Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks

被引:5
作者
Bilami, Karam Eddine [1 ]
Lorenz, Pascal [1 ]
机构
[1] Univ Haute Alsace, IRIMAS GRTC Inst, F-68008 Colmar, France
关键词
internet of things; M2M communication; authentication; M2M layer; blockchain;
D O I
10.3390/fi14050158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their implementation on resource-constrained devices. In this paper, we discuss the architectures deployed for M2M communications and the security challenges, as well as the vulnerabilities and solutions to counter possible attacks. We present a lightweight design based on a private blockchain to secure wireless M2M communications at the device domain level. Blockchain integration provides secure storage of data while preserving integrity traceability and availability. Besides, the evaluation and experimentations under NS3 simulator of the proposed scheme show that the authentication mechanism is lightweight, and presents better performances comparatively to other protocols in terms of key parameters as communication and computational overheads, average delay and energy consumption.
引用
收藏
页数:19
相关论文
共 26 条
[1]  
[Anonymous], 2013, ETSI, Machine-to-Machine Communications
[2]  
[Anonymous], 2004, SENSYS 04 P 2 INT C, DOI [DOI 10.1145/1031495.1031515, 10.1145/1031495.1031515]
[3]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[4]   A Lightweight Blockchain-Based IoT Identity Management Approach [J].
Bouras, Mohammed Amine ;
Lu, Qinghua ;
Dhelim, Sahraoui ;
Ning, Huansheng .
FUTURE INTERNET, 2021, 13 (02) :1-14
[5]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[6]   Machine-to-Machine Communications: Architectures, Standards and Applications [J].
Chen, Min ;
Wan, Jiafu ;
Li, Fang .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (02) :480-497
[7]   Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks [J].
Coruh, Ugur ;
Bayat, Oguz .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[8]   A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment [J].
Esfahani, Alireza ;
Mantas, Georgios ;
Matischek, Rainer ;
Saghezchi, Firooz B. ;
Rodriguez, Jonathan ;
Bicaku, Ani ;
Maksuti, Silia ;
Tauber, Markus G. ;
Schmittner, Christoph ;
Bastos, Joaquim .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :288-296
[9]   Secure remote anonymous user authentication scheme for smart home environment [J].
Fakroon, Moneer ;
Alshahrani, Mohammed ;
Gebali, Fayez ;
Traore, Issa .
INTERNET OF THINGS, 2020, 9
[10]   Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle [J].
Gangwani, Pranav ;
Perez-Pons, Alexander ;
Bhardwaj, Tushar ;
Upadhyay, Himanshu ;
Joshi, Santosh ;
Lagos, Leonel .
FUTURE INTERNET, 2021, 13 (12)