{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T04:21:11Z","timestamp":1765254071326,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"17","license":[{"start":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872138 and 61772185"],"award-info":[{"award-number":["61872138 and 61772185"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rapid development of mobile networks, there are more and more application scenarios that require group communication. For example, in mobile edge computing, group communication can be used to transmit messages to all group members with minimal resources. The group key directly affects the security of the group communication. Most existing group key agreement protocols are often flawed in performance, scalability, forward or backward secrecy, or single node failure. Therefore, this paper proposes a blockchain-based authentication and dynamic group key agreement protocol. With our protocol, each group member only needs to authenticate its left neighbor once to complete the authentication, which improved authentication efficiency. In addition, our protocol guarantees the forward secrecy of group members after joining the group and the backward secrecy of group members after leaving the group. Based on blockchain technology, we solve the problem of single node failure. Furthermore, we use mathematics to prove the correctness and security of our protocol, and the comparison to related protocols shows that our protocol reduces computation and communication costs.<\/jats:p>","DOI":"10.3390\/s20174835","type":"journal-article","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T08:05:18Z","timestamp":1598515518000},"page":"4835","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6861-5277","authenticated-orcid":false,"given":"Zisang","family":"Xu","sequence":"first","affiliation":[{"name":"Computer and Communication Engineer Institute, Changsha University of Science and Technology, Changsha 410114, China"}]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"Computer and Communication Engineer Institute, Changsha University of Science and Technology, Changsha 410114, China"}]},{"given":"Han","family":"Deng","sequence":"additional","affiliation":[{"name":"Big data development and Research Center, Guangzhou College of Technology and Business, Guangzhou 528138, China"}]},{"given":"Minfu","family":"Tan","sequence":"additional","affiliation":[{"name":"Big data development and Research Center, Guangzhou College of Technology and Business, Guangzhou 528138, China"}]},{"given":"Jixin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hubei University of Technology, Wuhan 430068, China"}]},{"given":"Jianbo","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,8,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","article-title":"A survey of key management for secure group communication","volume":"35","author":"Rafaeli","year":"2003","journal-title":"ACM Comput. Surv. CSUR"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4218","DOI":"10.1109\/JIOT.2020.2966870","article-title":"Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things","volume":"7","author":"Wang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","article-title":"Mobile edge computing: A survey on architecture and computation offloading","volume":"19","author":"Mach","year":"2017","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/BF01200847","article-title":"Multicast security and its extension to a mobile environment","volume":"1","author":"Gong","year":"1995","journal-title":"Wirel. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"6392","DOI":"10.1109\/JIOT.2020.2974281","article-title":"Deep reinforcement learning for resource protection and real-time detection in IoT environment","volume":"7","author":"Liang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1109\/TII.2019.2962844","article-title":"Privacy-enhanced data collection based on deep learning for Internet of vehicles","volume":"16","author":"Wang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.future.2017.07.002","article-title":"A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs","volume":"84","author":"Islam","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1186\/s13673-019-0186-5","article-title":"A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks","volume":"9","author":"Naresh","year":"2019","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zheng, J., Yang, C., Xue, J., and Zhang, C. (2015, January 12\u201313). A Dynamic ID-based Authenticated Group Key Agreement Protocol. Proceedings of the 2015 4th National Conference on Electrical, Electronics and Computer Engineering, Xi\u2019an, China.","DOI":"10.2991\/nceece-15.2016.192"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/s10916-019-1445-8","article-title":"A systematic review for enabling of develop a blockchain technology in healthcare application: Taxonomy, substantially analysis, motivations, challenges, recommendations and future direction","volume":"43","author":"Hussien","year":"2019","journal-title":"J. Med. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zubaydi, H.D., Chong, Y.W., Ko, K., Hanshi, S.M., and Karuppayah, S. (2019). A review on the role of blockchain technology in the healthcare domain. Electronics, 8.","DOI":"10.3390\/electronics8060679"},{"key":"ref_12","first-page":"3","article-title":"A survey on group key management schemes","volume":"15","author":"Seetha","year":"2015","journal-title":"Cybern. Inf. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.17485\/ijst\/2016\/v9i14\/87972","article-title":"A survey on efficient group key management schemes in wireless networks","volume":"9","author":"Barskar","year":"2016","journal-title":"Indian J. Sci. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/90.836475","article-title":"Secure group communications using key graphs","volume":"8","author":"Wong","year":"2000","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/263109.263179","article-title":"Iolus: A framework for scalable secure multicasting","volume":"Volume 27","author":"Mittra","year":"1997","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"ref_16","unstructured":"Setia, S., Koussih, S., Jajodia, S., and Harder, E. (2000, January 14\u201317). Kronos: A scalable group re-keying approach for secure multicast. Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000, Berkeley, CA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Gupta, S., Kumar, A., and Kumar, N. (2018, January 15\u201317). Design of ECC based authenticated group key agreement protocol using self-certified public keys. Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India.","DOI":"10.1109\/RAIT.2018.8388999"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1049\/cje.2018.07.002","article-title":"Multi-domain lightweight asymmetric group key agreement","volume":"27","author":"Zheng","year":"2018","journal-title":"Chin. J. Electron."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.ins.2019.06.067","article-title":"Constant-round authenticated and dynamic group key agreement protocol for D2D group communications","volume":"503","author":"Wang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., and Shacham, H. (2001, January 9\u201313). Short signatures from the Weil pairing. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"24064","DOI":"10.1109\/ACCESS.2018.2799007","article-title":"A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/s10916-019-1378-2","article-title":"An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System","volume":"43","author":"Kavitha","year":"2019","journal-title":"J. Med. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1109\/MINES.2009.35","article-title":"A secure certificateless authenticated group key agreement protocol","volume":"Volume 1","author":"Geng","year":"2009","journal-title":"Proceedings of the 2009 International Conference on Multimedia Information Networking and Security"},{"key":"ref_24","first-page":"1727","article-title":"Identity-based authenticated asymmetric group key agreement","volume":"51","author":"Zhang","year":"2014","journal-title":"J. Comput. Res. Dev."},{"key":"ref_25","first-page":"757","article-title":"ID-based one round authenticated group key agreement protocol with bilinear pairings","volume":"Volume 1","author":"Shi","year":"2005","journal-title":"Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC\u201905)-Volume II"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3145","DOI":"10.1007\/s10586-018-2008-3","article-title":"A method for obtaining authenticated scalable and efficient group key agreement for wireless ad-hoc networks","volume":"22","author":"Alphonse","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Russell, A., David, B., and Oliynykov, R. (2017, January 18\u201322). Ouroboros: A provably secure proof-of-stake blockchain protocol. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"6543","DOI":"10.1109\/TII.2020.2966069","article-title":"Secure data storage and recovery in industrial blockchain network environments","volume":"16","author":"Liang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Liang, W., Zhang, D., Lei, X., Tang, M., Li, K.C., and Zomaya, A. (2020). Circuit Copyright Blockchain: Blockchain-based Homomorphic Encryption for IP Circuit Protection. IEEE Trans. Emerg. Top. Comput.","DOI":"10.1109\/TETC.2020.2993032"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Franklin, M.K., and Reiter, M.K. (1997, January 1\u20134). Fair exchange with a semi-trusted third party. Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland.","DOI":"10.1145\/266420.266424"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"e5295","DOI":"10.1002\/cpe.5295","article-title":"A lightweight anonymous mutual authentication and key agreement scheme for WBAN","volume":"31","author":"Xu","year":"2019","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"367","DOI":"10.3233\/JCS-171013","article-title":"Automated reasoning for equivalences in the applied pi calculus with barriers","volume":"26","author":"Blanchet","year":"2018","journal-title":"J. Comput. Secur."},{"key":"ref_33","unstructured":"Carman, D.W., Kruus, P.S., and Matt, B.J. (2000). Constraints and Approaches for Distributed Sensor Network Security (Final), The Security Research Division of Network Associates Inc. Technical Report."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.cose.2011.08.008","article-title":"Constant round group key agreement protocols: A comparative study","volume":"30","author":"Makri","year":"2011","journal-title":"Comput. Secur."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","article-title":"Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures","volume":"119","author":"He","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/17\/4835\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:07:25Z","timestamp":1760177245000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/17\/4835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,27]]},"references-count":35,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["s20174835"],"URL":"https:\/\/doi.org\/10.3390\/s20174835","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,8,27]]}}}