Source : IEEE Access, Vol. 6, pp , Jan. 2018

Slides:



Advertisements
Similar presentations
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
Advertisements

Efficient key Distribution Schemes for Secure Media Delivery in Pay-TV Systems Source: IEEE TRANS. ON MULTIMEDIA, VOL. 6,NO. 5, OCTOBER 2004 Authors: Yu-Lun.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
Topic 22: Digital Schemes (2)
1 A Secure System Based on Fingerprint Authentication Scheme Author : Zhe Wu,Jie Tian,Liang Li, Cai-ping Jiang,Xin Yang Prestented by Chia Jui Hsu.
An ID-Based Mutual Authentication and Key Exchange Protocol for Low- Power Mobile Devices Authors: Tsu-Yang Wu and Yuh-Min Tseng Source: The Computer Journal.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
Author: Hangyang Dai and Hongbing Xu
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Lightweight Mutual Authentication for IoT and Its Applications
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Reporter :Chien-Wen Huang
Source : IEEE Access, In Press, 2016
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Time-Bound Hierarchical Key Assignment Scheme
A flexible date-attachment scheme on e-cash
Chair Professor Chin-Chen Chang Feng Chia University
Practical E-Payment Scheme
Image camouflage by reversible image transformation
Privacy Preserving Ranked Multi-Keyword
QR Code Authentication with Embedded Message Authentication Code
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Source: Ad Hoc Networks, Vol. 71, pp , 2018
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Improved joint reversible data hiding in encrypted images
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Source: Signal Processing, Vol. 125, pp , August 2016.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Access, Vol. 5, pp –14767, July 2017.
SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
New Framework for Reversible Data Hiding in Encrypted Domain
Secret Image Sharing Based on Encrypted Pixels
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Rich QR Codes With Three-Layer Information Using Hamming Code
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

Secure Pub-Sub: Blockchain-based Fair Payment with Reputation for Reliable Cyber Physical Systems Source : IEEE Access, Vol. 6, pp. 12295-12303, Jan. 2018 Authors : Yanqi Zhao, Yong Yu, Yannan Li, Qilin Mu, Bo Yang Speaker : Fengyu Chiu Date : 2018/10/1

Outline Introduction Preliminaries Proposed scheme Potential attacks Security analysis Performance analysis Conclusions

Introduction Publisher Broker Subscriber Blockchain system Subscription Message Match

Preliminaries –smart contract(1/2) Coin Ice cream Store

Preliminaries – Reputation System(2/2) Explicit rating(D) Score: 0-1 Implicit rating(E) Positive activity Negative activity

Proposed scheme Event Make deposit and subscription Blockchain system Payment Topic Publisher Bitcoin and reputation Notification Subscriber Sensors Stream Sensors Stream

Proposed scheme - Setup Security parameters: k Public parameters Choose prime p,q (q|p-1) 𝑔∈ 𝐺 𝑞 Random value 𝑘← {0,1} 𝑘 𝐻 : {0,1} ∗ → 𝐺 𝑞 𝐻 1 : {0,1} 𝑘 → 𝐺 𝑞 Key pair(Pk,SK) 𝑆𝑖𝑔 𝑝 (𝑚)

Proposed scheme - Publish Reputation value: 𝐹 𝑅 Choose 𝑥∈ 𝑍 𝑞 Publisher Computes 𝑦= 𝑔 𝑥 Blockchain system 𝐹 𝑅 , 𝑦 , Topic Threshold: 𝜃 Value d’

Proposed scheme - Subscribe Compute 𝑤=𝐻(Topic) Choose 𝑟 0 ∈ 𝑍 𝑞 Subscriber Blockchain system F Compute 𝐹= {h, 𝑣 1 } ℎ= 𝑔 𝑟 0 , 𝑣 1 = 𝑦 𝑟 0 𝑤 Value b

Proposed scheme - Match Verify 𝐻 Topi c ′ = 𝑣 1 ℎ 𝑥 𝑘 1 ∈ {0,1} 𝑘 Publisher 𝑟 1 ∈ 𝑍 𝑞 Blockchain system F, D, L 𝑘 1 ′ = 𝐻 1 (𝑘, 𝑘 1 ) 𝑧 1 = 𝑔 𝑟 1 𝑧 2 = ℎ 𝑟 1 ∙ 𝑘 1 ′ Symmetric encryption 𝐶=𝐸𝑛𝑐( 𝑘 1 ,𝑀) D : { 𝑧 1 , 𝑧 2 ,𝐶} L = H(F)

Proposed scheme - Verification and Payment 𝐻 1 : {0,1} 𝑘 → 𝐺 𝑞 𝑘 𝑠 ′ = 𝐻 1 −1 𝑘, 𝑘 𝑠 = 𝐻 1 −1 𝑘, 𝑘 1 ′ = 𝑘 1 Verification 𝑘 𝑠 = 𝑧 2 𝑧 1 − 𝑟 0 = 𝑘 1 ′ 𝑘 𝑠 ′ = 𝐻 1 −1 𝑘, 𝑘 𝑠 𝑀=Dec( 𝑘 𝑠 ′ ,𝐶) Publisher Subscriber 𝐹 𝑅 , L, d’ Blockchain system 𝐹 𝑅 , L, d’ Payment 𝐹 𝑅 , L Value d’ Redeem Value b

Proposed scheme - Others Publisher Redeem value d’ Malicious subscriber Value b Malicious publisher Value d’

Potential attacks Denial of service attack(Dos attack) Unfair attack/Collusion attack Standard deviation Re−Entry attack IP address

Security analysis Confidentiality Symmetric encryption Completeness Fairness Anonymous

Performance analysis(1/2) [10] M. A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel, “Providingbasic security mechanisms in broker-less publish/subscribe systems,” Proc. 4th ACM Int. Conf. Distrib. Event-Based Syst., pp. 3849, Jul. 2010. [8] Y. Baseri, B. Takhaei and J. Mohajeri, “Secure untraceable offline electronic cash system,” Scientia Iranica, 20(3), pp. 637–646, 2013. [11] M. A. Tariq, B. Koldehofe, and K. Rothermel, “Securing broker-less publish/subscribe systems using identity-based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 518-528, Feb. 2014. [41] H. Huang, X. Chen, Q. Wu, X. Huang, and J. Shen, ``Bitcoin-based fair payments for outsourcing computations of fog devices,'' Future Generat. Comput. Syst., vol. 78, pp. 850-858, Jan. 2018. [Online]. Available: https://doi.org/10.1016/j.future.2016.12.016

Performance analysis(2/2) 123

Conclusions Fairness payment Confidentiality of data