Citation: | Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095 |
At present, the security threat of industrial Internet data is becoming more and more serious. Effective network transmission plays a key role in the data security of industrial Internet. In order to effectively adapt to the structure of the industrial Internet and achieve safe and reliable communication, a key management scheme based on blockchain dynamic nodes is proposed. In industrial communication, an effective session key needs to be established between untrusted nodes, and the traditional key agreement is realized by using a central node in the way of middleman. However, Once the central node fails, the communication of the whole communication system will fail. When the number of nodes
[1] |
Zhang Yinghui, Deng R H, Zheng Dong, et al. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2019, 15(9): 5099−5108 doi: 10.1109/TII.2019.2894108
|
[2] |
Yousefpoor M S, Barati H. Dynamic key management algorithms in wireless sensor networks: A survey[J]. Computer Communications, 2019, 134: 52−69
|
[3] |
Messai M L, Seba H. A survey of key management schemes in multi-phase wireless sensor networks[J]. Computer Networks, 2016, 105: 60−74
|
[4] |
Sun Yan, Liu K R. Hierarchical group access control for secure multicast communications[J]. IEEE/ACM Transactions on Networking, 2007, 15(6): 1514−1526 doi: 10.1109/TNET.2007.897955
|
[5] |
Je D H, Lee J S, Park Y, et al. Computation-and-storage-efficient key tree management protocol for secure multicast communications[J]. Computer Communications, 2010, 33(2): 136−148 doi: 10.1016/j.comcom.2009.08.007
|
[6] |
冯力,邓国庆,郁滨. 一种多密级移动存储设备多级密钥管理方案[J]. 信息安全研究,2018,4(4):329−335
Feng Li, Deng Guoqing, Yu Bin. Multi-level key management scheme for multi-level removable storage devices[J]. Journal of Information Security Research, 2018, 4(4): 329−335 (in Chinese)
|
[7] |
Gao Ronghai, Zeng Jiwen, Deng Lunzhi. Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings[J]. Mathematical Problems in Engineering, 2018, 2018(9): 1−13
|
[8] |
Lin J, Huang K, Lai Feipei, et al. Secure and efficient group key management with shared key derivation[J]. Computer Standards & Interfaces, 2009, 31(1): 192−208
|
[9] |
Lou Junjun, Zhang Qichao, Qi Zhuyun, et al. A blockchain-based key management scheme for named data networking[C] //Proc of the 1st IEEE Int Conf on Hot Information-Centric Networking (HotICN). Piscataway, NJ : IEEE, 2018, 141–146
|
[10] |
Zhao Huawei, Bai Peidong, Peng Yun, et al. Efficient key management scheme for health blockchain[J]. CAAI Transactions on Intelligence Technology, 2018, 3(2): 114−118 doi: 10.1049/trit.2018.0014
|
[11] |
Vijayakumar P, Chang V, Deborah L J, et al. Key management and key distribution for secure group communication in mobile and cloud network[J]. Future Generations Computer Systems, 2018, 84: 123−125
|
[12] |
Lei Ao, Ogah C, Asuquo P, et al. A secure key management scheme for heterogeneous secure vehicular communication systems[J]. ZTE Communications, 2016, 14(3): 21−31
|
[13] |
Yu Yao, Liu Shumei, Guo Lei, et al. CrowdR-FBC: A distributed fog-blockchains for mobile crowdsourcing reputation management[J]. IEEE Internet of Things Journal, 2020, 7(9): 8722−8735 doi: 10.1109/JIOT.2020.2996229
|
[14] |
Wu Bo, Xu Ke, Li Qi, et al. Toward blockchain powered trusted collaborative services for edge-centric networks[J]. IEEE Network, 2020, 34(2): 30−36 doi: 10.1109/MNET.001.1900153
|
[15] |
金韬,庄丽婉,张晨,等. 基于区块链的云边协同系统研究与设计[J]. 信息安全研究,2021,7(4):310−318
Jin Tao, Zhang Liwan, Zhang Chen, et al. Research and design of cloud edge collaboration based on blockchain[J]. Journal of Information Security Research, 2021, 7(4): 310−318 (in Chinese)
|
[16] |
谢永,吴黎兵,张宇波,等. 面向车联网的多服务器架构的匿名双向认证与密钥协商协议[J]. 计算机研究与发展,2016,53(10):2323−2333
Xie Yong, Wu Libing, Zhang Yubo, et al. Anonymous mutual authentication and keyagreement protocol in multiserver architecture for VANETs[J]. Journal of Computer Research and Development, 2016, 53(10): 2323−2333 (in Chinese)
|
[17] |
Yu Yao, Li Fuliang, Liu Shumei, et al. Reliable fog-based crowdsourcing: A temporal-spatial task allocation approach[J]. IEEE Internet of Things Journal, 2020, 7(5): 3968−3976 doi: 10.1109/JIOT.2019.2957035
|
[18] |
Belotti M, Bozic N, Secci S. A vademecum on blockchain technologies: when, which, and how[J]. IEEE Communications Surveys and Tutorials, 2015, 21(4): 3796−3838
|
[19] |
Ning Zhaoling, Zhang Kaiyuan, Wang Xiaojie, et al. Intelligent edge computing in Internet of vehicles: A joint computation offloading and caching solution[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(4): 2212−2225 doi: 10.1109/TITS.2020.2997832
|
[20] |
Ning Zhaolong, Dong Peiran, Wang Xiaojie, et al. Mobile edge computing enabled 5G health monitoring for Internet of medical things: A decentralized game theoretic approach[J]. IEEE Journal on Selected Areas in Communications, 2021, 39(2): 463−478 doi: 10.1109/JSAC.2020.3020645
|
[21] |
Yang Bo, Cao Xuelin, Li Xiangfang, et al. Mobile-edge-computing-based hierarchical machine learning tasks distribution for IoT[J]. IEEE Internet of Things Journal, 2020, 7(3): 2169−2180 doi: 10.1109/JIOT.2019.2959035
|
[22] |
Pan Jianlin, Wang Jianyu, Hester A, et al. Edgechain: An edge-IoT framework and prototype based on blockchain and smart contracts[J]. IEEE Internet of Things Journal, 2019, 6(3): 4719−4732 doi: 10.1109/JIOT.2018.2878154
|
[23] |
刘敖迪,杜学绘,王娜,等. 区块链技术及其在信息安全领域的研究进展[J]. 软件学报,2018,29(7):2092−2115
Liu Aodi, Du Xuehui, Wang Na, et al. Block chain technology and its research progress in the field of information security[J]. Journal of Software, 2018, 29(7): 2092−2115 (in Chinese)
|
[24] |
Asayag A, Cohen G, Grayevsky I, et al. Helix: A scalable and fair consensus algorithm[C] //Proc of the 26th IEEE Int Conf on Network Protocols (ICNP). Piscataway, NJ: IEEE, 2018: 863−885
|
[25] |
Cheng R, Zhang Fan, Kos J, et al. Ekiden: A platform for confidentiality preserving, trustworthy, and performant smart contracts[C] //Proc of the 4th IEEE European Symp on Security and Privacy (EuroS&P). Piscataway, NJ: IEEE, 2019: 185−200
|
[26] |
Kate A, Zaverucha G M, Goldberg I. Constant-size commitments to polynomials and their applications[C] //Proc of the 16th Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2010: 177−194
|
[27] |
Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 24(11): 612−613
|
[28] |
Cheng Qi, Hsu C, Xia Zhe, et al. Fast multivariate-polynomial-based membership authentication and key establishment for secure group communications in WSN[J]. IEEE Access, 2020, 8: 71833−71839
|
[29] |
Albakri A, Harn L. Non-interactive group key pre-distribution scheme(GKPS) for end-to-end routing in wireless sensor networks[J]. IEEE Access, 2019, 7: 31615−31623
|
[30] |
Ching-Fang H, Lein H, Bing Z. UMKESS: User-oriented multi-group key establishments using secret sharing[J]. Wireless Networks, 2020, 26(1): 421−430 doi: 10.1007/s11276-018-1825-x
|
[31] |
Wei Lu, Cui Jie, Xu Yan, et al. Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 1681−1695
|
[32] |
Harn L, Hsu C, Li Bohan. Centralized group key establishment protocol without a mutually trusted third party[J]. Mobile Networks and Applications, 2018, 23(5): 1132−1140 doi: 10.1007/s11036-016-0776-7
|
[1] | Zhou Yousheng, Wang Feng, Qing Sihan, Yang Yixian, Niu Xinxin. Dynamic Multi-Secret Sharing Scheme Based on Cellular Automata[J]. Journal of Computer Research and Development, 2012, 49(9): 1999-2004. |
[2] | Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698. |
[3] | Ye Jianwei, Zhang Hongli, Zhang Yongzheng. A Secure Mobile Code Protocol Based on Committed Garbled Circuit[J]. Journal of Computer Research and Development, 2011, 48(5): 862-868. |
[4] | Wang Gang, Wen Tao, Guo Quan, Ma Xuebin. An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development, 2010, 47(5): 911-920. |
[5] | Zhang Haibo, Wang Xiaofei, and Huang Youpeng. General Results on Secret Sharing Based on General Access Structure[J]. Journal of Computer Research and Development, 2010, 47(2): 207-215. |
[6] | Huang Dongping, Liu Duo, and Dai Yiqi. Weighted Threshold Secret Sharing[J]. Journal of Computer Research and Development, 2007, 44(8): 1378-1382. |
[7] | Pang Liaojun, Jiang Zhengtao, and Wang Yumin. A Multi-Secret Sharing Scheme Based on the General Access Structure[J]. Journal of Computer Research and Development, 2006, 43(1): 33-38. |
[8] | Yu Jia, Li Daxing, Fan Yuling. Verifiable Secret Redistribution Protocol Based on Additive Sharing[J]. Journal of Computer Research and Development, 2006, 43(1): 23-27. |
[9] | Sui Hongfei, Chen Jian'er, Chen Songqiao, and Zhu Nafei. Secret Sharing-Based Rerouting in Rerouting-Based Anonymous Communication Systems[J]. Journal of Computer Research and Development, 2005, 42(10): 1660-1666. |
[10] | Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882. |
1. |
奉钰鑫,何凯,魏银珍. 基于区块链的工业互联网安全防护研究与实践. 网络空间安全. 2024(03): 113-117 .
![]() | |
2. |
王后珍,秦婉颖,刘芹,余纯武,沈志东. 基于身份的群组密钥分发方案. 计算机研究与发展. 2023(10): 2203-2217 .
![]() | |
3. |
何智旺,王化群. 面向车联网的匿名组密钥分发方案. 网络与信息安全学报. 2023(05): 127-137 .
![]() |