Abstract

Pervasive edge computing (PEC) is an emerging paradigm for the industrial Internet of Things (IIoT), and software-defined networks (SDN) offer lower latency services, and massive intelligent devices connectivity for the IIoT. However, the PEC has some issues with data security, and privacy while PEC devices sharing data among edges. What's more, the centralized SDN suffers from single point of attacks such as distributed denial of service (DDoS) from IIoT devices, and has the challenge of data leakage. In this article, we use blockchain, and proxy reencryption (PRE) technologies to tackle these challenges. The blockchain authorizes all devices in the network to improve their credibility, and authenticity. In addition, a blockchain-based data sharing framework that combines a PRE scheme is introduced for secure device-to-device communication in PEC environments. A series of smart contracts are designed for flexible operations of searching, and updating records on the blockchain. The experiments reveal that our design is highly efficient, and has high performance.

Highlights

  • Industrial Internet of Things (IIoT) is a significant application in Industrial 4.0, including machines, computers, and people enabling intelligent industrial operations [1]

  • The IBPRE scheme is utilized by using Java Paring-Based Cryptography library (JPBC)

  • 1) Performance of encryption: To evaluate the performance of file encryption, we design this experiment to test the time cost of encrypting files in various sizes and uploading the crypto keys to the blockchain

Read more

Summary

INTRODUCTION

Industrial Internet of Things (IIoT) is a significant application in Industrial 4.0, including machines, computers, and people enabling intelligent industrial operations [1]. The scheme is suitable for data sharing between devices in the PEC-enabled IIoT environment. Devices encrypt their data by IBPRE and store them in the cloud servers. If curious or malicious members control the PKG, they will get the ability to access users’ data To address this issue, the blockchain is used to manage encryption keys for device data and record the access of keys to realize accountability and enhance data security. 1. We design a secure and privacy-preserved data sharing framework that combines the IBPRE scheme with a consortium blockchain under the SDN-enabled PEC environment. 2. The blockchain technology is used to authorize IIoT devices and provide reliable and credible IIoT devices connectivity for the SDN-enabled PEC environment to improve IIoT network security.

Blockchain for Pervasive Edge Computing and Softwaredefined network
Proxy Re-encryption
Overview
Blockchain Empowered Software-defined network in PEC environments
CASE STUDY
EXPERIMENTS
Authenticity
Data confidentiality
Integrity
Findings
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.