Skip to main content
Erschienen in: Cluster Computing 1/2023

30.03.2022

Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs

verfasst von: Aqsa Rashid, Asif Masood, Atta ur Rehman Khan

Erschienen in: Cluster Computing | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things ecosystem includes entities that perform different activities, such as data collection, communication, and processing. Collaborative IoT ecosystems require techniques for message source authentication to ensure that data is obtained from authentic sources. Current centralized authentication schemes are not suitable because they are prone to security threats, privacy issues, single point of failure, and have scalability concerns. There are multiple blockchain-based decentralized authentication techniques, but they have limitations in terms of cross-communication. This research presents a blockchain-based authentication and message integrity scheme to support cross-communication. The proposed technique supports authentication, data integrity, and non-repudiation. The experimental results show that it is cost-effective, efficient, and satisfies the requirements of cross-communication in distributed environment. Moreover, it exhibits superior performance when compared with the state-of-the-art techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hassan, Q.F., Madani, S.A., Khan, A.R.: Internet of Things: Challenges, Advances, and Applications. CRC Press, Boca Raton (2017)CrossRef Hassan, Q.F., Madani, S.A., Khan, A.R.: Internet of Things: Challenges, Advances, and Applications. CRC Press, Boca Raton (2017)CrossRef
2.
Zurück zum Zitat Abbas, S., Nasir, Q., Nouichi, D., Abdelsalam, M., Talib, M.A., Waraga, O.A., Khan, A.R.: Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput. Appl. 33(21), 14753–14769 (2021)CrossRef Abbas, S., Nasir, Q., Nouichi, D., Abdelsalam, M., Talib, M.A., Waraga, O.A., Khan, A.R.: Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput. Appl. 33(21), 14753–14769 (2021)CrossRef
3.
Zurück zum Zitat Panarello, A., Nachiket, T., Giovanni, M., Francesco, L., Antonio, P.: Blockchain and iot integration: a systematic survey. Sensors 18(8), 2575 (2018)CrossRef Panarello, A., Nachiket, T., Giovanni, M., Francesco, L., Antonio, P.: Blockchain and iot integration: a systematic survey. Sensors 18(8), 2575 (2018)CrossRef
4.
Zurück zum Zitat Khan, M.A., Khaled, S.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)CrossRef Khan, M.A., Khaled, S.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)CrossRef
5.
Zurück zum Zitat Lee, I., Kyoochun, L.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)CrossRef Lee, I., Kyoochun, L.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)CrossRef
6.
Zurück zum Zitat Gubbi, J., Rajkumar, B., Slaven, M., Marimuthu, P.: Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef Gubbi, J., Rajkumar, B., Slaven, M., Marimuthu, P.: Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef
7.
Zurück zum Zitat Aziz, M.F., Khan, A.N., Shuja, J., Khan, I.A., Khan, F.G., Khan, A.R.: A lightweight and compromise-resilient authentication scheme for IoTs. Trans. Emerg. Telecommun. Technol. 40, e3813 (2019) Aziz, M.F., Khan, A.N., Shuja, J., Khan, I.A., Khan, F.G., Khan, A.R.: A lightweight and compromise-resilient authentication scheme for IoTs. Trans. Emerg. Telecommun. Technol. 40, e3813 (2019)
8.
Zurück zum Zitat Adeel, A., Ali, M., Khan, A.N., Khalid, T., Rehman, F., Jararweh, Y., Shuja, J.: A multi-attack resilient, lightweight IoT authentication scheme. Trans. Emerg. Telecommun. Technol. 24, e3676 (2019) Adeel, A., Ali, M., Khan, A.N., Khalid, T., Rehman, F., Jararweh, Y., Shuja, J.: A multi-attack resilient, lightweight IoT authentication scheme. Trans. Emerg. Telecommun. Technol. 24, e3676 (2019)
9.
Zurück zum Zitat Shuja, J., Humayun, M.A., Alasmary, W., Sinky, H., Alanazi, E., Khan, M.K.: Resource efficient geo-textual hierarchical clustering framework for social IoT applications. IEEE Sens. J. 21(22), 25114–25122 (2021)CrossRef Shuja, J., Humayun, M.A., Alasmary, W., Sinky, H., Alanazi, E., Khan, M.K.: Resource efficient geo-textual hierarchical clustering framework for social IoT applications. IEEE Sens. J. 21(22), 25114–25122 (2021)CrossRef
10.
Zurück zum Zitat Ali, J., Toqeer A., Yazed A., Ahmad S. K., and Shahrulniza M.: Blockchain-based smart-IoT trust zone measurement architecture, In Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 152–157, (2019) Ali, J., Toqeer A., Yazed A., Ahmad S. K., and Shahrulniza M.: Blockchain-based smart-IoT trust zone measurement architecture, In Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 152–157, (2019)
11.
Zurück zum Zitat Hammi, M.T., Badis, H., Patrick, B., Ahmed, S.: Bubbles of Trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126–142 (2018)CrossRef Hammi, M.T., Badis, H., Patrick, B., Ahmed, S.: Bubbles of Trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126–142 (2018)CrossRef
12.
Zurück zum Zitat Khalid, U., Muhammad, A., Thar, B., Patrick, C.K.H., Muhammad, A.T., Laura, R.: A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 14, 1–21 (2020) Khalid, U., Muhammad, A., Thar, B., Patrick, C.K.H., Muhammad, A.T., Laura, R.: A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 14, 1–21 (2020)
13.
Zurück zum Zitat Vulić, I., Prodanović, R., Vukčević, G., Sretenović, S.: Trust Establishing Model in IoT using PKI and Timestamp. In: Konjović, Z., Zdravković, M., Trajanović, M. (Eds.) ICIST 2018 Proceedings Vol. 2, pp.333–338, (2018) Vulić, I., Prodanović, R., Vukčević, G., Sretenović, S.: Trust Establishing Model in IoT using PKI and Timestamp. In: Konjović, Z., Zdravković, M., Trajanović, M. (Eds.) ICIST 2018 Proceedings Vol. 2, pp.333–338, (2018)
14.
Zurück zum Zitat Iqbal, W., Haider, A., Pan, D., Jiafu, W., Bilal, R., Yawar, A., Imran, R.: ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes. IEEE Internet Things J. 12, 9622–9633 (2020) Iqbal, W., Haider, A., Pan, D., Jiafu, W., Bilal, R., Yawar, A., Imran, R.: ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes. IEEE Internet Things J. 12, 9622–9633 (2020)
15.
Zurück zum Zitat Vijayakumar, P., Victor, C., Jegatha, L.D., Balamurugan, B., Shynu, P.G.: Computationally efficient privacy-preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comput. Syst. 78, 943–955 (2018)CrossRef Vijayakumar, P., Victor, C., Jegatha, L.D., Balamurugan, B., Shynu, P.G.: Computationally efficient privacy-preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comput. Syst. 78, 943–955 (2018)CrossRef
16.
Zurück zum Zitat Gope, P., Biplab, S.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 6(1), 580–589 (2018)CrossRef Gope, P., Biplab, S.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 6(1), 580–589 (2018)CrossRef
17.
Zurück zum Zitat Feng, W., Yu, Q., Shijun, Z., Dengguo, F.: AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw. 134, 167–182 (2018)CrossRef Feng, W., Yu, Q., Shijun, Z., Dengguo, F.: AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw. 134, 167–182 (2018)CrossRef
18.
Zurück zum Zitat Roychoudhury, P., Basav, R., Dilip, K.S.: Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput. Commun. 127, 146–157 (2018)CrossRef Roychoudhury, P., Basav, R., Dilip, K.S.: Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput. Commun. 127, 146–157 (2018)CrossRef
19.
Zurück zum Zitat Aman, M.N., Kee, C.C., Biplab, S.: Mutual authentication in IoT systems using physically unclonable functions. IEEE Internet Things J. 4(5), 1327–1340 (2017)CrossRef Aman, M.N., Kee, C.C., Biplab, S.: Mutual authentication in IoT systems using physically unclonable functions. IEEE Internet Things J. 4(5), 1327–1340 (2017)CrossRef
20.
Zurück zum Zitat Wu, F., Xiong, L., Lili, X., Saru, K., Marimuthu, K., Jian, S.: A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63, 168–181 (2017)CrossRef Wu, F., Xiong, L., Lili, X., Saru, K., Marimuthu, K., Jian, S.: A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63, 168–181 (2017)CrossRef
21.
Zurück zum Zitat Zhang, J., Zeyu W., Zhice Y., and Qian Z.: Proximity-based IoT device authentication, In IEEE INFOCOM 2017-IEEE Conference on Computer Com[munications, pp. 1–9. IEEE, (2017) Zhang, J., Zeyu W., Zhice Y., and Qian Z.: Proximity-based IoT device authentication, In IEEE INFOCOM 2017-IEEE Conference on Computer Com[munications, pp. 1–9. IEEE, (2017)
22.
Zurück zum Zitat Kothmayr, T., Corinna S., Wen H., Michael B., and Georg C.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, In 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 956–963. IEEE, (2012) Kothmayr, T., Corinna S., Wen H., Michael B., and Georg C.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, In 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 956–963. IEEE, (2012)
23.
Zurück zum Zitat Yeh, H.L., Tien-Ho, C., Pin-Chuan, L., Tai-Hoo, K., Hsin-Wen, W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)CrossRef Yeh, H.L., Tien-Ho, C., Pin-Chuan, L., Tai-Hoo, K., Hsin-Wen, W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)CrossRef
24.
Zurück zum Zitat Esfahani, A., Georgios, M., Rainer, M., Firooz, B.S., Jonathan, R., Ani, B., Silia, M., Markus, G.T., Christoph, S., Joaquim, B.: A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J. 6(1), 288–296 (2017)CrossRef Esfahani, A., Georgios, M., Rainer, M., Firooz, B.S., Jonathan, R., Ani, B., Silia, M., Markus, G.T., Christoph, S., Joaquim, B.: A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J. 6(1), 288–296 (2017)CrossRef
25.
Zurück zum Zitat Gong, B., Yu, Z., Yubo, W.: A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Futur. Gener. Comput. Syst. 78, 867–886 (2018)CrossRef Gong, B., Yu, Z., Yubo, W.: A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Futur. Gener. Comput. Syst. 78, 867–886 (2018)CrossRef
26.
Zurück zum Zitat Jan, M. A., Priyadarsi N., Xiangjian H., Zhiyuan T., and Ren P. L.: A robust authentication scheme for observing resources in the internet of things environment, In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 205–211. IEEE, (2014) Jan, M. A., Priyadarsi N., Xiangjian H., Zhiyuan T., and Ren P. L.: A robust authentication scheme for observing resources in the internet of things environment, In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 205–211. IEEE, (2014)
27.
Zurück zum Zitat Minoli, D., Kazem, S., Benedict, O.: IoT considerations, requirements, and architectures for smart buildings—energy optimization and next-generation building management systems. IEEE Internet Things J. 4(1), 269–283 (2017)CrossRef Minoli, D., Kazem, S., Benedict, O.: IoT considerations, requirements, and architectures for smart buildings—energy optimization and next-generation building management systems. IEEE Internet Things J. 4(1), 269–283 (2017)CrossRef
28.
Zurück zum Zitat Babar, S., Antonietta S., Neeli P., Jaydip S., and Ramjee P.: Proposed embedded security framework for internet of things (IoT), In 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1–5. IEEE (2011) Babar, S., Antonietta S., Neeli P., Jaydip S., and Ramjee P.: Proposed embedded security framework for internet of things (IoT), In 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1–5. IEEE (2011)
29.
Zurück zum Zitat Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)CrossRef Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)CrossRef
30.
Zurück zum Zitat Lu, Y.: The blockchain: state-of-the-art and research challenges. J. Ind. Inf. Integr. 15, 80–90 (2019) Lu, Y.: The blockchain: state-of-the-art and research challenges. J. Ind. Inf. Integr. 15, 80–90 (2019)
31.
Zurück zum Zitat Zhang, Z., Michael C.Y. C., Chia-Wei W., Chia-Wei H., Chong-Kuan C., and Shiuhpyng S.: IoT security: ongoing challenges and research opportunities, In 2014 IEEE 7th international conference on service-oriented computing and applications, pp. 230–234. IEEE (2014) Zhang, Z., Michael C.Y. C., Chia-Wei W., Chia-Wei H., Chong-Kuan C., and Shiuhpyng S.: IoT security: ongoing challenges and research opportunities, In 2014 IEEE 7th international conference on service-oriented computing and applications, pp. 230–234. IEEE (2014)
32.
Zurück zum Zitat Patel, C., and Nishant D.: Security challenges in IoT cyber world, In Security in smart cities: models, applications, and challenges, pp. 171-191. Springer, Cham, (2019) Patel, C., and Nishant D.: Security challenges in IoT cyber world, In Security in smart cities: models, applications, and challenges, pp. 171-191. Springer, Cham, (2019)
33.
Zurück zum Zitat Tawalbeh, L., Fadi, M., Mais, T., Muhannad, Q.: IoT Privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)CrossRef Tawalbeh, L., Fadi, M., Mais, T., Muhannad, Q.: IoT Privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)CrossRef
35.
Zurück zum Zitat Rashid, A., Masood, A., Khan, A.R.: RCAAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organization. Clust. Comput. 16, 3551–3571 (2021)CrossRef Rashid, A., Masood, A., Khan, A.R.: RCAAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organization. Clust. Comput. 16, 3551–3571 (2021)CrossRef
Metadaten
Titel
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs
verfasst von
Aqsa Rashid
Asif Masood
Atta ur Rehman Khan
Publikationsdatum
30.03.2022
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 1/2023
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-022-03583-6

Weitere Artikel der Ausgabe 1/2023

Cluster Computing 1/2023 Zur Ausgabe

Premium Partner