A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing
【Author】 Cheng, Guanjie; Chen, Yan; Deng, Shuiguang; Gao, Honghao; Yin, Jianwei
【Source】IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
【影响因子】4.747
【Abstract】With the ever-increasing requirements of delay-sensitive and mission-critical applications, it becomes a popular research trend to incorporate edge computing in the Internet of Things (IoT) to mitigate the pressure of traditional cloud-based IoT architecture. Edge computing delivers real-time computations and communications for IoT devices by leveraging edge servers deployed close to users, which creates a collaborative edge computing (CEC) paradigm. The capacity of edge servers is beneficial but risky, as vulnerable servers can be exploited to conduct surveillance or perform other nefarious activities. Besides, fake IoT devices would bring security threats and compromise the IoT system. This highlights the necessity of designing a secure and efficient mutual authentication scheme for CEC. In this direction, related works have proposed various authentication mechanisms, but most of them are found unfit due to the absence of decentralization, anonymity, and mobility. Motivated by this fact, we propose a blockchain-based mutual authentication scheme that bridges these gaps. Specifically, blockchain, certificateless cryptography, elliptic curve cryptography, and pseudonym-based cryptography are integrated into our scheme to provide mutual authentication between edge servers and IoT devices. Except for static conditions, both intraedge and interedge authentication are considered. Besides, we elaborate on the key generation procedures and design a session key negotiation mechanism. Extensive experiments and security analyses have been conducted to show the feasibility of the proposed scheme.
【Keywords】Authentication; Internet of Things; Servers; Edge computing; Blockchain; Cryptography; Security; Blockchain; cross-domain authentication; edge computing; Internet of Things (IoT); mutual authentication
【发表时间】2021
【收录时间】2022-01-02
【文献类型】
【主题类别】
--
评论