Secure Authentication Protocol for Internet of Things(IoT) Applications based on Blockchain Technology

Authors

  • Voore Subba Rao  Department of CSE, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India
  • Dr. S.K. Tyagi  Department of CSE, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India

Keywords:

Blockchain, Internet of Things, Authentication, Security, De- centralized, autonomous system

Abstract

Internet of Things is evolving as an autonomous system connecting every possible object to an overarching network. However, the objects in the network are heterogeneous and resource constraint; and, security is one among the primary challenges. Existing security mechanisms are usually relying on a centralized security server; primarily, devices authenticate themselves from a trusted third party. If the server fails to function, then the security mechanism would halt the network. But, Blockchain technology with its decentralization property gives a reliable distributed solution to the single-point failure problem. This paper proposes an authentication mechanism in a permissioned network blockchain for device authentication. The security scheme is tested through a formal authentication tool, Scyther, to verify its authentication properties. The security framework adopted for the proposed system is Hyperledger Fabric blockchain platform. The proposed security scheme over the decentralized network is secure and suitable for IoT applications, which withstands many existing attacks related to authentication.

References

  1. Rekleitis, Evangelos, Panagiotis Rizomiliotis, and Stefanos Gritzalis. "How to protect security and privacy in the IoT: a policy?based RFID tag management protocol." Security and Communication Networks 7.12 (2014): 2669-2683.
  2. Norta, Alex. "Creation of smart-contracting collaborations for decentralized autonomous organizations." International Conference on Business Informatics Research. Springer, Cham, 2015.
  3. Wright, Aaron, and Primavera De Filippi. "Decentralized blockchain technology and the rise of lex cryptographia." Available at SSRN 2580664 (2015).
  4. Herbert, Jeff, and Alan Litchfield. "A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology." Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015). Vol. 27. 2015.
  5. Alqassem. Privacy and security requirements framework for the internet of things (iot). In International Conference on Software Engineering (ICSE) Companion India, pages 739–741, May-June 2014.
  6. Huang, P. Craig, H. Lin, and Z. Yan. Seciot: a security framework for the internet of things. In Security and communication networks, May 2015.
  7. Kim, Young-Pil, Seehwan Yoo, and Chuck Yoo. "DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things." 2015 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2015.
  8. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645–1660, 2013. Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services & Cloud Computing and Scienti?c Applications — Big Data, Scalable Analytics, and Beyond.
  9. Ndibanje B., Lee H. J., and Lee S. G. Security analysis and improvements of authentication and access control in the internet of things. Sensors, 14(8):14786–14805, 2014.
  10. Ricardo Neisse, Gary Steri, Igor Nai Fovino, and Gianmarco Baldini. Seckit: A model-based security toolkit for the internet of things. Computers & Security, 54:60 – 76, 2015. Secure Information Reuse and Integration & Availability, Reliability and Security 2014.
  11. T. Bose, S. Bandyopadhyay, A. Ukil, A. Bhattacharyya, and A. Pal. Why not keep your personal data secure yet private in iot?: Our lightweight approach. In 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pages 1–6, April 2015.
  12. Ning YE, Yan Zhu, Ru-chuan WANG, Reza Malekian, and Lin Qiaomin. An ef?cient authentication and access control scheme for perception layer of internet of things. 8, 07 2014.
  13. Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Birgit P?tzmann, editor, Advances in Cryptology — EUROCRYPT 2001, pages 453–474, Berlin, Heidelberg, 2001. Springer Berlin Heidelberg.
  14. D. Dolev and A. C. Yao. On the security of public key protocols. In 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pages 350–357, 1981.
  15. Sjouke Mauw Cas Cremers. Operational Semantics and Veri?cation of Security Protocols. Springer-Verlag Berlin Heidelberg, 1 edition, 2012.

Downloads

Published

2015-10-30

Issue

Section

Research Articles

How to Cite

[1]
Voore Subba Rao, Dr. S.K. Tyagi, " Secure Authentication Protocol for Internet of Things(IoT) Applications based on Blockchain Technology, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 5, pp.500-508, September-October-2015.