Please use this identifier to cite or link to this item:
https://doi.org/10.21256/zhaw-20682
Publication type: | Conference paper |
Type of review: | Peer review (publication) |
Title: | Dynamic group key agreement for resource-constrained devices using blockchains |
Authors: | Taçyıldız, Yaşar Berkay Ermiş, Orhan Gür, Gürkan Alagöz, Fatih |
et. al: | No |
DOI: | 10.1007/978-3-030-61638-0_4 10.21256/zhaw-20682 |
Proceedings: | Applied Cryptography and Network Security Workshops |
Editors of the parent work: | Zhou, Jianying |
Pages: | 58 |
Pages to: | 76 |
Conference details: | 18th International Conference on Applied Cryptography and Network Security, Rome, Italy, 19-22 October 2020 |
Issue Date: | Oct-2020 |
Series: | Lecture Notes in Computer Science |
Series volume: | 12418 |
Publisher / Ed. Institution: | Springer |
Publisher / Ed. Institution: | Cham |
ISBN: | 978-3-030-61637-3 978-3-030-61638-0 |
Language: | English |
Subjects: | Group key agreement; Blockchain; IoT; Hyperledger fabric |
Subject (DDC): | 005: Computer programming, programs and data |
Abstract: | Dynamic group key agreement (DGKA) protocols are one of the key security primitives to secure multiparty communications in decentralized and insecure environments while considering the instant changes in a communication group. However, with the ever-increasing number of connected devices, traditional DGKA protocols have performance challenges since each member in the group has to make several computationally intensive operations while verifying the keying materials to compute the resulting group key. To overcome this issue, we propose a new approach for DGKA protocols by utilizing Hyperledger Fabric framework as a blockchain platform. To this end, we migrate the communication and verification overhead of DGKA participants to the blockchain network in our developed scheme. This paradigm allows a flexible DGKA protocol that considers resource-constrained entities and trade-offs regarding distributed computation. According to our performance analysis, participants with low computing resources can efficiently utilize our protocol. Furthermore, we have demonstrated that our protocol has the same security features as other comparable protocols in the literature. |
URI: | https://digitalcollection.zhaw.ch/handle/11475/20682 |
Fulltext version: | Submitted version |
License (according to publishing contract): | Licence according to publishing contract |
Departement: | School of Engineering |
Organisational Unit: | Institute of Applied Information Technology (InIT) |
Published as part of the ZHAW project: | INtelligent Security and PervasIve tRust for 5G and Beyond (INSPIRE-5Gplus) |
Appears in collections: | Publikationen School of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2020_Tacyildiz-etal_DGKA-Blockchain_AIBlock2020paper.pdf | 403.83 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.