A Decentralized Trust Establishment Protocol for Smart IoT Systems

被引:5
作者
El Majdoubi, Driss [1 ]
El Bakkali, Hanan [1 ]
Bensaih, Mohamed [2 ]
Sadki, Souad [1 ]
机构
[1] Mohammed V Univ Rabat, Smart Syst Lab SSL, Rabat IT Ctr, Rabat, Morocco
[2] Ibn Tofail Univ, Natl Sch Appl Sci, Syst Engn Lab, Kenitra, Morocco
关键词
Smart systems; Trust; Blockchain; Elliptic curve; Internet of things; Authentication; AUTHENTICATION; DEFINITIONS;
D O I
10.1016/j.iot.2022.100634
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a widely deployed technology to provide innovative services in many several fields such as industry, logistics, healthcare, and energy management. The integration of artificial intelligence, machine learning, edge/cloud computing, 5G networks, big data analytics, and other emerging technologies in IoT systems is leading to the emergence of Smart Systems that support devices to make autonomous decisions in order to improve and facilitate people's lives. These smart IoT devices produce a huge amount of sensitive data. Thus, establishing Trust between these devices is vital to ensure the security of the sensed data and for the normal functionality of smart systems. To address these challenges, several Trust establishment protocols have been proposed, but they have some limitations such as centralization, the need for human intervention, and the lack of adaptability to smart devices with computation and storage constraints. In this paper, a decentralized trust establishment protocol is proposed for smart IoT devices and is applicable for different scenarios. The protocol provides decentralized identity management, mutual authentication, access control, and secure communication by combining Blockchain technology with PV-SAS-MCA message cross-authentication protocol based on Short Authenticated Strings (SAS). To the best of our knowledge, this research is the first to propose a new approach that uses Blockchain as an extra distributed and authenticated channel to exchange Short Authenticated Strings without physical interaction. This helps to allow entities in the Smart IoT environment not only to identify each other but also to exchange their public keys in a secure manner. Moreover, the proposed protocol uses Elliptic Curve Cryptography (ECC) to secure communications with significantly smaller key sizes and lower computation overhead. Experimental results reveal that the time required to complete the authentication process is less than 90 ms which is a superior performance when compared to state-of-the-art decentralized authentication mechanisms.
引用
收藏
页数:21
相关论文
共 57 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]  
Abdalla Michel, 2020, THESIS IACR CRYPTOLO
[3]   Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams [J].
Aitzhan, Nurzhan Zhumabekuly ;
Svetinovic, Davor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :840-852
[4]  
Al-shareeda MA, 2020, 2020 IEEE 3RD INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SIGNAL PROCESSING (ICICSP 2020), P394, DOI [10.1109/ICICSP50920.2020.9232047, 10.1109/icicsp50920.2020.9232047]
[5]   A Trust Management Model for IoT Devices and Services Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term Memory Technique [J].
Alghofaili, Yara ;
Rassam, Murad A. .
SENSORS, 2022, 22 (02)
[6]  
Alharby M, 2017, Arxiv, DOI arXiv:1710.06372
[7]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[8]  
[Anonymous], 2019, 2019 54 INT U POWER
[9]   Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities [J].
Asif, Muhammad ;
Aziz, Zeeshan ;
Bin Ahmad, Maaz ;
Khalid, Adnan ;
Waris, Hammad Abdul ;
Gilani, Asfandyar .
SENSORS, 2022, 22 (07)
[10]  
Bandyopadhyay S, 2013, INT CONF COMPUT NETW