A Blockchain Based Decentralized Authentication Framework for Resource Constrained IOT devices

被引:0
作者
Panda, Soumyashree S. [1 ]
Satapathy, Utkalika [1 ]
Mohanta, Bhabendu K. [1 ]
Jena, Debasish [1 ]
Gountia, Debasis [2 ]
机构
[1] IIIT Bhubaneshwar, Dept Comp Sci & Engn, Bhubaneswar 751003, Orissa, India
[2] IIT Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
来源
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT) | 2019年
关键词
IoT; Blockchain; Authentication; Sybil attack; privacy; security; INTERNET; SECURITY; THINGS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is excessively influencing our day to day lives in many domains be it small smart device like a smart-watch or large industrial enterprises. Thus, a number of different IoT based applications are developed and deployed for these sectors. An IoT system enables devices to communicate among each other without human assistance/involvement. Therefore, verifying the authenticity of devices and ensuring integrity of the communicated messages should be given major importance in this type of autonomous systems. Apart from this, it is almost impractical to develop a centralized authentication scheme for a system whose size growing day by day. For this reason, a decentralized framework based on Blockchain technology that can efficiently manage such a large number of smart devices has been proposed in this paper. An authentication scheme using which devices as well as end users can prove their legitimacy to each other is also designed.
引用
收藏
页数:6
相关论文
共 16 条
[1]   Applications of Blockchains in the Internet of Things: A Comprehensive Survey [J].
Ali, Muhammad Salek ;
Vecchio, Massimo ;
Pincheira, Miguel ;
Dolui, Koustabh ;
Antonelli, Fabio ;
Rehmani, Mubashir Husain .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1676-1717
[2]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[3]  
By G. S., 2016, 2020 MORE HALF MAJOR
[4]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[5]  
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
[6]   Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems [J].
Guo, Rui ;
Shi, Huixian ;
Zhao, Qinglan ;
Zheng, Dong .
IEEE ACCESS, 2018, 6 :11676-11686
[7]   IoT security: Review, blockchain solutions, and open challenges [J].
Khan, Minhaj Ahmad ;
Salah, Khaled .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :395-411
[8]   Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems [J].
Lei, Ao ;
Cruickshank, Haitham ;
Cao, Yue ;
Asuquo, Philip ;
Ogah, Chibueze P. Anyigor ;
Sun, Zhili .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1832-1843
[9]   Blockchain's adoption in IoT: The challenges, and a way forward [J].
Makhdoom, Imran ;
Abolhasan, Mehran ;
Abbas, Haider ;
Ni, Wei .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 :251-279
[10]  
Mohanta BK, 2018, INT CONF COMPUT