Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT

被引:34
作者
Fotohi, Reza [1 ]
Aliee, Fereidoon Shams [1 ]
机构
[1] Shahid Beheshti Univ, Fac Comp Sci & Engn, Tehran 1983969411, Iran
关键词
Large-Scale IoT; Blockchain; Authentication; Signature-based; IoT Security; INTERNET;
D O I
10.1016/j.comnet.2021.108331
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The IoT ecosystem allows communication between billions of devices worldwide that are collecting data autonomously. The vast amount of data generated by these devices must be controlled totally securely. The centralized solutions are not capable of responding to these concerns due to security challenges and scalability problems. Thus, blockchain technology is an effective solution, and the "distributed" method has been employed to overcome these concerns to allow for entirely secure communication between devices. The present paper proposes a technique consisting of two steps. The first step deals with the authentication of each node using the identity-based signature to secure communication between devices on a blockchain platform. In the second step, blocks are sent by hashing. For this purpose, the identities of the devices have been used as public keys. The theory analysis and simulation results indicated the superiority of the proposed method in terms of average detection rate, throughput, scalability, time spent on block authentication, and consumption energy compared to S-LoRaWAN and DLBA-IoT. Also, the simulation results show how the proposed approach can significantly increase the security of each thing and network security.
引用
收藏
页数:13
相关论文
共 23 条
[1]   Blockchain Platforms and Access Control Classification for IoT Systems [J].
Abdi, Adam Ibrahim ;
Eassa, Fathy Elbouraey ;
Jambi, Kamal ;
Almarhabi, Khalid ;
Al-Ghamdi, Abdullah Saad Al-Malaise .
SYMMETRY-BASEL, 2020, 12 (10) :1-17
[2]  
Alizadeh M., 2020, J INTERNET SERV INF, V3
[3]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[4]   Securing the LoRaWAN join procedure using blockchains [J].
Danish, Syed Muhammad ;
Lestas, Marios ;
Qureshi, Hassaan Khaliq ;
Zhang, Kaiwen ;
Asif, Waqar ;
Rajarajan, Muttukrishnan .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03) :2123-2138
[5]   LSB: A Lightweight Scalable Blockchain for IoT security and anonymity [J].
Dorri, Ali ;
Kanhere, Salil S. ;
Jurdak, Raja ;
Gauravaram, Praveen .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 134 :180-197
[6]   Robust Decentralised Trust Management for the Internet of Things by Using Game Theory [J].
Esposito, Christian ;
Tamburis, Oscar ;
Su, Xin ;
Choi, Chang .
INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (06)
[7]   Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles [J].
Faraji-Biregani, Maryam ;
Fotohi, Reza .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (05) :5076-5103
[8]   An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks [J].
Fotohi, Reza ;
Nazemi, Eslam ;
Aliee, Fereidoon Shams .
VEHICULAR COMMUNICATIONS, 2020, 26
[9]   Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions [J].
Jan, Mian Ahmad ;
Cai, Jinjin ;
Gao, Xiang-Chuan ;
Khan, Fazlullah ;
Mastorakis, Spyridon ;
Usman, Muhammad ;
Alazab, Mamoun ;
Watters, Paul .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 175
[10]   A decentralized lightweight blockchain-based authentication mechanism for IoT systems [J].
Khalid, Umair ;
Asim, Muhammad ;
Baker, Thar ;
Hung, Patrick C. K. ;
Tariq, Muhammad Adnan ;
Rafferty, Laura .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03) :2067-2087