Abstract
Blockchain-based mobile edge computing (BMEC) solves the problem of limited computing resources of devices in the Internet of Things (IoT). However, there are some security threats in the blockchain environment, among which the attacks against consensus algorithms are particularly serious, such as double-spending attacks and long-range attacks. These attacks target the block proposal or validation process, which compromise the integrity of the BMEC by overwriting the correct block record with the wrong block record. In this article,we propose a scheme to solve the above problem by using the cooperative threshold signature and group management scheme to protect the block validity. The blockchain process of a single node is controlled in a group cooperative way, and each new block is regarded as a valid block only if it has a valid threshold signature for the group to which it belongs. Concretely, the system is initialized by a cooperative distributed key generation protocol, the device management protocol uses a resident node to ensure the security and efficiency of device join and leave, and the signature issuing protocol can tolerate a certain degree of exceptions of nodes within the group. We analyze the resistance ability of the scheme against consensus attacks, prove the security of the scheme, and analyze the computing and communication efficiency. Experimental evaluations on the protocols of the proposed scheme have been conducted on cloud virtual machines and embedded boards, including Raspberry Pi and UP2 Grove, which indicated that the scheme is efficient in practical scenarios.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.