ADVERTISEMENT

Home|Journals|Articles by Year|Audio Abstracts
 

Original Article

JJCIT. 2025; 11(1): 100-116


Blockchain-based Device Authentication in Edge Computing using Quantum Approach

Vinayak Telsang, Mahabaleshwar Kakkasageri, Anil Devangavi.




Abstract

The Internet of things (IoT) is emerged as a new technology where everything is connected. Large amount of data need to be stored for processing; hence, edge computing can reduce the storage of data in a distributed environment, which enhances processing speed and low usage of bandwidth. With an ever increasing use of IoT devices, issues such as authentication of devices, privacy of data stored, and integrity of data have also increased. The authentication of devices is a major concern for edge-connected IoT devices. The problem was solved by using classical cryptographic algorithms such as Elliptic Curve Cryptography (ECC), Rivest-Shamir-Adleman (RSA), and Diffie-Hellman (DH) for message encryption by using public and private keys that need to be stored. These keys need to be stored on a server for device authentication. In device authentication, storing many keys leads to more computation and storage costs and also increase in delay. With quantum computing and quantum algorithms such as Shor’s and Grover’s, it becomes easy to break the keys of cryptographic algorithms, making the system vulnerable. The proposed work Blockchain based Device Authentication in Edge Computing using Quantum Approach
(BDAEC-QA) provides authentication for IoT devices using it’s context information, quantum key distribution (QKD) and blockchain. The proposed scheme uses the smart contracts to store an information of the IoT devices on the server side, which is used by blockchain to provide secure authentication between the edge server and the IoT devices. The proposed scheme also provides communication between IoT devices across the network. The proposed work is compared with “Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing" (LTBA), and “A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing" (BBMA), and has less registration, key generation and authentication delay respectively. The BDAEC-QA scheme uses less
computation and storage costs as compared with other existing schemes. The proposed scheme is simulated using the AVISPA tool, to provide the security proofs and analysis that indicate BDAEC-QA scheme is resistant to well-known attacks.

Key words: IoT, 5G, Data Security, Cryptic Algorithms, Blockchain






Full-text options


Share this Article


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Author Tools
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.