skip to main content
10.1145/3384419.3430465acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
short-paper
Open Access

Blockchain-based scalable authentication for IoT: poster abstract

Published:16 November 2020Publication History

ABSTRACT

Device identity management and authentication are one of the critical and primary security challenges in IoT. In order to decrease the IoT attack surface and provide protection from security threats such as introduction of fake IoT nodes and identity theft, IoT requires scalable device identity management systems and resilient device authentication mechanisms. Existing mechanisms for device identity management and device authentication were not designed for huge number of devices and therefore are not suitable for IoT environments. This work presents results of a blockchain-based identity management approach with consensus authentication, as a scalable solution for IoT device authentication management. Our identity management approach relies on having a blockchain secure tamper proof registry and lightweight consensus-based identity authentication.

References

  1. Rabiya Abbas, Zainab Sultan, and Shahid Nazir Bhatti. 2017. Comparative analysis of automated load testing tools: Apache JMeter, Microsoft Visual Studio (TFS), LoadRunner, Siege. In 2017 International Conference on Communication Technologies. IEEE, Rawalpindi, Pakistan, 39--44.Google ScholarGoogle ScholarCross RefCross Ref
  2. Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. 2018. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security 78 (2018), 126--142.Google ScholarGoogle ScholarCross RefCross Ref
  3. Dongxing Li, Wei Peng, Wenping Deng, and Fangyu Gai. 2018. A Blockchain-Based Authentication and Security Mechanism for IoT. In 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE, Hangzhou, China, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ankur Lohachab and Karambir. 2019. ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. Journal of Information Security and Applications 46 (jun 2019), 1--12.Google ScholarGoogle Scholar
  5. Ola Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi. 2016. Identity-based authentication scheme for the Internet of Things. In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, Messina, Italy, 1109--1111.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, and Ravi Sandhu. 2019. IoT Passport. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM Press, New York, NY, USA, 83--92.Google ScholarGoogle Scholar

Index Terms

  1. Blockchain-based scalable authentication for IoT: poster abstract

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SenSys '20: Proceedings of the 18th Conference on Embedded Networked Sensor Systems
        November 2020
        852 pages
        ISBN:9781450375900
        DOI:10.1145/3384419

        Copyright © 2020 Owner/Author

        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 November 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate174of867submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader