A New Blockchain-Based Authentication Framework for Secure IoT Networks

被引:18
作者
Al Hwaitat, Ahmad K. [1 ]
Almaiah, Mohammed Amin [1 ,2 ]
Ali, Aitizaz [3 ]
Al-Otaibi, Shaha [4 ]
Shishakly, Rima [5 ]
Lutfi, Abdalwali [6 ,7 ]
Alrawad, Mahmaod [6 ]
Tripathy, Sushanta
机构
[1] Univ Jordan, King Abdullah IT Sch 2, Dept Comp Sci, Amman 11942, Jordan
[2] INTI Int Univ, Nilai 71800, Malaysia
[3] UNITAR Int Univ, Sch IT, Petaling Jaya 47301, Malaysia
[4] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[5] Ajman Univ, Coll Business Adm, Management Dept, Ajman 346, U Arab Emirates
[6] King Faisal Univ, Coll Business Adm, Al Hasa 31982, Saudi Arabia
[7] Appl Sci Private Univ, Appl Sci Res Ctr, Amman 11931, Jordan
关键词
security; privacy; blockchain; smart contracts; IoT; encryption; transaction; HEALTH-CARE; LIFE-SPAN; SCHEME; CHALLENGES; MAXIMIZE;
D O I
10.3390/electronics12173618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most current research on decentralized IoT applications focuses on a specific vulnerability. However, for IoT applications, only a limited number of techniques are dedicated to handling privacy and trust concerns. To address that, blockchain-based solutions that improve the quality of IoT networks are becoming increasingly used. In the context of IoT security, a blockchain-based authentication framework could be used to store and verify the identities of devices in a decentralized manner, allowing them to communicate with each other and with external systems in a secure and trust-less manner. The main issues in the existing blockchain-based IoT system are the complexity and storage overhead. To solve these research issues, we have proposed a unique approach for a massive IoT system based on a permissions-based blockchain that provides data storage optimization and a lightweight authentication mechanism to the users. The proposed method can provide a solution to most of the applications which rely on blockchain technology, especially in assisting with scalability and optimized storage. Additionally, for the first time, we have integrated homomorphic encryption to encrypt the IoT data at the user's end and upload it to the cloud. The proposed method is compared with other benchmark frameworks based on extensive simulation results. Our research contributes by designing a novel IoT approach based on a trust-aware security approach that increases security and privacy while connecting outstanding IoT services.
引用
收藏
页数:25
相关论文
共 82 条
  • [1] Abualghanam O., 2019, J. Theor. Appl. Inf. Technol., V97, P3217
  • [2] A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities
    AbuAlghanam, Orieb
    Qatawneh, Mohammad
    Almobaideen, Wesam
    Saadeh, Maha
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [3] An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment
    Adil, Muhammad
    Khan, Rahim
    Ali, Jehad
    Roh, Byeong-Hee
    Ta, Qui Thanh Hoai
    Almaiah, Mohammed Amin
    [J]. IEEE ACCESS, 2020, 8 : 163209 - 163224
  • [4] An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks
    Adil, Muhammad
    Khan, Rahim
    Almaiah, Mohammed Amin
    Binsawad, Muhammad
    Ali, Jehad
    Al Saaidah, Adeeb
    Ta, Qui Thanh Hoai
    [J]. IEEE ACCESS, 2020, 8 : 148510 - 148527
  • [5] An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks
    Adil, Muhammad
    Almaiah, Mohammed Amin
    Alsayed, Alhuseen Omar
    Almomani, Omar
    [J]. SENSORS, 2020, 20 (08)
  • [6] MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks
    Adil, Muhammad
    Khan, Rahim
    Almaiah, Mohammed Amin
    Al-Zahrani, Mohammed
    Zakarya, Muhammad
    Amjad, Muhammad Saeed
    Ahmed, Rehan
    [J]. IEEE ACCESS, 2020, 8 (08): : 44459 - 44469
  • [7] Al Hwaitat AK, 2020, INT J ADV COMPUT SC, V11, P614
  • [8] Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638
  • [9] Alamer Maryam, 2021, 2021 International Conference on Information Technology (ICIT), P719, DOI 10.1109/ICIT52682.2021.9491123
  • [10] Ali A., 2022, Big data intelligence for smart applications, P279