BLOCKCHAIN-BASED DEVICE AUTHENTICATION IN EDGE COMPUTING USING QUANTUM APPROACH


(Received: 26-Aug.-2024, Revised: 25-Oct.-2024 , Accepted: 28-Oct.-2024)
The Internet of things (IoT) emerged as a new technology, where everything is connected. Large amounts of data need to be stored for processing; hence, edge computing can reduce the storage of data in a distributed environment, which enhances processing speed and low usage of bandwidth. With an ever- increasing use of IoT devices, issues such as authentication of devices, privacy of data stored and integrity of data have also increased. The authentication of devices is a major concern for edge-connected IoT devices. The problem was solved by using classical cryptographic algorithms such as Elliptic Curve Cryptography (ECC), Rivest-Shamir-Adleman (RSA) and Diffie-Hellman (DH) for message encryption by using public and private keys that need to be stored. These keys need to be stored on a server for device authentication. In device authentication, storing many keys leads to more computation and storage costs and to an increase in delay. With quantum computing and quantum algorithms, such as Shor’s and Grover’s, it becomes easy to break the keys of cryptographic algorithms, making the system vulnerable. The proposed work Blockchain-based Device Authentication in Edge Computing Using Quantum Approach (BDAEC-QA) provides authentication for IoT devices using context information, quantum key distribution (QKD) and blockchain. The proposed scheme uses the smart contracts to store an information of the IoT devices on the server side, which is used by blockchain to provide secure authentication between the edge server and the IoT devices. The proposed scheme also provides communication between IoT devices across the network. The proposed work is compared with “Lightweight Two-factor-based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing" (LTBA) and “A Blockchain-based Mutual Authentication Scheme for Collaborative Edge Computing" (BBMA) and has less registration, key generation and authentication delay, respectively. The BDAEC-QA scheme uses less computation and storage costs as compared with other existing schemes. The proposed scheme is simulated using the AVISPA tool, to provide the security proofs and analysis that indicate that the BDAEC-QA scheme is resistant to well-known attacks.

[1] A. Kumar et al., "A Comprehensive Survey of Authentication Methods in Internet-of-Things and ItsConjunctions," Journal of Network and Computer Applications, vol. 204, Page 103414, 2022.

[2] W. Z. Khan et al., "Edge Computing: A Survey," Future Generation Computer Systems Journal, vol. 97,pp. 219–235, 2019.

[3] K. Cao, Y. Liu, G. Meng and Q. Sun, "An Overview on Edge Computing Research," IEEE AccessJournal, vol. 8, pp. 85714–85728, 2020.

[4] Q. Fan et al., "A Secure and Efficient Authentication and Data Sharing Scheme for Internet of ThingsBased on Blockchain," Journal of Systems Architecture, vol. 117, Page 102112, 2021.

[5] P. M. Chanal and M. S. Kakkasageri, "Security and Privacy in IoT: A Survey," Wireless PersonalCommunications Journal, vol. 115, pp. 1667—1693, 2020.

[6] P. Memarmoshrefi, R. Seibel and D. Hogrefe, "Autonomous Ant-based Public Key AuthenticationMechanism for Mobile Ad-hoc Networks," Journal of Mobile Networks and Applications, vol. 21, pp. 149–160, 2016.

[7] S. S. Rani, S. Pradeep, R. M. Dinesh and S. G. Prabhu, "OTP Based Authentication Model forAutonomous Delivery Systems Using Raspberry Pi," Proc. of the Int. Conf. on Intelligent Controller and Computing for Smart Power (ICICCSP), pp. 1–5, Hyderabad, India, 2022.

[8] M. Mitev et al., "Authenticated Secret Key Generation in Delay-constrained Wireless Systems,"EURASIP Journal of Wireless Communication and Networking, vol. 2020, Article no. 122, 2020.

[9] Y. Wang, T. Nakachi and H. Ishihara, "Edge and Cloud-aided Secure Sparse Representation for FaceRecognition," Proc. of the 27th IEEE European Signal Processing Conf. (EUSIPCO), pp. 1–5, A Coruna, Spain, 2019.

[10] H. Goumidi et al., "Lightweight Secure Authentication and Key Distribution Scheme for VehicularCloud Computing," Journal of Symmetry, vol. 13, no. 3, Article no. 484, pp. 1-29, 2021.

[11] J. Mulholland, M. Mosca and J. Braun, "The Day the Cryptography Dies," IEEE Security Privacy, vol.15, no. 4, pp. 14–21, 2017.

[12] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, "Quantum Cryptography," Reviews of ModernPhysics, vol. 74, pp. 145–195, 2002.

[13] C. H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing,"Theoretical Computer Science, vol. 560, pp. 7–11, 2014.

[14] H. Zeyu et al., "Survey on Edge Computing Security," Proc. of the IEEE Int. Conf. on Big Data,Artificial Intelligence and Internet of Things Engineering (ICBAIE), pp. 96–105, Fuzhou, China, 2020.

[15] X. Wang et al., "Survey on Blockchain for Internet of Things," Journal of Computer Communications,Elsevier, vol. 136, pp. 10–29, 2019.

[16] M. A. Uddin, A. Stranieri, I. Gondal and V. Balasubramanian, "A Survey on the Adoption ofBlockchain in IoT: Challenges and Solutions," Blockchain: Research and Applications, vol. 2, no. 2, pp. 1–49, 2021.

[17] Y. Zhang et al., "Smart Contract-based Access Control for the Internet of Things," IEEE Internet ofThings Journal, vol. 6, no. 2, pp. 1594– 1605, 2018.

[18] K. Ekerta, "Quantum Cryptography Bases on Bell’s Theorem," Physical Review Letters, vol. 67, pp.661–664, 1991.

[19] V. Scarani et al., "Security Aspect of Practical Quantum Key Distribution," Reviews of ModernPhysics, vol. 81, no. 3, pp. 1301–1350, 2009.

[20] U. Khalid et al., "A Decentralized Lightweight Blockchain-based Authentication Mechanism for IoTSystems," Cluster Computing, vol. 23, pp. 2067–2087, 2020.

[21] K. Hameed, S. Garg, M. B. Amin and B. Kang, "A Formally Verified Blockchain-based DecentralizedAuthentication Scheme for the Internet of Things," Journal of Supercomputing, vol. 77, pp. 14461—14501, 2021.

[22] A. A. Al-Saggaf, T. Sheltami, H. Alkhzaimi and G. Ahmed, "Lightweight Two-factor-based UserAuthentication Protocol for IoT-enabled Healthcare Ecosystem in Quantum Computing," Arab Journal for Science and Engineering, vol. 48, pp. 2347–2357, 2023.

[23] H. Abulkasim et al., "Authenticated Secure Quantum-based Communication Scheme in Internet-of-Drones Deployment," IEEE Access Journal, vol. 10, pp. 94963–94972, 2022.

[24] J. Wu, Z. Jin, G. Li, Z. Xu, C. Fan and Y. Zheng, "Design of Vehicle Certification Schemes in IoVBased on Blockchain," World Wide Web Journal, vol. 25, pp. 2241—2263, 2022.

[25] G. Cheng, Y. Chen, S. Deng, H. Gao and J. Yin, "A Blockchain-based Mutual Authentication Schemefor Collaborative Edge Computing," IEEE Transactions on Computational Social Systems, vol. 9, no. 1, pp. 146–158, 2022.

[26] A. K. Sahu, S. Sharma and D. Puthal, "Lightweight Multi-party Authentication and Key AgreementProtocol in IoT-based E-Healthcare Service," ACM Transactions on Multimedia Computing, Communications and Applications, vol. 17, pp. 1–20, 2021.

[27] P. Nag, P. Chandrakar and K. Chandrakar, "An Improved Two-factor Authentication Scheme forHealthcare System," Procedia Computer Science, vol. 218, pp. 1079–1090, 2023.

[28] S. Sathyadevan, K. Achuthan, R. Doss and L. Pan, "Protean Authentication Scheme – A Time-boundDynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments," IEEE Access Journal, vol. 7, pp. 92419–92435, 2019.

[29] A. Shahidinejad and J. Abawajy, "Decentralized Lattice-based Device-to-device Authentication for theEdge-enabled IoT," IEEE Systems Journal, vol. 17, no. 4, pp. 6623–6633, 2023.

[30] A. Shahidinejad, J. Abawajy and S. Huda, "Anonymous Lattice-based Authentication Protocol forVehicular Communications," Vehicular Communications, vol. 48, Page 100803, 2024.

[31] D. Stucki et al., "Long-term Performance of the SwissQuantum Quantum Key Distribution Network ina Field Environment," New Journal of Physics, vol. 13, no. 12, Page 123001, 2011.

[32] Toshiba, "QKD Technology to Semiconductor Chip," [Online], Available: https://news.toshiba.com/press-releases/press-release-details/2021/Toshiba-Shrinks-Quantum-Key-Distribution-Technology-to-a-Semiconductor-Chip/default.aspx.

[33] R. Canetti and H. Krawczyk, "Analysis of Key-exchange Protocols and Their Use for Building SecureChannels," Proc. of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2001), pp. 453–474, Springer, 2001.

[34] N. D. Sarier, "Multimodal Biometric Authentication for Mobile Edge Computing," InformationSciences, vol. 573, pp. 82–99, 2021.

[35] H. Goswami and H. Choudhury, "Remote Registration and Group Authentication of IoT Devices in 5GCellular Network," Computers Security Journal, vol. 120, Page 102806, 2022.

[36] A. M. Almuhaideb and K. S. Alqudaihi, "A Lightweight Three-factor Authentication Scheme forWHSN Architecture," Sensors Journal, vol. 20, no. 23, Page 6860, 2020.

[37] S. Uppuluri and G. Lakshmeeswari, "Secure User Authentication and Key Agreement Scheme for IoTDevice Access Control Based Smart Home Communications," Wireless Network Journal, vol. 29, pp. 1333—1354, 2023.

[38] Wu, Tsu-Yang, Zhiyuan Lee, Lei Yang, Jia-Ning Luo and Raylin Tso, "Provably Secure AuthenticationKey Exchange Scheme Using Fog Nodes in Vehicular Ad Hoc Networks," The Journal of Supercomputing vol. 77, no. 7, pp. 6992-7020, 2021.

[39] M. Hamada, S. A. Salem and F. M. Salem, "LAMAS: Lightweight Anonymous Mutual AuthenticationScheme for Securing Fog Computing Environments," Ain Shams Engineering Journal, vol. 13, no. 6, p. 101752, 2022.

[40] I. Aciobanitei, R. I. Guinea and M. L. Pura, "AVISPA versus AVANTSSAR in the Model Checking ofSecure Communication Protocols," Proc. of the 15th Int. Joint Conf. on e-Business and Telecomm. (ICETE 2018), vol. 2: SECRYPT, pp. 520-525, DOI: 10.5220/0006887905200525, 2018.