloud servers and improve user quality of experience (e.g., due to reduced latency). However, there are also additional security implications and requirements. For example, secure keys are needed to establish secure channels among these distributed fog nodes. Therefore, to facilitate fog nodes in managing secure keys and establishing secure group channels, we present a novel fog system and propose a blockchain-based group key management scheme that builds on an earlier work. We also design a new resource authentication mechanism based on Proof of Work (PoW), and when deployed in our fog system facilitates resource authentication (i.e., a fog node in a fog system can evaluate the capability of a fog device's computing power before the device is permitted to enter the system). Findings from our simulations and secure analysis demonstrate the utility of our system.
AB - There are a number of benefits associated with the deployment of fog computing, for example, by analyzing and computing data from Internet-of-Things (IoT) devices at the fog nodes reduce the bandwidth, computational, and storage overheads at the cloud servers and improve user quality of experience (e.g., due to reduced latency). However, there are also additional security implications and requirements. For example, secure keys are needed to establish secure channels among these distributed fog nodes. Therefore, to facilitate fog nodes in managing secure keys and establishing secure group channels, we present a novel fog system and propose a blockchain-based group key management scheme that builds on an earlier work. We also design a new resource authentication mechanism based on Proof of Work (PoW), and when deployed in our fog system facilitates resource authentication (i.e., a fog node in a fog system can evaluate the capability of a fog device's computing power before the device is permitted to enter the system). Findings from our simulations and secure analysis demonstrate the utility of our system.
KW - Access control
KW - Blockchain
KW - Fog computing
KW - Key management
KW - Resource authentication
UR - https://www.scopus.com/pages/publications/85099604714
U2 - 10.1109/JIOT.2021.3050562
DO - 10.1109/JIOT.2021.3050562
M3 - 文章
AN - SCOPUS:85099604714
SN - 2327-4662
VL - 8
SP - 10766
EP - 10778
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 13
M1 - 9319269
ER -