[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3371425.3371437acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiipccConference Proceedingsconference-collections
research-article

Enhanced blockchain based key management scheme against key exposure attack

Published: 19 December 2019 Publication History

Abstract

The data collected by IoT devices is of great value, which makes people urgently need a secure device key management strategy to protect their data. Existing works introduce the blockchain technology to transfer the responsibility of key management from the trusted center in the traditional key management strategy to the devices, thus eliminating the trust crisis caused by excessive dependence on third parties. However, the lightweight implementation of IoT devices limits the ability to resist side channel attacks, causing the private key to be exposed and subject to masquerading attacks. Accordingly, we strengthen the original blockchain based key management scheme to defend against key exposure attack. On the one hand, we introduce two hash functions to bind transactions in the blockchain to legitimate users. On the other hand, we design a secure key exchange protocol for identifying and exchanging access keys between legitimate users. Security analysis and performance show that the proposed scheme improves the robustness of the network with small storage and communication overhead increments.

References

[1]
Ahadipour A and Keshavarz-Haddad A (2017). LPKP: Location-based Probabilistic Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks Using Graph Coloring. ISeCure, 9(1).
[2]
W Du, J Deng, et al. (2004). A key management scheme for wireless sensor networks using deployment knowledge. IEEE INFOCOM, Vol. 1, IEEE, 2004.
[3]
M Ma, D He, M Khan, et al. (2018). Certificateless searchable public key encryption scheme for mobile healthcare system. Computers & Electrical Engineering, 65, 413--424.
[4]
M Ma, G Shi and F Li (2019). Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario. In IEEE Access, vol. 7, pp. 34045--34059
[5]
S Nakamoto (2018). Bitcoin: A peer-to-peer electronic cash system. Available: https://bitcoin.org/en/bitcoin-paper.
[6]
S Haber and W S Stornetta (1991). How to time-stamp a digital document. In Journal of Cryptology, vol 3, no 2, pages 99--111.
[7]
D Bayer, S Haber and W S Stornetta (1993). Improving the efficiency and reliability of digital time-stamping. In Sequences II: Methods in Communication, Security and Computer Science, pages 329--334.
[8]
M Conoscenti, A Vetrò and J C D Martin (2016). Blockchain for the internet of things: a systematic literature review. In 13th Int. Conf. Comput. Syst. Appl. (AICCSA), Agadir, Morocco, pp. 1--6.
[9]
A Bahga and V K Madisetti (2016). Blockchain platform for industrial internet of things. J. Softw. Eng. Appl., vol. 9, no. 10, pp. 533--546.
[10]
A Dorri, S S Kanhere and R Jurdak (2016). Blockchain in internet of things: Challenges and solutions. arXiv:1608.05187.
[11]
E Karafiloski and A Mishev (2017). Blockchain solutions for big data challenges: a literature review. In IEEE EUROCON 2017 -17th Int. Conf. Smart Technol., Ohrid, Macedonia, pp. 763--768.
[12]
H R Hasan and K Salah (2019). Combating Deepfake Videos Using Blockchain and Smart Contracts. In IEEE Access, vol. 7, pp. 41596--41606
[13]
K Salah, M H U Rehman, N Nizamuddin and A Al-Fuqaha (2019). Blockchain for AI: Review and Open Research Challenges. In IEEE Access, vol. 7, pp. 10127--10149
[14]
M A Khan and K Salah (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, Volume 82, Pages 395--411.
[15]
A Ouaddah, A A Elkalam and A A Ouahman (2017). Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies, Advances in Intelligent Systems and Computing, Cham, pp. 523--533.
[16]
A Lei, H Cruickshank, Y Cao, P Asuquo, C P A Ogah and Z Sun (2017). Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J., vol. 4, no. 6, pp. 1832--1843.
[17]
J Ge, C Tu and N Gao (2019). Technology Overview of Side Channel Analysis. In Cryptography Application Security, 5(01), 75--87.
[18]
E Karimi, Z H Jiang, Y Fei and D Kaeli (2018). A Timing Side-Channel Attack on a Mobile GPU. 2018 IEEE 36th International Conference on Computer Design (ICCD), Orlando, FL, USA, pp. 67--74
[19]
C Reinbrecht, A Susin, L Bossuet, G Sigl and J Sepúlveda (2016). Side channel attack on NoC-based MPSoCs are practical: NoC Prime+Probe attack. 2016 29th Symposium on Integrated Circuits and Systems Design (SBCCI), Belo Horizonte, pp. 1--6
[20]
P Kaushik and R Majumdar (2017). Timing attack analysis on AES on modern processors. 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, pp. 462--465
[21]
Y F Alias and H Hashim (2018). Timing analysis for Diffie Hellman Key Exchange In U-BOOT using Raspberry pi. 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Penang, pp. 212--216
[22]
P Bayat-Makou, A Jahanian and M Reshadi (2018). Security Improvement of FPGA Design Against Timing Side Channel Attack Using Dynamic Delay Management. 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), Quebec City, QC, pp. 1--4
[23]
F Jia and D Xie (2016). A unified method based on SPA and timing attacks on the improved RSA. In China Communications, vol. 13, no. 4, pp. 89--96
[24]
M Matthew and R Muresan (2017). An overview of hardware-level statistical power analysis attack countermeasures. Journal of Cryptographic Engineering, 7.3 (2017), 213--244.
[25]
A Kumar, C Scarborough, A Yilmaz and M Orshansky (2017). Efficient simulation of EM side-channel attack resilience. 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Irvine, CA, pp. 123--130
[26]
D Ishihata, et al. (2017). Enhancing reactive countermeasure against EM attacks with low overhead. 2017 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI), Washington, DC, pp. 399--404
[27]
S Patranabis, J Breier, D Mukhopadhyay and S Bhasin (2017). One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers. 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Taipei, pp. 25--32
[28]
B Ning and Q Liu (2018). Modeling and Efficiency Analysis of Clock Glitch Fault Injection Attack. 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Hong Kong, pp. 13--18

Cited By

View all
  • (2022)Challenges of blockchain in new generation energy systems and future outlooksInternational Journal of Electrical Power & Energy Systems10.1016/j.ijepes.2021.107499135(107499)Online publication date: Feb-2022

Index Terms

  1. Enhanced blockchain based key management scheme against key exposure attack

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AIIPCC '19: Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud Computing
    December 2019
    464 pages
    ISBN:9781450376334
    DOI:10.1145/3371425
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • ASciE: Association for Science and Engineering

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 December 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchain
    2. internet of things
    3. key exposure attack
    4. key management

    Qualifiers

    • Research-article

    Funding Sources

    • National Key Research Program of China

    Conference

    AIIPCC '19
    Sponsor:
    • ASciE

    Acceptance Rates

    AIIPCC '19 Paper Acceptance Rate 78 of 211 submissions, 37%;
    Overall Acceptance Rate 78 of 211 submissions, 37%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Challenges of blockchain in new generation energy systems and future outlooksInternational Journal of Electrical Power & Energy Systems10.1016/j.ijepes.2021.107499135(107499)Online publication date: Feb-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media