Authentication and Key Management in Distributed IoT Using Blockchain Technology

被引:62
作者
Panda, Soumyashree S. [1 ]
Jena, Debasish [1 ]
Mohanta, Bhabendu Kumar [1 ]
Ramasubbareddy, Somula [2 ]
Daneshmand, Mahmoud [3 ]
Gandomi, Amir H. [4 ]
机构
[1] Int Inst Informat Technol Bhubaneswar, Dept Comp Sci Engn, Bhubaneswar 751003, India
[2] Vallurupalli Nageswara Rao Vignana Jyothi Inst En, Dept Informat Technol, Hyderabad 500090, India
[3] Stevens Inst Technol, Sch Business, Hoboken, NJ 07030 USA
[4] Univ Technol Sydney, Fac Engn Informat Technol, Sydney, NSW 2007, Australia
关键词
Blockchain; Internet of Things; Security; Authentication; Distributed ledger; Bitcoin; Smart contracts; decentralization; hash chain; privacy; security; INTERNET;
D O I
10.1109/JIOT.2021.3063806
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation center for the generation and management of keys. Trusting a third party has its own ramifications and results in a centralized architecture; therefore, this article addresses these issues by designing a Blockchain-based distributed IoT architecture that uses hash chains for secure key management. The proposed architecture exploits the key characteristics of the Blockchain technology, such as openness, immutability, traceability, and fault tolerance, to ensure data privacy in IoT scenarios and, thus, provides a secure environment for communication. This article also proposes a scheme for secure and efficient key generation and management for mutual authentication between communication entities. The proposed scheme uses a one-way hash chain technique to provide a set of public and private key pairs to the IoT devices that allow the key pairs to verify themselves at any time. Experimental analysis confirms the superior performance of the proposed scheme to the conventional mechanisms.
引用
收藏
页码:12947 / 12954
页数:8
相关论文
共 27 条
[1]   Applications of Blockchains in the Internet of Things: A Comprehensive Survey [J].
Ali, Muhammad Salek ;
Vecchio, Massimo ;
Pincheira, Miguel ;
Dolui, Koustabh ;
Antonelli, Fabio ;
Rehmani, Mubashir Husain .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1676-1717
[2]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[3]  
Back A., 2002, Hashcash-A Denial of Service Counter-Measure
[4]  
Bahga Arshdeep, 2016, J Softw Eng Appl, V9, P533, DOI [DOI 10.4236/JSEA.2016.910036, 10.4236/jsea.2016.910036]
[5]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[6]  
Dannen C., 2017, Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners, P69, DOI [DOI 10.1007/978-1-4842-2535-6, 10.1007/978-1-4842-2535-6_4, DOI 10.1007/978-1-4842-2535-6_4]
[7]  
Dorri Ali, 2017, Lsb: a lightweight scalable blockchain for iot security and privacy
[8]  
Ferraiolo D. E., 1995, Proceedings. 11th Annual Computer Security Applications Conference, P241
[9]   Bubbles of Trust: A decentralized blockchain-based authentication system for IoT [J].
Hammi, Mohamed Tahar ;
Hammi, Badis ;
Bellot, Patrick ;
Serhrouchni, Ahmed .
COMPUTERS & SECURITY, 2018, 78 :126-142
[10]  
Hardjono T, 2016, 2 ACM INT WORKSH IOT, P29