Skip to main content
Erschienen in: The Journal of Supercomputing 6/2022

12.01.2022

Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN

verfasst von: Vankamamidi S. Naresh, V. V. L. Divakar Allavarpu, Sivaranjani Reddi

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The contemporary Group Key Agreement (GKA) entails lightweight computing, reduced communication, decentralized certification, personal privacy protection, traceability, and accountability. In this paper, we adopted blockchain technology in GKA to incorporate these features. This work first presents a blockchain-based two-party Elliptic Curve Diffie–Hellman key agreement. Subsequently, we extend it to an n-party key agreement to propose a Blockchain-based Dynamic Authenticated Contributory Group Key Agreement (BDACGKA). In this technique, the privacy-preserving smart contract (PPSC) acts as a Group Controller in the first round and generates two-party shared keys with each group member. The PPSC computes partial group keys in the second round and sends them to the respective group members. After receiving the partial group keys sent by the PPSC, each group member generates the group key by multiplying the received product with its shared key. Furthermore, we built a Formal Security Model for the proposed protocol. Finally, the performance analysis demonstrates that the proposed protocol is more proficient than the examined protocols and highly adaptable to large wireless sensor networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gautam AK, Kumar R (2021) A comprehensive study on key management, authentication, and trust management techniques in wireless sensor networks. SN Appl Sci 3(1):1–27 Gautam AK, Kumar R (2021) A comprehensive study on key management, authentication, and trust management techniques in wireless sensor networks. SN Appl Sci 3(1):1–27
2.
Zurück zum Zitat Mirvaziri H, Hosseini R (2020) A novel method for key establishment based on symmetric cryptography in hierarchical wireless sensor networks. Wirel Pers Commun 112:2373CrossRef Mirvaziri H, Hosseini R (2020) A novel method for key establishment based on symmetric cryptography in hierarchical wireless sensor networks. Wirel Pers Commun 112:2373CrossRef
3.
Zurück zum Zitat Cheng Q, Hsu C, Harn L (2020) Lightweight noninteractive membership authentication and group key establishment for WSNs. Math Probl Eng 2020:1–9MathSciNet Cheng Q, Hsu C, Harn L (2020) Lightweight noninteractive membership authentication and group key establishment for WSNs. Math Probl Eng 2020:1–9MathSciNet
4.
Zurück zum Zitat Zhan F, Yao N, Gao Z, Tan G (2017) A novel key generation method for wireless sensor networks based on system of equations. J Netw Comput Appl 82:114–127CrossRef Zhan F, Yao N, Gao Z, Tan G (2017) A novel key generation method for wireless sensor networks based on system of equations. J Netw Comput Appl 82:114–127CrossRef
5.
Zurück zum Zitat Wang X, Shi W, Liu D (2019) A group key management scheme for WSN based on lagrange interpolation polynomial characteristic. KSII Trans Internet Inform Syst 13(7):3690–3713 Wang X, Shi W, Liu D (2019) A group key management scheme for WSN based on lagrange interpolation polynomial characteristic. KSII Trans Internet Inform Syst 13(7):3690–3713
6.
Zurück zum Zitat Cheng Q, Hsu C, Xia Z, Harn L (2020) Fast multivariate-polynomial-based membership authentication and key establishment for secure group communications in WSN. IEEE Access 8:71833–71839CrossRef Cheng Q, Hsu C, Xia Z, Harn L (2020) Fast multivariate-polynomial-based membership authentication and key establishment for secure group communications in WSN. IEEE Access 8:71833–71839CrossRef
7.
Zurück zum Zitat Xu G, Li X, Jiao L, Wang W, Liu A, Su C, Zheng X, Liu S, Cheng X (2020) BAGKD: a batch authentication and group key distribution protocol for vanets. IEEE Commun Mag 58:35–41CrossRef Xu G, Li X, Jiao L, Wang W, Liu A, Su C, Zheng X, Liu S, Cheng X (2020) BAGKD: a batch authentication and group key distribution protocol for vanets. IEEE Commun Mag 58:35–41CrossRef
8.
Zurück zum Zitat Swaminathan A, Vivekanandan P (2017) An effective lightweight key management (ELWKM) model for wireless sensor networks using distributed spanning tree structure. Asian J Res Soc Sci Humanit 7(2):749–770 Swaminathan A, Vivekanandan P (2017) An effective lightweight key management (ELWKM) model for wireless sensor networks using distributed spanning tree structure. Asian J Res Soc Sci Humanit 7(2):749–770
9.
Zurück zum Zitat Mandal S, Mohanty S, Majhi B (2020) CL-AGKA: certificateless authenticated group key agreement protocol for mobile networks. Wirel Netw 26:3011CrossRef Mandal S, Mohanty S, Majhi B (2020) CL-AGKA: certificateless authenticated group key agreement protocol for mobile networks. Wirel Netw 26:3011CrossRef
10.
Zurück zum Zitat Zhu Y, Qin Y, Gan G et al (2018) TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization IEEE 42nd annual computer software and applications conference (COMPSAC). IEEE 1:535–544 Zhu Y, Qin Y, Gan G et al (2018) TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization IEEE 42nd annual computer software and applications conference (COMPSAC). IEEE 1:535–544
11.
Zurück zum Zitat Sharma A, Tomar R, Chilamkurti N, Kim BG (2020) Blockchain based smart contracts for internet of medical things in e-healthcare. Electronics 9(10):1609CrossRef Sharma A, Tomar R, Chilamkurti N, Kim BG (2020) Blockchain based smart contracts for internet of medical things in e-healthcare. Electronics 9(10):1609CrossRef
12.
Zurück zum Zitat Kosba AM, Shi E, Wen Z, Papamanthou C.(2016) Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In Security and Privacy (SP), IEEE Symposium on. IEEE, pp 839–858. Kosba AM, Shi E, Wen Z, Papamanthou C.(2016) Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In Security and Privacy (SP), IEEE Symposium on. IEEE, pp 839–858.
13.
Zurück zum Zitat R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. (2018). Ekiden: A platform for confidentiality Preserving, trustworthy, and performant smart contract execution. ArXiv (7 2018).https://arxiv.org/abs/1804.05141 R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. (2018). Ekiden: A platform for confidentiality Preserving, trustworthy, and performant smart contract execution. ArXiv (7 2018).https://​arxiv.​org/​abs/​1804.​05141
14.
Zurück zum Zitat Nguyen BL, Lydia EL, Elhoseny M, Pustokhina IV, Pustokhin DA, Selim MM, Nguyen GN, Shankar K (2020) Privacy-preserving blockchain technique to achieve secure and reliable sharing of IoT data. Comput Mater Contin 65:87–107CrossRef Nguyen BL, Lydia EL, Elhoseny M, Pustokhina IV, Pustokhin DA, Selim MM, Nguyen GN, Shankar K (2020) Privacy-preserving blockchain technique to achieve secure and reliable sharing of IoT data. Comput Mater Contin 65:87–107CrossRef
15.
Zurück zum Zitat Cheng J, Li J, Xiong N, Chen M, Guo H, Yao X (2020) Lightweight mobile clients privacy protection using trusted execution environments for blockchain. CMC-Comput Mater Continua 65(3):2247–2262CrossRef Cheng J, Li J, Xiong N, Chen M, Guo H, Yao X (2020) Lightweight mobile clients privacy protection using trusted execution environments for blockchain. CMC-Comput Mater Continua 65(3):2247–2262CrossRef
16.
Zurück zum Zitat Naresh VS, Murthy NV (2016) Provably secure group key agreement protocol based on ECDH with integrated signature. Secur Commun Netw 9(10):1085–1102CrossRef Naresh VS, Murthy NV (2016) Provably secure group key agreement protocol based on ECDH with integrated signature. Secur Commun Netw 9(10):1085–1102CrossRef
17.
Zurück zum Zitat Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Industr Inf 14(8):3637–3647CrossRef Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Industr Inf 14(8):3637–3647CrossRef
18.
Zurück zum Zitat Zeng S, Chen Y (2018) Concurrently deniable group key agreement and its application to privacy-preserving VANETs. Wirel Commun Mobile Comput. 2018:1–9 Zeng S, Chen Y (2018) Concurrently deniable group key agreement and its application to privacy-preserving VANETs. Wirel Commun Mobile Comput. 2018:1–9
19.
Zurück zum Zitat Zhang Q, Li Y, Li J, Gan Y, Zhang Y, Hu J (2019) Blockchain-based asymmetric group key agreement protocol for mobile Ad Hoc network. In: Meng W, Furnell S (eds) Security and privacy in social networks and big data. SocialSec 2019 communications in computer and information science, Springer, Singapore. Zhang Q, Li Y, Li J, Gan Y, Zhang Y, Hu J (2019) Blockchain-based asymmetric group key agreement protocol for mobile Ad Hoc network. In: Meng W, Furnell S (eds) Security and privacy in social networks and big data. SocialSec 2019 communications in computer and information science, Springer, Singapore.
21.
Zurück zum Zitat Feng Q, He D, Zeadally S, Liang K (2019) BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans Industr Inf 16(6):4146–4155CrossRef Feng Q, He D, Zeadally S, Liang K (2019) BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans Industr Inf 16(6):4146–4155CrossRef
22.
Zurück zum Zitat Zheng D, Jing C, Guo R, Gao S, Wang L (2019) A traceable blockchain-based access authentication system with privacy preservation in VANETs. IEEE Access 7:117716–117726CrossRef Zheng D, Jing C, Guo R, Gao S, Wang L (2019) A traceable blockchain-based access authentication system with privacy preservation in VANETs. IEEE Access 7:117716–117726CrossRef
23.
Zurück zum Zitat Lu Z, Wang Q, Qu G, Zhang H, Liu Z (2019) A blockchain-based privacy-preserving authentication scheme for vanets. IEEE Trans Very Large Scale Integr (VLSI) Syst 27(12):2792–2801. Lu Z, Wang Q, Qu G, Zhang H, Liu Z (2019) A blockchain-based privacy-preserving authentication scheme for vanets. IEEE Trans Very Large Scale Integr (VLSI) Syst 27(12):2792–2801.
24.
Zurück zum Zitat Li L, Liu J, Cheng L, Qiu S, Wang W, Zhang X, Zhang Z (2018) Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans Intell Transp Syst 19(7):2204–2220CrossRef Li L, Liu J, Cheng L, Qiu S, Wang W, Zhang X, Zhang Z (2018) Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans Intell Transp Syst 19(7):2204–2220CrossRef
25.
Zurück zum Zitat Maria A, Pandi V, Lazarus JD, Karuppiah M, Christo MS (2021) BBAAS: blockchain-based anonymous authentication scheme for providing secure communication in VANETs. Secur Commun Netw 2021:1–11CrossRef Maria A, Pandi V, Lazarus JD, Karuppiah M, Christo MS (2021) BBAAS: blockchain-based anonymous authentication scheme for providing secure communication in VANETs. Secur Commun Netw 2021:1–11CrossRef
26.
Zurück zum Zitat Tan H, Chung I (2019) Secure authentication and key management with blockchain in vanets. IEEE access 8:2482–2498CrossRef Tan H, Chung I (2019) Secure authentication and key management with blockchain in vanets. IEEE access 8:2482–2498CrossRef
27.
Zurück zum Zitat Chen T, Zhang L, Choo KKR, Zhang R, Meng X (2021) Blockchain based key management scheme in fog-enabled IoT systems. IEEE Internet of Things Journal. Chen T, Zhang L, Choo KKR, Zhang R, Meng X (2021) Blockchain based key management scheme in fog-enabled IoT systems. IEEE Internet of Things Journal.
28.
Zurück zum Zitat Zhang G, Xie H, Yang Z, Tao X, Liu W (2021) BDKM: a blockchain-based secure deduplication scheme with reliable key management. Neural Processing Letters, 1–18. Zhang G, Xie H, Yang Z, Tao X, Liu W (2021) BDKM: a blockchain-based secure deduplication scheme with reliable key management. Neural Processing Letters, 1–18.
29.
Zurück zum Zitat Jia C, Ding H, Zhang C, Zhang X (2021) Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology. Alex Eng J 60(1):337–346CrossRef Jia C, Ding H, Zhang C, Zhang X (2021) Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology. Alex Eng J 60(1):337–346CrossRef
30.
Zurück zum Zitat Tan M, Sun D, Li X (2021) A secure and efficient blockchain-based key management scheme for LoRaWAN. In 2021 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–7). IEEE. Tan M, Sun D, Li X (2021) A secure and efficient blockchain-based key management scheme for LoRaWAN. In 2021 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–7). IEEE.
31.
Zurück zum Zitat Dutta R, Barua R (2008) Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans Inf Theory 54(5):2007–2025MathSciNetCrossRef Dutta R, Barua R (2008) Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans Inf Theory 54(5):2007–2025MathSciNetCrossRef
32.
Zurück zum Zitat Zhang L, Wu Q, Qin B, Domingo-Ferrer J (2011) Provably secure one round identity-based authenticated asymmetric group key agreement protocol. Inf Sci 181:4318–4329MathSciNetCrossRef Zhang L, Wu Q, Qin B, Domingo-Ferrer J (2011) Provably secure one round identity-based authenticated asymmetric group key agreement protocol. Inf Sci 181:4318–4329MathSciNetCrossRef
34.
Zurück zum Zitat Lv X, Li H, Wang B (2014) Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int J Comput Math 91(3):447–460MathSciNetCrossRef Lv X, Li H, Wang B (2014) Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int J Comput Math 91(3):447–460MathSciNetCrossRef
35.
Zurück zum Zitat Zhang Q, Li Y, Gan Y, Zhang C, Luo X, Zhang J (2019) A group key agreement protocol based on privacy protection and attribute authentication. IEEE Access 7:87085–87096CrossRef Zhang Q, Li Y, Gan Y, Zhang C, Luo X, Zhang J (2019) A group key agreement protocol based on privacy protection and attribute authentication. IEEE Access 7:87085–87096CrossRef
Metadaten
Titel
Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN
verfasst von
Vankamamidi S. Naresh
V. V. L. Divakar Allavarpu
Sivaranjani Reddi
Publikationsdatum
12.01.2022
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2022
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-04175-8

Weitere Artikel der Ausgabe 6/2022

The Journal of Supercomputing 6/2022 Zur Ausgabe

Premium Partner