Blockchain-Based Secure and Lightweight Authentication for Internet of Things

被引:38
作者
Yang, Xu [1 ]
Yang, Xuechao [2 ]
Yi, Xun [2 ]
Khalil, Ibrahim [2 ]
Zhou, Xiaotong [3 ]
He, Debiao [3 ]
Huang, Xinyi [4 ]
Nepal, Surya [5 ]
机构
[1] Fujian Normal Univ, Sch Math & Stat, Ctr Appl Math Fujian Prov, Fuzhou 350117, Peoples R China
[2] RMIT Univ, Sch Comp Technol, Melbourne, Vic 3001, Australia
[3] Wuhan Univ, Sch Cyber Sci & Engn, Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Peoples R China
[4] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[5] CSIRO, Data61, Marsfield, NSW 2122, Australia
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Authentication; Internet of Things; Security; Protocols; Smart grids; Servers; Blockchains; blockchain; efficiency; Internet of Things (IoT); privacy; security; ANONYMOUS AUTHENTICATION; MUTUAL AUTHENTICATION; SMART HOME; SCHEME; IOT; EFFICIENT; PROTOCOL; SYSTEM; CLOUD;
D O I
10.1109/JIOT.2021.3098007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past decade, the Internet of Things (IoT) is widely adopted in various domains, including education, commerce, government, and healthcare. There are also many IoT-based applications drawn significant attentions in recent years. With the increasing numbers of the connected devices in the IoT system, one of the challenging tasks is to ensure devices' authenticity, which allows users to have a high confidence in the decision. In addition, due to the heterogeneity of the IoT system and the resource-constrained devices, how to efficiently manage such system and guarantee the security and privacy for devices is concerned. In this article, we proposed a new blockchain-based authentication scheme to meet the challenges. Our proposed framework combines the blockchain technique and the modular square root algorithm to achieve an effective authentication process. Besides, we demonstrate the security and utility of the proposed scheme by providing the security analysis and the detailed experiment.
引用
收藏
页码:3321 / 3332
页数:12
相关论文
共 41 条
[1]   Anonymous authentication for privacy-preserving IoT target-driven applications [J].
Alcaide, Almudena ;
Palomar, Esther ;
Montero-Castillo, Jose ;
Ribagorda, Arturo .
COMPUTERS & SECURITY, 2013, 37 :111-123
[2]  
[Anonymous], 2007, SEMINUMERICAL ALGORI
[3]  
[Anonymous], 2016, Rep.
[4]  
[Anonymous], 2016, ARXIV160402980
[5]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[6]   S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol [J].
Chen, Dajiang ;
Zhang, Ning ;
Qin, Zhen ;
Mao, Xufei ;
Qin, Zhiguang ;
Shen, Xuemin ;
Li, Xiang-Yang .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :88-100
[7]   PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid [J].
Chim, Tat Wing ;
Yiu, Siu-Ming ;
Li, Victor O. K. ;
Hui, Lucas C. K. ;
Zhong, Jin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) :85-97
[8]  
Dingyi P., 1996, CHINESE REMAINDER TH
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]   Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G [J].
Fan, Kai ;
Gong, Yuanyuan ;
Liang, Chen ;
Li, Hui ;
Yang, Yintang .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3095-3104