BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

被引:48
作者
Vivekanandan, Manojkumar [1 ,2 ]
Sastry, V. N. [1 ]
Reddy, Srinivasulu U. [2 ]
机构
[1] Inst Dev & Res Banking Technol IDRBT, Ctr Mobile Banking CMB, Hyderabad, India
[2] Natl Inst Technol, Dept Comp Applicat, Machine Learning & Data Analyt Lab, Tiruchirappalli, Tamil Nadu, India
关键词
Authentication; IoT; Blockchain; Proverif tool; Security analysis; BIG DATA; SECURITY; PRIVACY; SCHEME;
D O I
10.1007/s12083-020-00963-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.
引用
收藏
页码:403 / 419
页数:17
相关论文
共 43 条
[1]  
Adeel A, 2019, T EMERG TELECOMMUN T, pe3676
[2]   Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications [J].
Ahuja, Sanjay P. ;
Wheeler, Nathan .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (01) :1-10
[3]  
ALI R, 2018, COMPUT SYST SCI ENG, V84, P200, DOI DOI 10.1016/J.FUTURE.2017.06.018
[4]   An efficient three factor-based authentication scheme in multiserver environment using ECC [J].
Ali, Rifaqat ;
Pal, Arup Kumar .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (04)
[5]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[6]  
[Anonymous], 2005, ITU INTERNET REPORTS
[7]  
[Anonymous], 1995, Public Law, V100, P235
[8]  
Bellare M, 1993, P 1 ACM C COMP COMM, P62, DOI [DOI 10.1145/168588.168596, 10.1145/168588.168596]
[9]  
Berenjian S, 2019, 2019 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P71, DOI [10.1109/AINS47559.2019.8968699, 10.1109/ains47559.2019.8968699]
[10]   Comparative study of Asian economies: lessons for India [J].
Bhardwaj, Mamta ;
Naosekpam, Ajit Singh ;
Tewari, Rupinder .
JOURNAL OF SCIENCE AND TECHNOLOGY POLICY MANAGEMENT, 2018, 9 (01) :2-20