BTNC: A blockchain based trusted network connection protocol in IoT

Abstract Along with the rapid growth of the size and complexity of Internet of Things (IoT), the security of terminal devices has increasingly become a focus. In order to ensure the security of terminals, the trusted network connect (TNC) could realize not only the user authentication but also the platform attestation during the network access process. However, the existing TNC infrastructure is based on a centralized architecture, which is not suitable for distributed services. To address this problem, we present a blockchain-based TNC protocol named BTNC to ensure the reliability of terminals in IoT. Due to the decentralization, trustlessness, trackability, and immutability features of blockchain, BTNC is able to verify the security of terminal devices in IoT networks. First, we come up with some threats, including unauthorized user, illegal platform and platform replacement attack, then correspondingly define the security goals of our scheme. Second, combining key exchange protocol based on blockchain and D–H PN protocol included in TNC specification, we propose a blockchain-based trusted network connection protocol, which realizes mutual user authentication, platform attestation and trust network access by cryptography among terminals in IoT. Third, we make a security analysis in the PCL mode and conclude that our protocol can resist the attacks above. Finally, the performance overheads caused by our scheme are evaluated and the experiments show that it is efficient and feasible for different kinds of terminals in IoT.

[1]  Keke Gai,et al.  Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..

[2]  Yang Liu,et al.  EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid , 2020, IEEE Transactions on Industrial Informatics.

[3]  Bin Zhao,et al.  Efficient ID-based registration protocol featured with user anonymity in mobile IP networks , 2010, IEEE Transactions on Wireless Communications.

[4]  Keke Gai,et al.  Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.

[5]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[6]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[7]  Keke Gai,et al.  Blockchain-Enabled Reengineering of Cloud Datacenters , 2018, IEEE Cloud Computing.

[8]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[9]  Feng Hao,et al.  Authenticated Key Exchange over Bitcoin , 2015, SSR.

[10]  Jamie Cross,et al.  Application of Airborne LiDAR Data and Geographic Information Systems (GIS) to Develop a Distributed Generation System for the Town of Normal, IL , 2015 .

[11]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[12]  Keke Gai,et al.  Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things , 2018, IEEE Internet of Things Journal.

[13]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[14]  Keke Gai,et al.  Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.

[15]  Kwangjo Kim,et al.  TM-Coin: Trustworthy management of TCB measurements in IoT , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[16]  Chao Yang,et al.  BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems , 2018, Journal of Medical Systems.

[17]  Ximeng Liu,et al.  Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory , 2019, IEEE Transactions on Vehicular Technology.

[18]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[19]  Victor C. M. Leung,et al.  Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[20]  Bojan Cukic,et al.  Trust-Based Development Framework for Distributed Systems and IoT , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[21]  Jianfeng Ma,et al.  Universally composable secure TNC model and EAP-TNC protocol in IF-T , 2010, Science China Information Sciences.

[22]  Keke Gai,et al.  Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[23]  William L. Anderson,et al.  The Microsoft Corporation in Collision with Antitrust Law , 2001 .

[24]  Meikang Qiu,et al.  Differential Privacy-Based Blockchain for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.

[25]  Chao Yang,et al.  LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices , 2018, Wirel. Commun. Mob. Comput..

[26]  Keke Gai,et al.  Multi-Access Filtering for Privacy-Preserving Fog Computing , 2022, IEEE Transactions on Cloud Computing.

[27]  Anupam Datta,et al.  Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations , 2005 .

[28]  Rüdiger Schollmeier,et al.  A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[29]  Arvind Narayanan,et al.  Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .

[30]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[31]  Keke Gai,et al.  Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.

[32]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[33]  Yang Liu,et al.  Lightweight Privacy-Preserving Ensemble Classification for Face Recognition , 2019, IEEE Internet of Things Journal.

[34]  Feifei Li,et al.  Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices , 2019, IEEE Internet of Things Journal.

[35]  Keke Gai,et al.  A survey on FinTech , 2018, J. Netw. Comput. Appl..

[36]  Yang Liu,et al.  Privacy-Preserving Object Detection for Medical Images With Faster R-CNN , 2019, IEEE Transactions on Information Forensics and Security.