Abstract
Nowadays, electronic messaging is the most used network application, and the authentication between users is a vital property. The most commonly employed approaches to ensure this property are PKI and S/MIME email encryption protocols, but indeed they are facing multiples security threats, such as the MITM attack and EFAIL attack. The blockchain is an innovative technology that overcomes these threats and allows to decentralize sensitive operations while preserving a high level of security. It eliminates the need for trusted intermediaries. The blockchain is accessible to all network nodes and keeps track of all transactions already made. The goal of our work is to propose a secure messaging solution based on the blockchain technology. In this paper, we explain why blockchain would make communications more secure, and we propose a model design for blockchain-based messaging maintaining the performance and security of data recorded on the blockchain, using a smart contract to verify the identities and their associated public keys, and validate the user’s certificate. The system is entirely decentralized and allows users to exchange messages securely.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Schuermann, F.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18, 2084–2092 (2016)
Bano, S., Sonnino, A., Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G.: SoK: consensus in the age of blockchains, arxiv (2016)
Cachin, C., Vukoli, M.: Blockchain Consensus Protocols in the Wild (2016)
Loibi, A.: Namecoin, Seminar innovative Internettechnologien und mobilkommunikation SS2014. IEEE (2014)
Hung, T., Svetinovic, D.: Data analysis of digital currency network: namecoin case study. In: International Conference on Engineering of Complex Computer Systems (2016)
Deepak, K., Shetty, S., Liang, X., Kamhoua, C., Njilla, L.: Consensus Protocols for Blockchain-based Data Provenance: Challenges and Opportunities. IEEE (2017)
Mudliar, K., Parekh, H., Bhavathankar, P.: A comprehensive integration of national identity with blockchain technology. In: 2018 International Conference on Communication, Information and Computing Technology (ICCICT), 2–3 February, Mumbai, India (2018)
Aung, Y.N., Tantidham, T.: Review of Ethereum: smart home case study. In: 2017 2nd International Conference on Information Technology (INCIT) (2017)
Ward, M.: Untangling Blockchain: A Data Processing View of Blockchain Systems, Elsevier Information Security Technical report, pp. 89–92 (2006)
Tewari, H., Nuallain, E.: Netcoin: A Traceable P2P Electronic Cash System. IEEE (2016)
Guy, Z., Oz, N., Alex, P.: Decentralized Privacy: Using Blockchain to Protect Personal Data (2018)
Conti, M., Kumar, S., Lal, C., Ruj, S.: A Survey on Security and Privacy Issues of Bitcoin. IEEE (2017)
Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C., Njilla, L.: Consensus Protocols for Blockchain based Data Provenance: Challenges and Opportunities. IEEE (2017)
Kalodner, H., Carlsten, M., Ellenbogen, P., Bonneau, J., Narayanan, A.: An empirical study of Namecoin and lessons for decentralized namespace design. Blockchain (2014)
Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: International Conference on Advanced Computing and Communication Systems (ICACCS 2017)
Mingxia, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., Qijin, C.: A Review on Consensus Algorithm of Blockchain. IEEE (2017)
Dai, F., Shi, Y., Meng, N., Wei, L., Ye, Z.: From bitcoin to cybersecurity: a comparative study of blockchain application and security issues/ICSAI, pp. 975–979 (2017)
Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchain. In: USENIX Annual Technical Conference (2016)
Fronknecht, C., Velicannu, G., Sophia, Y.: CertCoin: A Namecoin Based Decentralized Authentication System (2014)
Khovayko, O., Shumilov, E.: EMCSSL Decentralized identity management, passwordless logins, and client SSL certificates using Emercoin NVS (2016). http://emercoin.com
Andrea, C.: ECDH and ECDSA (2015). https://andrea.corbellini.name/2015/05/30/elliptic-curve-cryptography-ecdh-and-ecdsa
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Khacef, K., Pujolle, G. (2019). Secure Peer-to-Peer Communication Based on Blockchain. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_64
Download citation
DOI: https://doi.org/10.1007/978-3-030-15035-8_64
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15034-1
Online ISBN: 978-3-030-15035-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)