4.5 Article

BPAF: Blockchain-Enabled Reliable and Privacy-Preserving Authentication for Fog-Based IoT Devices

期刊

IEEE CONSUMER ELECTRONICS MAGAZINE
卷 11, 期 2, 页码 88-96

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MCE.2021.3061808

关键词

Authentication; Public key; Blockchain; Reliability; Privacy; Consumer electronics; Servers

资金

  1. National Natural Science Foundation of China [61972037, 61402037, 61872041, U1836212]

向作者/读者索取更多资源

The development of IoT and fog computing has led to the need for various authentication mechanisms for IoT devices. Traditional PKI-based schemes face security and privacy issues due to centralization, hence blockchain-based authentication schemes have been proposed as a decentralized solution. However, existing blockchain solutions are not suitable for resource-constrained IoT devices in fog-based environments. To address these issues, a Blockchain-enabled reliable and Privacy-preserving Authentication for Fog-based IoT devices (BPAF) is proposed, providing efficient privacy-preserving and reliable authentication for fog nodes and full nodes.
The development of IoT and fog computing promotes various kinds of authentication mechanisms for IoT devices. Traditional IoT authentication schemes are based on Public Key Infrastructure (PKI) where a centralized certificate authority is introduced. To mitigate the security, privacy, and reliability issues bring from the centralization, some blockchain-based authentication schemes have been presented to achieve decentralized authentication. Unfortunately, they cannot be directly used under the fog-based IoT environment, which consists of resource-constrained IoT devices. To mitigate these issues, we present a Blockchain-enabled reliable, and Privacy-preserving Authentication for Fog-based IoT devices, named BPAF. BPAF achieves reliable authentication of fog nodes without violating the privacy of authenticated users during the authentication process. Security analysis and experimental evaluations show that BPAF achieves privacy-preserving and reliable authentication with high efficiency for both the fog nodes and full nodes participating in the authentication process.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET

Chuan Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Kai Ding, Ximeng Liu, Xiaojiang Du, Mohsen Guizani

Summary: This article presents a trust-based and privacy-preserving platoon recommendation scheme called TPPR, which enables potential user vehicles to avoid selecting malicious head vehicles and protects vehicle privacy. By utilizing truth discovery and authentication protocols, the security of the vehicle platoon system is improved.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Reliable and Privacy-Preserving Top-k Disease Matching Schemes for E-Healthcare Systems

Chang Xu, Ningning Wang, Liehuang Zhu, Chuan Zhang, Kashif Sharif, Huishu Wu

Summary: The integration of body sensors, cloud computing, and mobile communication technologies has greatly enhanced the development and accessibility of e-healthcare systems. The authors propose two reliable and privacy-preserving schemes for top-k disease matching, and simulations and security analyses demonstrate the effectiveness and privacy-preservation properties of these schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

EPDL: An efficient and privacy-preserving deep learning for crowdsensing

Chang Xu, Guoxie Jin, Liehuang Zhu, Chuan Zhang, Yu Jia

Summary: This paper proposes a non-interactive privacy-preserving deep learning scheme called EPDL, which allows efficient training of deep learning models while protecting the privacy of image data by utilizing the additive homomorphic properties of a cryptographic system.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2022)

Article Computer Science, Hardware & Architecture

Disease Prediction in Edge Computing: A Privacy-Preserving Technique for PHI Collection and Analysis

Liehuang Zhu, Chuan Zhang, Chang Xu, Wei Wang, Xiaojiang Du, Mohsen Guizani, Kashif Sharif

Summary: This article introduces an efficient and privacy-preserving disease prediction scheme using randomizable signature and matrices encryption technique. It outperforms the existing solution in terms of data privacy and user identity protection.

IEEE NETWORK (2022)

Article Computer Science, Information Systems

Location Privacy-Preserving Task Recommendation With Geometric Range Query in Mobile Crowdsensing

Chuan Zhang, Liehuang Zhu, Chang Xu, Jianbing Ni, Cheng Huang, Xuemin Shen

Summary: This paper proposes location privacy-preserving task recommendation schemes in mobile crowdsensing, without the need for a trusted database owner. The schemes, named PPTR-L and PPTR-F, achieve linear and faster-than-linear search complexity respectively, while ensuring the confidentiality of workers' locations and data requesters' queries.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Computer Science, Theory & Methods

TDFL: Truth Discovery Based Byzantine Robust Federated Learning

Chang Xu, Yu Jia, Liehuang Zhu, Chuan Zhang, Guoxie Jin, Kashif Sharif

Summary: This study proposes a novel federated learning method called TDFL, which uses truth discovery to defend against multiple poisoning attacks. The method is designed to address different attack scenarios and achieves strong robustness without relying on additional datasets.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2022)

Article Engineering, Electrical & Electronic

APPB: Anti-Counterfeiting and Privacy-Preserving Blockchain-Based Vehicle Supply Chains

Can Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Rongxing Lu, Yupeng Chen

Summary: The vehicle supply chain industry is rapidly developing with the popularization of electric vehicles. Counterfeit products pose significant challenges and risks to the industry. In this paper, a reliable and privacy-preserving blockchain-based solution called APPB is proposed to address these issues.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

EBDL: Effective blockchain-based covert storage channel with dynamic labels

Can Zhang, Liehuang Zhu, Chang Xu, Zijian Zhang, Rongxing Lu

Summary: Blockchain-based covert communication has opened up a new research direction, providing reliable and undetectable storage methods. However, existing solutions using pre-negotiated and fixed addresses as static labels increase the risk of channel exposure and lack support for large covert message transmission. This paper presents an effective solution with dynamic labels and a message segmentation mechanism, achieving efficient extraction of covert messages and secure transmission of large covert messages.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Computer Science, Information Systems

Privacy-preserving and fault-tolerant aggregation of time-series data without TA

Chang Xu, Run Yin, Liehuang Zhu, Can Zhang, Kashif Sharif

Summary: The increase in popularity and usage of the Internet of Things (IoT) applications, along with big data, has highlighted the importance of time-series data aggregation. However, existing privacy-preserving solutions face challenges in fault tolerance and establishment of trusted authorities. This paper proposes a privacy-preserving time-series data aggregation scheme without trusted authorities, showcasing its reliability and scalability.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2023)

Article Mathematics

Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups

Dong Han, Zhen Li, Mengyu Wang, Chang Xu, Kashif Sharif

Summary: This paper presents a concrete GSH protocol with Multiple Groups, which provides affiliation-hiding and detectability while achieving Perfect Forward Secrecy. Only legitimate members can prove their affiliations without revealing specific group identities.

MATHEMATICS (2023)

Article Engineering, Electrical & Electronic

Traffic Flow Optimization for UAVs in Multi-Layer Information-Centric Software-Defined FANET

Liehuang Zhu, Md Monjurul Karim, Kashif Sharif, Chang Xu, Fan Li

Summary: This article proposes a UAV-assisted multi-layer IC-SDN solution to address content distribution challenges in UAV-assisted networks. It introduces distributed controllers placed hierarchically in the edge and cloud tiers and formulates the traffic optimization problem using a queueing allocation model. The proposed solution maximizes throughput and minimizes computational latency, delay, and packet loss, as shown through simulation and numerical evaluation.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

Dynamic Data Transaction in Crowdsensing Based on Multi-Armed Bandits and Shapley Value

Chang Xu, Yayun Si, Liehuang Zhu, Chuan Zhang, Kashif Sharif, Huishu Wu

Summary: This paper investigates the problem of dynamic data transaction in crowdsensing. The contribution of new data to the collector is modeled using the Shapley value, and a contextual bandit model is used to determine the transaction price. Simulation experiments demonstrate the effectiveness of the proposed scheme.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2022)

Proceedings Paper Computer Science, Software Engineering

V-EPTD: A Verifiable and Efficient Scheme for Privacy-Preserving Truth Discovery

Chang Xu, Hongzhou Rao, Liehuang Zhu, Chuan Zhang, Kashif Sharif

Summary: This paper proposes a novel scheme named V-EPTD that not only protects privacy information but also verifies the computing in truth discovery. The experimentation and analysis show that V-EPTD has good performances for users, verifiers, and the server, both in communication overhead and computation overhead.

ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III (2022)

Proceedings Paper Computer Science, Information Systems

Analysis of Address Linkability in Tornado Cash on Ethereum

Yujia Tang, Chang Xu, Can Zhang, Yan Wu, Liehuang Zhu

Summary: Tornado Cash, a popular non-custodial coin mixer on Ethereum, is used to protect the privacy of addresses. However, it has privacy leakage risks due to inappropriate transaction behaviors. This paper analyzes the privacy issues of Tornado Cash and proposes clustering rules to reduce the size of users' anonymity set.

CYBER SECURITY, CNCERT 2021 (2022)

暂无数据