Skip to main content

2021 | OriginalPaper | Buchkapitel

Blockchain-Based Iris Authentication in Order to Secure IoT Access and Digital Money Spending

verfasst von : Gerardo Iovane, Antonio Rapuano, Patrizia Di Gironimo

Erschienen in: Pattern Recognition. ICPR International Workshops and Challenges

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this work we use two approaches to prevent double spending and secure IoT transaction through Blockchain and information fusion techniques: the first method is based on Smart Contracts; while the second method is implemented by a novel Blockchain system. Both methods use a hybrid RSA and biometric codes fusion in order to have an encrypted, taking account of the privacy, identity of the spender. In Blockchain a contract between the parties is stipulated and the biometric fused code are kept. The used coin pack is tagged, so a future double spending or any illegal action on the IoT network or Smart city becomes forbidden and prosecutable legally. The second part of the work will present a novel Blockchain where a transaction can be signed only if the user is successfully authenticated though his biometric fused key.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A payable function it is a function where an account can send funds in order to deposit it in a contract.
 
Literatur
1.
Zurück zum Zitat Iovane, G., Nappi, M., Chinnici, M., Petrosino, A., Castiglione, A., Barra, S.: A novel blockchain scheme combining prime numbers and iris for encrypting coding. In: 2019 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 609–618. https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00117 Iovane, G., Nappi, M., Chinnici, M., Petrosino, A., Castiglione, A., Barra, S.: A novel blockchain scheme combining prime numbers and iris for encrypting coding. In: 2019 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 609–618. https://​doi.​org/​10.​1109/​DASC/​PiCom/​CBDCom/​CyberSciTech.​2019.​00117
3.
Zurück zum Zitat Xu, Z., Liu, W., Huang, J., Yang, C., Lu, J., Tan, H.: Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey, Security and Communication Networks, vol. 2020, Article ID 8872586, 13 pages (2020) Xu, Z., Liu, W., Huang, J., Yang, C., Lu, J., Tan, H.: Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey, Security and Communication Networks, vol. 2020, Article ID 8872586, 13 pages (2020)
4.
Zurück zum Zitat Jesus, E.F., Chicarino, V.R.L., de Albuquerque, C.V.N., de A. Rocha, A.A.: A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack, Security and Communication Networks, vol. 2018, Article ID 9675050, 27 pages (2018) Jesus, E.F., Chicarino, V.R.L., de Albuquerque, C.V.N., de A. Rocha, A.A.: A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack, Security and Communication Networks, vol. 2018, Article ID 9675050, 27 pages (2018)
5.
Zurück zum Zitat Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008) Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
6.
Zurück zum Zitat Schneier, B.: Applied Cryptography. Wiley, New York (1996)MATH Schneier, B.: Applied Cryptography. Wiley, New York (1996)MATH
7.
Zurück zum Zitat Percival, C.: Stronger key derivation via sequential memory-hard functions (2011) Percival, C.: Stronger key derivation via sequential memory-hard functions (2011)
8.
Zurück zum Zitat Black, T., Weight, J.: X16R ASIC Resistant by Design (2018) Black, T., Weight, J.: X16R ASIC Resistant by Design (2018)
9.
Zurück zum Zitat Dryja, T.: Hashimoto: I/O bound proof of work (2014) Dryja, T.: Hashimoto: I/O bound proof of work (2014)
10.
Zurück zum Zitat Georghiades, Y., Flolid, S., Vishwanath, S.: HashCore: Proof-of-Work Functions for General Purpose Processors (2019) Georghiades, Y., Flolid, S., Vishwanath, S.: HashCore: Proof-of-Work Functions for General Purpose Processors (2019)
11.
Zurück zum Zitat Wang, W., et al.: Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks (2019) Wang, W., et al.: Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks (2019)
12.
Zurück zum Zitat Stoll, C., Klaaßen, L., Gallersd orfer, U.: The Carbon Footprint of Bitcoin (2019) Stoll, C., Klaaßen, L., Gallersd orfer, U.: The Carbon Footprint of Bitcoin (2019)
13.
Zurück zum Zitat Brown-Cohen, J., Narayanan, A., Psomas, C., Weinberg, S.M.: Formal Barriers to Longest-Chain Proof-of-Stake Protocols (2018) Brown-Cohen, J., Narayanan, A., Psomas, C., Weinberg, S.M.: Formal Barriers to Longest-Chain Proof-of-Stake Protocols (2018)
14.
15.
Zurück zum Zitat Poelstra, A.: On Stake and Consensus (2015) Poelstra, A.: On Stake and Consensus (2015)
16.
Zurück zum Zitat Ozisik, A.P., Levine, B.N.: An Explanation of Nakamoto’s Analysis of Double-spend Attacks (2013) Ozisik, A.P., Levine, B.N.: An Explanation of Nakamoto’s Analysis of Double-spend Attacks (2013)
17.
Zurück zum Zitat Ferrag, M.A., Maglaras, L., Derhab, A.: Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends, Security and Communication Networks, vol. 2019, Article ID 5452870, 20 pages (2019) Ferrag, M.A., Maglaras, L., Derhab, A.: Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends, Security and Communication Networks, vol. 2019, Article ID 5452870, 20 pages (2019)
18.
Zurück zum Zitat The Tangle Whitepaper, Serguei Popov, April 30 2018 (2018) The Tangle Whitepaper, Serguei Popov, April 30 2018 (2018)
19.
Zurück zum Zitat Yki, K., Dmitrij, L., Tommi, E., Nikos, F.: Improving the privacy of IoT with decentralised identifiers (DIDs). J. Comput. Netw. Commun. 2019, Article ID 8706760, 10 pages (2019) Yki, K., Dmitrij, L., Tommi, E., Nikos, F.: Improving the privacy of IoT with decentralised identifiers (DIDs). J. Comput. Netw. Commun. 2019, Article ID 8706760, 10 pages (2019)
20.
Zurück zum Zitat Kavianpour, S., et al.: A systematic literature review of authentication in internet of things for heterogeneous devices. J. Comput. Netw. Commun. 2019, Article ID 5747136, 14 pages (2019) Kavianpour, S., et al.: A systematic literature review of authentication in internet of things for heterogeneous devices. J. Comput. Netw. Commun. 2019, Article ID 5747136, 14 pages (2019)
21.
Zurück zum Zitat Thwin, T.T., Vasupongayya, S.: Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems, Security and Communication Networks, vol. 2019, Article ID 8315614, 15 pages (2019) Thwin, T.T., Vasupongayya, S.: Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems, Security and Communication Networks, vol. 2019, Article ID 8315614, 15 pages (2019)
24.
Zurück zum Zitat Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M., Salah, K.: A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, 2018, pp. 1–8 (2018). https://doi.org/10.1109/AICCSA.2018.8612856 Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M., Salah, K.: A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, 2018, pp. 1–8 (2018). https://​doi.​org/​10.​1109/​AICCSA.​2018.​8612856
25.
Zurück zum Zitat Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT, Comput. Secur. 78 (2018) Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT, Comput. Secur. 78 (2018)
26.
Zurück zum Zitat Eyal, I., Sirer, E.G.: How to disincentivize large bitcoin mining pools (2014) Eyal, I., Sirer, E.G.: How to disincentivize large bitcoin mining pools (2014)
27.
Zurück zum Zitat Bastiaan, M.: Preventing the 51% Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin (2015) Bastiaan, M.: Preventing the 51% Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin (2015)
28.
Zurück zum Zitat Ho Park, J., Hy. Park, J.: Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions (2017) Ho Park, J., Hy. Park, J.: Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions (2017)
29.
Zurück zum Zitat Crosby, M., Nachiappan Pattanayak, P., Verma, S., Kalyanaraman, V.: Blockchain technology: beyond bitcoin. Appl. Innov. Rev. 2, 6–19 (2016) Crosby, M., Nachiappan Pattanayak, P., Verma, S., Kalyanaraman, V.: Blockchain technology: beyond bitcoin. Appl. Innov. Rev. 2, 6–19 (2016)
30.
Zurück zum Zitat Lee, H., Shin, M., Kim, K.S., Kang, Y., Kim, J.: Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain (2018) Lee, H., Shin, M., Kim, K.S., Kang, Y., Kim, J.: Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain (2018)
31.
Zurück zum Zitat Rosenfeld, M.: Analysis of hashrate-based double-spending (2012) Rosenfeld, M.: Analysis of hashrate-based double-spending (2012)
32.
Zurück zum Zitat Bae, J., Lim, H.: Random Mining Group Selection to Prevent 51% Attacks on Bitcoin (2018) Bae, J., Lim, H.: Random Mining Group Selection to Prevent 51% Attacks on Bitcoin (2018)
34.
Zurück zum Zitat Garoffolo, A., Stabilini, P., Viglione, R., Stav, U.: A Penalty System for Delayed Block Submission (2018) Garoffolo, A., Stabilini, P., Viglione, R., Stav, U.: A Penalty System for Delayed Block Submission (2018)
35.
Zurück zum Zitat Fawkes, PirlGuard Innovative Solution against 51% Attacks (2018) Fawkes, PirlGuard Innovative Solution against 51% Attacks (2018)
36.
Zurück zum Zitat Block, A.: Mitigating 51% Attacks with LLMQ-based ChainLocks (2018) Block, A.: Mitigating 51% Attacks with LLMQ-based ChainLocks (2018)
37.
Zurück zum Zitat Iovane, G., Amorosia, A., Benedetto, E., Lamponi, G.: An information fusion approach based on prime numbers coming from RSA algorithm and fractals for secure coding. J. Discrete Math. Sci. Cryptography 18(5), 455–479 (2015)CrossRef Iovane, G., Amorosia, A., Benedetto, E., Lamponi, G.: An information fusion approach based on prime numbers coming from RSA algorithm and fractals for secure coding. J. Discrete Math. Sci. Cryptography 18(5), 455–479 (2015)CrossRef
Metadaten
Titel
Blockchain-Based Iris Authentication in Order to Secure IoT Access and Digital Money Spending
verfasst von
Gerardo Iovane
Antonio Rapuano
Patrizia Di Gironimo
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-68821-9_37