Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming

被引:103
作者
Vangala, Anusha [1 ]
Sutrala, Anil Kumar [2 ]
Das, Ashok Kumar [1 ]
Jo, Minho [3 ]
机构
[1] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res Int, Hyderabad 500032, India
[2] CA Technol, Enterprise Secur Div, Hyderabad 500032, India
[3] Korea Univ, Dept Comp Convergence Software, Sejong 30019, South Korea
基金
新加坡国家研究基金会;
关键词
Authentication; Blockchain; Servers; Logic gates; Agriculture; Security; Internet of Things; blockchain; Internet of Things (IoT); key agreement; security; smart farming; ACCESS-CONTROL SCHEME; IOT-ENABLED INTERNET; USER AUTHENTICATION; KEY MANAGEMENT; THINGS; AGRICULTURE; SECURITY; DESIGN;
D O I
10.1109/JIOT.2021.3050676
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A blockchain-based smart farming technology provides the agricultural data to the farmers and other users associated with smart farming on a single integrated platform. Moreover, persistence and auditability of stored data in blocks into the blockchain provide the confidence of using the correct data when needed later and adds transparency, anonymity, and traceability at the same time. To fulfill such a goal, in this article, we design a new smart contract-based blockchain-envisioned authenticated key agreement mechanism in a smart farming environment. The device-to-device (D2D) authentication phase and device-to-gateway (D2G) authentication phase support mutual authentication and key agreement between two Internet-of-Things (IoT)-enabled devices and between an IoT device and the gateway node (GWN) in the network, respectively. The blocks are created by the edge servers on the authenticated data of IoT devices received from the GWNs and then sent to the cloud server (CS). The smart contract-based consensus mechanism allows verification and addition of the formed blocks by a peer-to-peer (P2P) CSs network. The security of the proposed scheme is done through formal and informal security analysis, and also using the formal security verification tool. A detailed comparative study reveals that the proposed scheme offers superior security and more functionality features as compared to existing competing authentication protocols. Finally, the blockchain-based simulation has been conducted to measure computational time for a varied number of mined blocks and also a varied number of transactions per block.
引用
收藏
页码:10792 / 10806
页数:15
相关论文
共 55 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Advanced Encryption Standard, 2001, STAND FIPS PUB
[3]   Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems [J].
AL-Turjman, Fadi ;
Deebak, B. D. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2919-2927
[4]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[5]  
[Anonymous], 2020, Raspberry pi 3 model b+
[6]  
[Anonymous], 2019, IND COFF BOARD REG 3
[7]  
[Anonymous], 2020, HYP SAWT ARCH GUID
[8]  
[Anonymous], 2020, MIRACL CRYPTOGRAPHIC
[9]  
Atlam Hany F., 2018, International Journal of Intelligent Systems and Applications, V10, P40, DOI 10.5815/ijisa.2018.06.05
[10]  
Barker E., 2016, NIST SPECIAL PUBLICA, V0057