Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2020

09.09.2019

P2P networking based internet of things (IoT) sensor node authentication by Blockchain

verfasst von: Sunghyuck Hong

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer networking. Due to limited physical size, IoT sensor nodes must have light-weight authentication protocol. The Internet of Things (IoT) is a collection of various technical elements. It is expected that interworking between heterogeneous terminals, networks, and applications. They will accelerate through the liberalization of the IoT platform. As a result, many technical and administrative security threats will arise in the IoT environment. Sensor node protocols must be light-weight and secure. As IoT devices are used for various purposes, for some devices that require performance, the OS with a high-performance chipset that works, most passwords protocol. However, to turn on / off the lights IoT devices that perform simple tasks such as based on a low-performance chipset with no OS running. If it does not support encryption protocol or certificate, then it is vulnerable, and it does not have enough performance to handle. Therefore, in this paper, Block-chain-based IoT device is proposed to get a more secure authentication scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Mint is a Linux distribution based on Debian and Ubuntu which is easy to use.
 
Literatur
1.
Zurück zum Zitat Huber R, Sommer P, Wattenhofer R (2011) Demo abstract: debugging wireless sensor network simulations with YETI and COOJA. Proceedings of the 10th ACM/IEEE international conference on information processing in sensor networks, pp. 141–142 Huber R, Sommer P, Wattenhofer R (2011) Demo abstract: debugging wireless sensor network simulations with YETI and COOJA. Proceedings of the 10th ACM/IEEE international conference on information processing in sensor networks, pp. 141–142
2.
Zurück zum Zitat Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155CrossRef Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155CrossRef
3.
Zurück zum Zitat Shi W, Kumar N (2015) Peng GongNaveen Chilamkurti, Hangbae Chang, on the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw Appl 8(5):881–885CrossRef Shi W, Kumar N (2015) Peng GongNaveen Chilamkurti, Hangbae Chang, on the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw Appl 8(5):881–885CrossRef
4.
Zurück zum Zitat Li C-T, Lee C-C, Weng C-Y, Chen C-M (2018) Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw Appl 11(1):198–208CrossRef Li C-T, Lee C-C, Weng C-Y, Chen C-M (2018) Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw Appl 11(1):198–208CrossRef
5.
Zurück zum Zitat Yu Z, Wen J (2017) The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10(4):983–994CrossRef Yu Z, Wen J (2017) The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10(4):983–994CrossRef
6.
Zurück zum Zitat Adavoudi-Jolfaei AH, Ashouri-Talouki M, Aghili SF (2017) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 1–17 Adavoudi-Jolfaei AH, Ashouri-Talouki M, Aghili SF (2017) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 1–17
7.
Zurück zum Zitat Adida B (2008) Sessionlock: securing web sessions against eavesdropping. In Proceedings of the 17th international conference on world wide web, pp. 517–524 Adida B (2008) Sessionlock: securing web sessions against eavesdropping. In Proceedings of the 17th international conference on world wide web, pp. 517–524
8.
Zurück zum Zitat Ullah A, Sehr I, Akbar M, Ning H (2018) FoG assisted secure De-duplicated data dissemination in smart healthcare IoT. 2018 IEEE international conference on smart internet of things, pp. 166–171 Ullah A, Sehr I, Akbar M, Ning H (2018) FoG assisted secure De-duplicated data dissemination in smart healthcare IoT. 2018 IEEE international conference on smart internet of things, pp. 166–171
9.
Zurück zum Zitat Gupta BB, Joshi RC, Misra M (2009) An efficient analytical solution to thwart DDoS attacks in public domain. In Proceedings of the international conference on advances in computing, communication and control, pp. 503–509 Gupta BB, Joshi RC, Misra M (2009) An efficient analytical solution to thwart DDoS attacks in public domain. In Proceedings of the international conference on advances in computing, communication and control, pp. 503–509
10.
Zurück zum Zitat Kassim MRM, Harun AN, Yusoff IM, Mat I, Kuen CP, Rahmad N (2017) "Applications of wireless sensor networks in shiitake mushroom cultivation. 2017 Eleventh international conference on sensing technology, pp. 1–6 Kassim MRM, Harun AN, Yusoff IM, Mat I, Kuen CP, Rahmad N (2017) "Applications of wireless sensor networks in shiitake mushroom cultivation. 2017 Eleventh international conference on sensing technology, pp. 1–6
11.
Zurück zum Zitat Phaladisailoed T, Numnonda T (2018) Machine learning models comparison for bitcoin Price prediction. 2018 10th international conference on information technology and electrical engineering, pp. 506–511 Phaladisailoed T, Numnonda T (2018) Machine learning models comparison for bitcoin Price prediction. 2018 10th international conference on information technology and electrical engineering, pp. 506–511
12.
Zurück zum Zitat Cai C, Zheng Y, Wang C (2018) Leveraging crowdsensed data streams to discover and sell knowledge: a secure and efficient realization. 2018 IEEE 38th international conference on distributed computing systems, pp. 589–599 Cai C, Zheng Y, Wang C (2018) Leveraging crowdsensed data streams to discover and sell knowledge: a secure and efficient realization. 2018 IEEE 38th international conference on distributed computing systems, pp. 589–599
13.
Zurück zum Zitat Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work Blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 3–16 Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work Blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 3–16
14.
Zurück zum Zitat Oh B, Park H (2007) An E-commerce model using peer-to-peer technology and personal blog. The 9th international conference on advanced communication technology, pp. 739–741 Oh B, Park H (2007) An E-commerce model using peer-to-peer technology and personal blog. The 9th international conference on advanced communication technology, pp. 739–741
15.
Zurück zum Zitat Park B-j, Lee T-j, Kwak J (2017) Blockchain-based IoT device authentication scheme. J Korea Inst Inf Secur Cryptol 27(2):343–351 Park B-j, Lee T-j, Kwak J (2017) Blockchain-based IoT device authentication scheme. J Korea Inst Inf Secur Cryptol 27(2):343–351
16.
Zurück zum Zitat Letsoalo E, Ojo S (2016) Survey of media access control address spoofing attacks detection and prevention techniques in wireless networks. IST-Africa Week Conference Letsoalo E, Ojo S (2016) Survey of media access control address spoofing attacks detection and prevention techniques in wireless networks. IST-Africa Week Conference
17.
Zurück zum Zitat Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655–663CrossRef Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655–663CrossRef
18.
Zurück zum Zitat Zhang XM, He GJ, Zhang ZM, Peng Y, Long TF (2017) Spectral-spatial multi-feature classification of remote sensing big data based on a random forest classifier for land cover mapping. Clust Comput 20(3):2311–2321CrossRef Zhang XM, He GJ, Zhang ZM, Peng Y, Long TF (2017) Spectral-spatial multi-feature classification of remote sensing big data based on a random forest classifier for land cover mapping. Clust Comput 20(3):2311–2321CrossRef
19.
Zurück zum Zitat Kim S, Kim M, Kim KJ, Choi B, Chung J (2017) A scheme of AR-based personalized interactive broadcasting service in terrestrial digital broadcasting system. Clust Comput 20(3):2349–2354CrossRef Kim S, Kim M, Kim KJ, Choi B, Chung J (2017) A scheme of AR-based personalized interactive broadcasting service in terrestrial digital broadcasting system. Clust Comput 20(3):2349–2354CrossRef
20.
Zurück zum Zitat Vega-Rodríguez MA, Santander-Jiménez S (2017) Parallelism-based approaches in computational biology: a view from diverse case studies. Clust Comput 20(3):1865–1867CrossRef Vega-Rodríguez MA, Santander-Jiménez S (2017) Parallelism-based approaches in computational biology: a view from diverse case studies. Clust Comput 20(3):1865–1867CrossRef
21.
Zurück zum Zitat da Conceição RM, Lobato RS, Manacero A, Spolon R, Cavenaghi MA (2017) μTESLA protocol in vehicular networks. 12th Iberian conference on information systems and technologies, pp. 1–6 da Conceição RM, Lobato RS, Manacero A, Spolon R, Cavenaghi MA (2017) μTESLA protocol in vehicular networks. 12th Iberian conference on information systems and technologies, pp. 1–6
22.
Zurück zum Zitat Blackshear S, Verma RM (2010) R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks. In Proceedings of the 2010 ACM symposium on applied computing, pp. 1985–1992 Blackshear S, Verma RM (2010) R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks. In Proceedings of the 2010 ACM symposium on applied computing, pp. 1985–1992
23.
Zurück zum Zitat Barnat J, Brim L, Stříbrná J (2009) Distributed LTL model-checking in SPIN. In Proceedings of the 8th international SPIN workshop on model checking of software, pp. 200–216CrossRef Barnat J, Brim L, Stříbrná J (2009) Distributed LTL model-checking in SPIN. In Proceedings of the 8th international SPIN workshop on model checking of software, pp. 200–216CrossRef
24.
Zurück zum Zitat Jang B, Lee K (2006) SNEP implementation on SPINS secure protocol. 2006 Conference of The Institute of Electronics Engineers of Korea, pp. 471–472 Jang B, Lee K (2006) SNEP implementation on SPINS secure protocol. 2006 Conference of The Institute of Electronics Engineers of Korea, pp. 471–472
25.
Zurück zum Zitat Ren J, Li Y, Li T (2009) Routing-based source-location privacy in wireless sensor networks", ICC '09. IEEE international conference on, pp. 1–5 Ren J, Li Y, Li T (2009) Routing-based source-location privacy in wireless sensor networks", ICC '09. IEEE international conference on, pp. 1–5
26.
Zurück zum Zitat Kiayias A, Panagiotakos G 2015 Speed-Security Tradeoffs in Blockchain Protocols Kiayias A, Panagiotakos G 2015 Speed-Security Tradeoffs in Blockchain Protocols
Metadaten
Titel
P2P networking based internet of things (IoT) sensor node authentication by Blockchain
verfasst von
Sunghyuck Hong
Publikationsdatum
09.09.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00739-x

Weitere Artikel der Ausgabe 2/2020

Peer-to-Peer Networking and Applications 2/2020 Zur Ausgabe