Zhang, Jie ORCID: 0000-0003-1258-9679 and Zhang, Futai
(2021)
Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge.
IEEE Internet of Things Journal, 9 (9).
p. 1.
Text
ManuscriptInPDF.pdf - Author Accepted Manuscript Download (1MB) | Preview |
Abstract
In the new paradigm of blockchain-powered intelligent edge, the key agreement is a significant problem that has not been extensively studied so far. Existing key agreement protocols in the traditional public-key setting are usually too complicated and heavy for edge and end devices. Besides, most protocols in use do not have effective measures to resist side-channel attacks, which are increasingly threatening cloud servers, edge devices, and end devices. Identity (ID)-based protocols can be conveniently implemented in the blockchain-powered intelligent edge. Several leakage-resilient ID-based protocols, which can resist side-channel attacks, have been proposed. However, they all involve time-consuming pairing computations. Besides, none of them address side-channel attacks to the key generation center (KGC). This article designs and realizes two novel ID-based key agreement protocols for the blockchain-powered intelligent edge, including an extended Canetti-Krawczyk (eCK) secure ID-based authenticated key agreement (AKA) protocol and a continuous after-the-fact leakage-resilient eCK (CAFL-eCK) secure ID-based AKA protocol. Both protocols do not involve any heavy pairing computation. Besides, the second one can resist side-channel attacks to the KGC and the communicating parties. A hybrid implementation of the two protocols can achieve high efficiency and strong security at the same time in blockchain-powered intelligent edge environments. This is demonstrated via a use case of a blockchain-powered smart home.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Protocols, Security, Blockchains, Side-channel attacks, Cloud computing, Resists, Computational modeling, Blockchain, identity-based key agreement, intelligent edge, intelligent Internet of Things (IIoT), leakage resilience, side-channel attacks |
Depositing User: | Symplectic Admin |
Date Deposited: | 30 Sep 2021 07:35 |
Last Modified: | 15 Mar 2024 13:11 |
DOI: | 10.1109/jiot.2021.3111552 |
Related URLs: | |
URI: | https://livrepository.liverpool.ac.uk/id/eprint/3138755 |