AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE

被引:17
作者
Bera, Basudeb [1 ]
Das, Ashok Kumar [2 ]
Obaidat, Mohammad S. [3 ]
Vijayakumar, Pandi [4 ]
Hsiao, Kuei-Fang [5 ]
Park, YoungHo [6 ]
机构
[1] Int Inst Informat Technol, Hyderabad, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Coll Engn Tindivanam, Chennai, Tamil Nadu, India
[5] Univ Sharjah, Dept Informat Syst, Sharjah, U Arab Emirates
[6] Kyungpook Natl Univ, Sch Elect Engn, Daegu, South Korea
基金
新加坡国家研究基金会;
关键词
CONTROL SCHEME; SECURITY; INTERNET;
D O I
10.1109/MCE.2020.3040541
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Internet of Everything (IoE), malicious attacks detection and mitigation are important issues. These issues can be resolved through an access control framework where two entities first authenticate each other prior to establishing any secret key for their secure communication. The sensing data of various smart devices in an IoE environment are processed securely at the nearby fog servers and at the same time legitimate users can also access the real-time data directly from designated smart devices through access control mechanism. We first discuss various attack trends in an IoE environment. After that, we discuss evolution of the blockchain technology in the IoE. An artificial intelligence based blockchain-envisioned access control framework for malicious attacks detection and mitigation has been suggested to secure the IoE environment. Finally, a blockchain-based implementation has been conducted on the proposed blockchain-envisioned access control framework for measuring the computational time needed for varying number of blocks mined in the blockchain and also for varying number of transactions per block.
引用
收藏
页码:82 / 92
页数:11
相关论文
共 15 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] AVISPA, 2020, Automated Validation of Internet Security Protocols and Applications
  • [3] Banafa A., 2016, INTERNET EVERYTHING
  • [4] Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
    Bera, Basudeb
    Chattaraj, Durbadal
    Das, Ashok Kumar
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 229 - 249
  • [5] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [6] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [7] The Elliptic Curve Digital Signature Algorithm (ECDSA)
    Don Johnson
    Alfred Menezes
    Scott Vanstone
    [J]. International Journal of Information Security, 2001, 1 (1) : 36 - 63
  • [8] Enhanced Novel Access Control Protocol over Wireless Sensor Networks
    Kim, Hyun-Sung
    Lee, Sung-Woon
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2009, 55 (02) : 492 - 498
  • [9] Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment
    Mandal, Shobhan
    Bera, Basudeb
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Choo, Kim-Kwang Raymond
    Park, Youngho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3184 - 3197
  • [10] Examining smart-card security under the threat of power analysis attacks
    Messerges, TS
    Dabbish, EA
    Sloan, RH
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) : 541 - 552