Authentication and Key Management in Distributed IoT Using Blockchain Technology

被引:62
作者
Panda, Soumyashree S. [1 ]
Jena, Debasish [1 ]
Mohanta, Bhabendu Kumar [1 ]
Ramasubbareddy, Somula [2 ]
Daneshmand, Mahmoud [3 ]
Gandomi, Amir H. [4 ]
机构
[1] Int Inst Informat Technol Bhubaneswar, Dept Comp Sci Engn, Bhubaneswar 751003, India
[2] Vallurupalli Nageswara Rao Vignana Jyothi Inst En, Dept Informat Technol, Hyderabad 500090, India
[3] Stevens Inst Technol, Sch Business, Hoboken, NJ 07030 USA
[4] Univ Technol Sydney, Fac Engn Informat Technol, Sydney, NSW 2007, Australia
关键词
Blockchain; Internet of Things; Security; Authentication; Distributed ledger; Bitcoin; Smart contracts; decentralization; hash chain; privacy; security; INTERNET;
D O I
10.1109/JIOT.2021.3063806
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation center for the generation and management of keys. Trusting a third party has its own ramifications and results in a centralized architecture; therefore, this article addresses these issues by designing a Blockchain-based distributed IoT architecture that uses hash chains for secure key management. The proposed architecture exploits the key characteristics of the Blockchain technology, such as openness, immutability, traceability, and fault tolerance, to ensure data privacy in IoT scenarios and, thus, provides a secure environment for communication. This article also proposes a scheme for secure and efficient key generation and management for mutual authentication between communication entities. The proposed scheme uses a one-way hash chain technique to provide a set of public and private key pairs to the IoT devices that allow the key pairs to verify themselves at any time. Experimental analysis confirms the superior performance of the proposed scheme to the conventional mechanisms.
引用
收藏
页码:12947 / 12954
页数:8
相关论文
共 27 条
[11]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[12]  
Pham HL, 2018, IEEE GLOBE WORK
[13]  
Huang Q, 2005, IEEE ICC, P3525
[14]  
Huh S, 2017, INT CONF ADV COMMUN, P464, DOI 10.23919/ICACT.2017.7890132
[15]   Generating certification authority authenticated public keys in ad hoc networks [J].
Kounga, G. ;
Mitchell, C. J. ;
Walter, T. .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (01) :87-106
[16]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[17]   Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario [J].
Ma, Mingxin ;
Shi, Guozhen ;
Li, Fenghua .
IEEE ACCESS, 2019, 7 :34045-34059
[18]  
Mohanta B. K., 2019, INT C EM TECHN INF C, P24
[19]  
Mohanta B. K., 2018, INT CONF COMPUT, P1
[20]  
Mohanta BK, 2019, TENCON IEEE REGION, P558, DOI [10.1109/tencon.2019.8929720, 10.1109/TENCON.2019.8929720]