Blockchain-Based Secure Authentication with Improved Performance for Fog Computing
Abstract
:1. Introduction
- 1.
- A security mechanism with improved performance is presented for a fog computing environment.
- 2.
- The proposed system is designed to execute user registration and authentication along with the capability of providing data security in a decentralised environment.
- 3.
- The delegated Byzantine Fault Tolerant (dBFT) shows improvement over proof of work (POW) and proof of stake (POS).
- 4.
- The proposed system offers more reliable security and speed when compared to other existing blockchain solutions.
2. Related Works
3. The Proposed Methodology
- Through multiple networks and the internet, multiple mobiles and non-mobile devices are connected to the fog computing environment.
- Blockchain nodes are accessible to authorized users and devices.
- To serve as nodes or servers and host the blockchain, fog devices need to meet certain requirements.
- It is necessary for smart contracts to perform tasks that are programmed.
- A task can be performed by a node without relying on another node.
3.1. Advantages of Neo Blockchain over Ethereum Blockchain
- Consensus mechanism: delegated Byzantine Fault Tolerant (dBFT), which is considered an improvement over Ethereum’s Proof-of-Stake and is more energy efficient.
- Hard-fork proof due to delegated Byzantine Fault Tolerant.
- Speed: Executes 10,000 transactions per second compared to Ethereum’s 15 transactions per second.
- Quantum computer proof using Neo QS.
3.2. System Architecture
3.2.1. Neo Smart Contract
3.2.2. Fog Node
3.2.3. Users
3.2.4. Edge Devices
3.2.5. Cloud
3.3. Proposed System Working
3.3.1. Initialisation
3.3.2. User Registration
3.3.3. User Authentication
3.4. Implementation
Algorithm 1 Pseudocode showing steps to register users |
|
Algorithm 2 Pseudocode showing steps to authenticate users |
|
4. Result Analysis and Discussions
4.1. Performance Metrics and Results
- Registration gas: The amount of Neo gas used during registration.
- Authentication gas: The amount of Neo gas used during authentication.
- Elapsed time: Time required for registration and authentication.
Network Simulation in Cisco Packet Tracer
4.2. Performance Evaluation
4.2.1. Registration Simulation
4.2.2. Authentication Simulation
4.2.3. Elapsed Time
4.3. Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
Usermail | User email address |
User | User |
Username | User name |
passowrd | User password |
NeoAdr | Neo address |
UserNeoAdr | User Neo address |
FogNode | Fog Node |
EdgeDev | Edge Device |
Cloud | Cloud |
SmartContract | Smart Contract |
Blockchain | Blockchain |
BlockChainNet | Blockchain Network |
Ledger | Ledger |
References
- Salem, M.J.; Ndolu, F.H.E.; Hidayatullah, D.E.R.; Sari, R.F. Developing NEO Smart Contract for Weather-Based Insurance. In Proceedings of the 2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 16–17 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 603–608. [Google Scholar]
- Muneeb, M.; Raza, Z.; Haq, I.U.; Shafiq, O. SmartCon: A Blockchain-Based Framework for Smart Contracts and Transaction Management. IEEE Access 2021, 10, 10719–10730. [Google Scholar] [CrossRef]
- Huang, J.C.; Shu, M.H.; Hsu, B.M.; Hu, C.M. Service architecture of IoT terminal connection based on blockchain identity authentication system. Comput. Commun. 2020, 160, 411–422. [Google Scholar] [CrossRef]
- Lau, C.H.; Alan, K.H.Y.; Yan, F. Blockchain-based authentication in IoT networks. In Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, 10–13 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
- Deepa, N.; Pham, Q.V.; Nguyen, D.C.; Bhattacharya, S.; Prabadevi, B.; Gadekallu, T.R.; Maddikunta, P.K.R.; Fang, F.; Pathirana, P.N. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener. Comput. Syst. 2022, 131, 209–226. [Google Scholar] [CrossRef]
- Guo, H.; Yu, X. A Survey on Blockchain Technology and its security. Blockchain Res. Appl. 2022, 3, 100067. [Google Scholar] [CrossRef]
- Tuli, S.; Mahmud, R.; Tuli, S.; Buyya, R. Fogbus: A blockchain-based lightweight framework for edge and fog computing. J. Syst. Softw. 2019, 154, 22–36. [Google Scholar] [CrossRef] [Green Version]
- Patwary, A.A.N.; Fu, A.; Battula, S.K.; Naha, R.K.; Garg, S.; Mahanti, A. FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. Comput. Commun. 2020, 162, 212–224. [Google Scholar] [CrossRef]
- Wang, W.; Huang, H.; Zhang, L.; Su, C. Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw. Appl. 2021, 14, 2681–2693. [Google Scholar] [CrossRef]
- Mikalauskas, E. Rockyou2021: Largest ever Password Compilation Leaked. 2021. Available online: https://www.cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/ (accessed on 6 August 2022).
- Timu, A. Pro-Russian Hacking Group Killnet Attacks Romanian Websites. 2022. Available online: https://www.straitstimes.com/world/europe/pro-russian-hacking-group-killnet-attacks-romanian-websites (accessed on 12 August 2022).
- Cybersecurity Incident Information for UK Consumers. 2018. Available online: https://www.equifax.co.uk/incident.html (accessed on 8 August 2022).
- News, S. Significant Cyber Incidents. 2021. Available online: https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents (accessed on 6 August 2022).
- Trend Micro. IOT Security Issues, Threats, and Defenses. 2021. Available online: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/iot-security-101-threats-issues-and-defenses (accessed on 8 August 2022).
- Woolf, N. DDoS Attack That Disrupted Internet Was Largest of Its Kind in History, Experts Say. 2016. Available online: https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet (accessed on 10 August 2022).
- Umoren, O.; Singh, R.; Pervez, Z.; Dahal, K. Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors 2022, 22, 3956. [Google Scholar] [CrossRef]
- Li, D.; Peng, W.; Deng, W.; Gai, F. A blockchain-based authentication and security mechanism for IoT. In Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Guo, S.; Hu, X.; Guo, S.; Qiu, X.; Qi, F. Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans. Ind. Inform. 2019, 16, 1972–1983. [Google Scholar] [CrossRef]
- Mafakheri, B.; Subramanya, T.; Goratti, L.; Riggio, R. Blockchain-based infrastructure sharing in 5G small cell networks. In Proceedings of the 2018 14th International Conference on Network and Service Management (CNSM), Rome, Italy, 5–9 November 2018; pp. 313–317. [Google Scholar]
- Zhang, L.; Ge, Y. Identity authentication based on domestic commercial cryptography with blockchain in the heterogeneous alliance network. In Proceedings of the 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China, 15–17 January 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 191–195. [Google Scholar]
- Gong, L.; Alghazzawi, D.M.; Cheng, L. BCoT sentry: A blockchain-based identity authentication framework for IoT devices. Information 2021, 12, 203. [Google Scholar] [CrossRef]
- Ma, Z.; Meng, J.; Wang, J.; Shan, Z. Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J. 2020, 8, 2116–2123. [Google Scholar]
- Kalaria, R.; Kayes, A.; Rahayu, W.; Pardede, E. A Secure Mutual authentication approach to fog computing environment. Comput. Secur. 2021, 111, 102483. [Google Scholar] [CrossRef]
- Bonnah, E.; Ju, S. DecChain: A decentralized security approach in Edge Computing based on Blockchain. Future Gener. Comput. Syst. 2020, 113, 363–379. [Google Scholar] [CrossRef]
- Khalid, U.; Asim, M.; Baker, T.; Hung, P.C.; Tariq, M.A.; Rafferty, L. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 2020, 23, 2067–2087. [Google Scholar] [CrossRef]
- Almadhoun, R.; Kadadha, M.; Alhemeiri, M.; Alshehhi, M.; Salah, K. A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
- Loffi, L.; Westphall, C.M.; Grüdtner, L.D.; Westphall, C.B. Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J. Netw. Comput. Appl. 2021, 176, 102932. [Google Scholar] [CrossRef]
- Rashid, M.A.; Pajooh, H.H. A security framework for IoT authentication and authorization based on blockchain technology. In Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 264–271. [Google Scholar]
- Ch, R.; Srivastava, G.; Gadekallu, T.R.; Maddikunta, P.K.R.; Bhattacharya, S. Security and privacy of UAV data using blockchain technology. J. Inf. Secur. Appl. 2020, 55, 102670. [Google Scholar] [CrossRef]
- Guo, Y.; Guo, Y. FogHA: An efficient handover authentication for mobile devices in fog computing. Comput. Secur. 2021, 108, 102358. [Google Scholar] [CrossRef]
- Shen, M.; Liu, H.; Zhu, L.; Xu, K.; Yu, H.; Du, X.; Guizani, M. Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 2020, 38, 942–954. [Google Scholar] [CrossRef]
- Hammi, M.T.; Hammi, B.; Bellot, P.; Serhrouchni, A. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. 2018, 78, 126–142. [Google Scholar] [CrossRef]
- Novo, O. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195. [Google Scholar] [CrossRef]
- Gupta, B.; Quamara, M. An identity based access control and mutual authentication framework for distributed cloud computing services in IoT environment using smart cards. Procedia Comput. Sci. 2018, 132, 189–197. [Google Scholar] [CrossRef]
- Chow, M.C.; Ma, M. A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks. Comput. Electr. Eng. 2021, 95, 107375. [Google Scholar] [CrossRef]
- Sánchez Sánchez, P.M.; Fernández Maimó, L.; Huertas Celdrán, A.; Martínez Pérez, G. AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning. Comput. Secur. 2021, 103, 102168. [Google Scholar] [CrossRef]
- Imine, Y.; Kouicem, D.E.; Bouabdallah, A.; Ahmed, L. MASFOG: An efficient mutual authentication scheme for fog computing architecture. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 608–613. [Google Scholar]
- Chen, S.; Yang, L.; Zhao, C.; Varadarajan, V.; Wang, K. Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid. Engineering 2020, 1, 159–169. [Google Scholar] [CrossRef]
- Shao, W.; Jia, C.; Xu, Y.; Qiu, K.; Gao, Y.; He, Y. AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain. Comput. Secur. 2020, 99, 102069. [Google Scholar] [CrossRef]
- Coelho, I.M.; Coelho, V.N.; Araujo, R.P.; Yong Qiang, W.; Rhodes, B.D. Challenges of PBFT-inspired consensus for blockchain and enhancements over neo dBFT. Future Internet 2020, 12, 129. [Google Scholar] [CrossRef]
- Microsoft. Visual Studio Code-Code Editing; Redefined; Microsoft: Redmond, DC, USA, 2021; Available online: https://code.visualstudio.com/ (accessed on 21 May 2022).
- Cisco Packet Tracer 8.0.1: Download Free Labs and Tutorials for CCNA v7 Certification Exam Preparation. Available online: https://www.packettracernetwork.com/download/download-packet-tracer.html (accessed on 18 May 2022).
- Gamundani, A.M.; Phillips, A.; Muyingi, H.N. An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart home applications. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July 2018–3 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 50–57. [Google Scholar]
- Munir, K.; Mohammed, L.A. Comparing user authentication techniques for fog computing. In Advancing Consumer-Centric Fog Computing Architectures; IGI Global: Hershey, PL, USA, 2019; pp. 111–125. [Google Scholar]
- Bareis, M.; Angelo, M.d.; Salzer, G. Functional Differences of Neo and Ethereum as Smart Contract Platforms. In International Congress on Blockchain and Applications; Springer: Berlin/Heidelberg, Germany, 2020; pp. 13–23. [Google Scholar]
- Wang, Q.; Li, R.; Chen, S.; Xiang, Y. Formal Security Analysis on dBFT Protocol of NEO. arXiv 2021, arXiv:2105.07459. [Google Scholar] [CrossRef]
- Rankhambe, B.P.; Khanuja, H.K. A comparative analysis of blockchain platforms–Bitcoin and Ethereum. In Proceedings of the 2019 5th International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 19–21 September 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–7. [Google Scholar]
Work | Blockchain | Concensus Mechanism | Hard-Fork Proof | Speed | Quantum Computer Proof | Distributed Model |
---|---|---|---|---|---|---|
FogAuthChain [8] | Ethereum | POW | No | Slow | No | Yes |
FogHA [30] | NA | NA | NA | NA | NA | Yes |
Blockchain meets IoT [33] | Ethereum | POW | No | Slow | No | Yes |
B. Gupta [34] | NA | NA | NA | NA | NA | Yes |
Khalid et al. [25] | Ethereum | POW | No | Slow | No | Yes |
Kalaria et al. [23] | Ethereum | POW | No | Slow | No | Yes |
Dechain [24] | NA | NA | NA | NA | NA | Yes |
Meng et al. [31] | NA | NA | NA | NA | NA | Yes |
Chow and Ma [35] | NA | NA | NA | NA | NA | No |
Bubble of trust [32] | Ethereum | POS | No | Slow | No | Yes |
AuthCODE [36] | NA | NA | NA | NA | NA | No |
Almadhoun et al. [26] | Ethereum | POS | No | Slow | No | Yes |
Leandrloffi et al. [27] | NA | NA | NA | NA | NA | No |
Masfog [37] | Ethereum | NA | No | NA | No | Yes |
FogBus [7] | NA | NA | NA | NA | NA | Yes |
DA-SADA [38] | NA | NA | NA | NA | NA | Yes |
AttriChain [39] | Ethereum | POW | No | Slow | No | Yes |
Umoren et al. [16] | Ethereum | POS | No | Slow | No | Yes |
Our Proposed work | Neo | dBFT | Yes | Fast | Yes | Yes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Umoren, O.; Singh, R.; Awan, S.; Pervez, Z.; Dahal, K. Blockchain-Based Secure Authentication with Improved Performance for Fog Computing. Sensors 2022, 22, 8969. https://doi.org/10.3390/s22228969
Umoren O, Singh R, Awan S, Pervez Z, Dahal K. Blockchain-Based Secure Authentication with Improved Performance for Fog Computing. Sensors. 2022; 22(22):8969. https://doi.org/10.3390/s22228969
Chicago/Turabian StyleUmoren, Otuekong, Raman Singh, Shahid Awan, Zeeshan Pervez, and Keshav Dahal. 2022. "Blockchain-Based Secure Authentication with Improved Performance for Fog Computing" Sensors 22, no. 22: 8969. https://doi.org/10.3390/s22228969