SWORD: A Secure LoW-Latency Offline-First Authentication and Data Sharing Scheme for Resource Constrained Distributed Networks
- URL: http://arxiv.org/abs/2601.12875v1
- Date: Mon, 19 Jan 2026 09:30:59 GMT
- Title: SWORD: A Secure LoW-Latency Offline-First Authentication and Data Sharing Scheme for Resource Constrained Distributed Networks
- Authors: Faisal Haque Bappy, Tahrim Hossain, Raiful Hasan, Kamrul Hasan, Mohamed Younis, Tariqul Islam,
- Abstract summary: We introduce SWORD, a novel offline-first authentication and data-sharing scheme designed specifically for resource-constrained networks.<n>We show that SWORD outperforms traditional blockchain-based solutions while offering similar resource efficiency and authentication latency to central-server-based solutions.<n>We also provide a comprehensive security analysis, demonstrating that SWORD is resilient against spoofing, impersonation, replay, and man-in-the-middle attacks.
- Score: 4.508890174691615
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: While many resource-constrained networks, such as Internet of Things (IoT) and Internet of Vehicles (IoV), are inherently distributed, the majority still rely on central servers for fast authentication and data sharing. Blockchain-based solutions offer decentralized alternatives but often struggle to meet the stringent latency requirements of real-time applications. Even with the rollout of 5G, network latency between servers and peers remains a significant challenge. To address this, we introduce SWORD, a novel offline-first authentication and data-sharing scheme designed specifically for resource-constrained networks. SWORD utilizes a proximity-based clustering approach to enable offline authentication and data sharing, ensuring low-latency, secure operations even in intermittently connected scenarios. Our experimental results show that SWORD outperforms traditional blockchain-based solutions while offering similar resource efficiency and authentication latency to central-server-based solutions. Additionally, we provide a comprehensive security analysis, demonstrating that SWORD is resilient against spoofing, impersonation, replay, and man-in-the-middle attacks.
Related papers
- A Secure and Private Distributed Bayesian Federated Learning Design [56.92336577799572]
Distributed Federated Learning (DFL) enables decentralized model training across large-scale systems without a central parameter server.<n>DFL faces three critical challenges: privacy leakage from honest-but-curious neighbors, slow convergence due to the lack of central coordination, and vulnerability to Byzantine adversaries aiming to degrade model accuracy.<n>We propose a novel DFL framework that integrates Byzantine robustness, privacy preservation, and convergence acceleration.
arXiv Detail & Related papers (2026-02-23T16:12:02Z) - Efficient Asynchronous Federated Evaluation with Strategy Similarity Awareness for Intent-Based Networking in Industrial Internet of Things [42.55497517367321]
We propose FEIBN, a Federated Evaluation Enhanced Intent-Based Networking framework.<n>We show that SSAFL can improve model accuracy, accelerate model convergence, and reduce the cost by 27.8% with SemiAsyn.
arXiv Detail & Related papers (2025-11-28T09:03:26Z) - Towards a Decentralized IoT Onboarding for Smart Homes Using Consortium Blockchain [2.992414059774663]
This paper presents a novel framework for secure on-boarding of smart home devices.<n>By integrating consortium blockchain technology, we propose a decentralized mechanism that enhances transparency, security, and monitoring.<n>A prototype implementation demonstrates the system's viability in smart home settings, with verification completing in 0.34 seconds.
arXiv Detail & Related papers (2025-08-29T10:05:22Z) - Markov Chain-based Model of Blockchain Radio Access Networks [65.59619477031194]
One wireless access approach that has captured attention is blockchain enabled RAN (B-RAN)<n>This research introduces a framework that integrates blockchain technology into RAN while also addressing the limitations of state-of-the-art models.<n>Results demonstrate reduced latency and comparable security making the presented framework suitable for diverse application scenarios.
arXiv Detail & Related papers (2025-08-20T08:28:30Z) - Hard-Earned Lessons in Access Control at Scale: Enforcing Identity and Policy Across Trust Boundaries with Reverse Proxies and mTLS [0.5371337604556311]
In today's enterprise environment, traditional access methods such as Virtual Private Networks (VPNs) and application-specific Single Sign-On (SSO) often fall short when it comes to securely scaling access for a distributed and dynamic workforce.<n>This paper presents our experience implementing a modern, Zero Trust-aligned architecture that leverages a reverse proxy integrated with Mutual TLS (mTLS) and centralized SSO.<n>This multidimensional solution involves both per-device and per-user authentication, centralized enforcement of security policies, and comprehensive observability.
arXiv Detail & Related papers (2025-08-03T17:32:11Z) - FAuNO: Semi-Asynchronous Federated Reinforcement Learning Framework for Task Offloading in Edge Systems [41.364418162255184]
We present textbfFAuNO -- emphFederated Asynchronous Network Orchestrator -- a buffered, asynchronous emphfederated reinforcement-learning framework for decentralized task offloading in edge systems.<n>Experiments in the emphPeersimGym environment show that FAuNO consistently matches or exceeds federated multi-agent RL baselines in reducing task loss and latency.
arXiv Detail & Related papers (2025-06-03T09:15:03Z) - GenTorrent: Scaling Large Language Model Serving with An Overlay Network [17.16959239252628]
We propose GenTorrent, an LLM serving overlay that harnesses computing resources from decentralized contributors.<n>We identify four key research problems inherent to enabling such a decentralized infrastructure.<n>We believe this work pioneers a new direction for democratizing and scaling future AI serving capabilities.
arXiv Detail & Related papers (2025-04-27T01:08:25Z) - Intelligent Detection of Non-Essential IoT Traffic on the Home Gateway [45.70482328441101]
This work presents ML-IoTrim, a system for detecting and mitigating non-essential IoT traffic by analyzing network behavior at the edge.<n>We test our framework in a consumer smart home setup with IoT devices from five categories, demonstrating that the model can accurately identify and block non-essential traffic.<n>This research advances privacy-aware traffic control in smart homes, paving the way for future developments in IoT device privacy.
arXiv Detail & Related papers (2025-04-22T09:40:05Z) - Efficient and Secure Cross-Domain Data-Sharing for Resource-Constrained Internet of Things [2.5284780091135994]
We propose an efficient, secure blockchain-based data-sharing scheme for the Internet of Things.
First, our scheme adopts a distributed key generation method, which avoids single point of failure.
Also, the scheme provides a complete data-sharing process, covering data uploading, storage, and sharing, while ensuring data traceability, integrity, and privacy.
arXiv Detail & Related papers (2024-11-14T06:53:03Z) - An Integrated Blockchain and IPFS Solution for Secure and Efficient Source Code Repository Hosting using Middleman Approach [0.9895793818721335]
This study introduces a novel hybrid architecture combining the security of the blockchain and the InterPlanetary File System.<n>Our results demonstrate that this architecture achieves a secure, auditable, and resilient platform for source code hosting.
arXiv Detail & Related papers (2024-09-22T16:57:38Z) - A Trustworthy AIoT-enabled Localization System via Federated Learning and Blockchain [29.968086297894626]
We propose a framework named DFLoc to achieve precise 3D localization tasks.
Specifically, we address the issue of single-point failure for a reliable and accurate indoor localization system.
We introduce an updated model verification mechanism within the blockchain to alleviate the concern of malicious node attacks.
arXiv Detail & Related papers (2024-07-08T04:14:19Z) - Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds [42.37170902465878]
Decentralized Physical Infrastructure Networks (DePINs) aim to enhance data sovereignty and confidentiality and increase resilience against a single point of failure.
This work focuses on the potential of DePINs to disrupt traditional centralized architectures by taking advantage of the Internet of Things (IoT) devices and crypto-economic design in combination with blockchains.
arXiv Detail & Related papers (2024-04-12T08:00:38Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - BSAC-CoEx: Coexistence of URLLC and Distributed Learning Services via Device Selection [46.59702442756128]
High-priority ultra-reliable low latency communication (URLLC) and low-priority distributed learning services run concurrently over a network.<n>We formulate this problem as a Markov decision process and address it via BSAC-CoEx, a framework based on the branching soft actor-critic (BSAC) algorithm.<n>Our solution can significantly decrease the training delays of the distributed learning service while keeping the URLLC availability above its required threshold.
arXiv Detail & Related papers (2022-12-22T15:36:15Z) - Decentralized Learning for Channel Allocation in IoT Networks over
Unlicensed Bandwidth as a Contextual Multi-player Multi-armed Bandit Game [134.88020946767404]
We study a decentralized channel allocation problem in an ad-hoc Internet of Things network underlaying on the spectrum licensed to a primary cellular network.
Our study maps this problem into a contextual multi-player, multi-armed bandit game, and proposes a purely decentralized, three-stage policy learning algorithm through trial-and-error.
arXiv Detail & Related papers (2020-03-30T10:05:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.