Skip to main content

Improving the Key Exchange Process of the eXtended Triple Diffie-Hellman Protocol with Blockchain

  • Conference paper
  • First Online:
  • 276 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1617))

Abstract

The demand for safeguarding communications between people and equipment has been driven by recent breakthroughs in miniature smart data gathering devices. Traditional techniques based on key exchange protocols cannot be implemented by resource-constrained embedded devices, therefore the BlockChain-Based X3DH (BCB-X3DH) protocol, which is based on a resilient decentralization of the eXtended Triple Diffie-Hellman (X3DH) protocol, has been developed. This work extends the analysis to fit a generic Smart City scenario with Edge and IoT nodes, using intensive analysis on Raspberry Pi 3 model B+ and Raspberry Pi 4 to verify that the new protocol is not only resistant to well-known distributed attacks, but can also be executed by miniaturized hardware, saving resources, energy, and battery life.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  2. Marlinspike, M., Perrin, T.: The x3dh key agreement protocol. Open Whisper Systems (2016)

    Google Scholar 

  3. Ruggeri, A., Celesti, A., Fazio, M., Galletta, A., Villari, M.: Bcb-x3dh: a blockchain based improved version of the extended triple diffie-hellman protocol. In: 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 73–78. IEEE (2020)

    Google Scholar 

  4. Ruggeri, A., Fazio, M., Celesti, A., Villari, M.: Blockchain-based healthcare workflows in federated hospital clouds. In: Brogi, A., Zimmermann, W., Kritikos, K. (eds.) ESOCC 2020. LNCS, vol. 12054, pp. 113–121. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44769-4_9

    Chapter  Google Scholar 

  5. Sengupta, J., Ruj, S., Bit, S.D.: A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J. Netw. Comput. Appl. 149, 102481 (2020)

    Article  Google Scholar 

  6. Sodhro, A.H., Pirbhulal, S., Muzammal, M., Zongwei, L.: Towards blockchain-enabled security technique for industrial internet of things based decentralized applications. J. Grid Comput. 18, 1–14 (2020)

    Article  Google Scholar 

  7. Zhang, P., White, J., Schmidt, D., Lenz, G., Rosenbloom, S.: Fhirchain: applying blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16, 07 (2018)

    Article  Google Scholar 

  8. Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E., Yang, C.: The blockchain as a decentralized security framework [future directions]. IEEE Cons. Electron. Maga. 7(2), 18–21 (2018)

    Article  Google Scholar 

  9. Santos, A.C., Soares Filho, J.L., Silva, Á.Í., Nigam, V., Fonseca, I.E.: Ble injection-free attack: a novel attack on bluetooth low energy devices. J. Ambient Intell. Humanized Comput., 1–11 (2019)

    Google Scholar 

  10. Sen, S.: Context-aware energy-efficient communication for iot sensor nodes. In: 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE (2016)

    Google Scholar 

  11. Suárez-Albela, M., Fernández-Caramés, T.M., Fraga-Lamas, P., Castedo, L.: A practical performance comparison of ecc and rsa for resource-constrained iot devices. In: 2018 Global Internet of Things Summit (GIoTS), pp. 1–6 (2018)

    Google Scholar 

  12. Singh, S., Sharma, P.K., Yoon, B., Shojafar, M., Cho, G.H., Ra, I.-H.: Convergence of blockchain and artificial intelligence in iot network for the sustainable smart city. Sustain. Cities Soc. 63, 102364 (2020)

    Article  Google Scholar 

  13. Mallik, A., Ahsan, A., Shahadat, M., Tsou, J.: Man-in-the-middle-attack: understanding in simple words. Int. J. Data Netw. Sci. 3(2), 77–92 (2019)

    Article  Google Scholar 

  14. Bhushan, K., Gupta, B.B.: Distributed denial of service (ddos) attack mitigation in software defined network (sdn)-based cloud computing environment. J. Ambient Intell. Humanized Comput. 10(5), 1985–1997 (2019)

    Article  Google Scholar 

  15. Ruggeri, A., Celesti, A., Galletta, A., Fazio, M., Villari, M.: An innovative blockchain based application of the extended triple diffie-hellman protocol for iot. In: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE (2021)

    Google Scholar 

  16. Infura. https://infura.io/. Accessed 22 July 2021

  17. INA219. Bidirectional Current/Power Monitor With I2C Interface. https://www.rototron.info/wp-content/uploads/INA219_datasheet.pdf. Accessed 22 July 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Armando Ruggeri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ruggeri, A., Villari, M. (2022). Improving the Key Exchange Process of the eXtended Triple Diffie-Hellman Protocol with Blockchain. In: Zirpins, C., et al. Advances in Service-Oriented and Cloud Computing. ESOCC 2022. Communications in Computer and Information Science, vol 1617. Springer, Cham. https://doi.org/10.1007/978-3-031-23298-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23298-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23297-8

  • Online ISBN: 978-3-031-23298-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics