ABSTRACT
Device identity management and authentication are one of the critical and primary security challenges in IoT. In order to decrease the IoT attack surface and provide protection from security threats such as introduction of fake IoT nodes and identity theft, IoT requires scalable device identity management systems and resilient device authentication mechanisms. Existing mechanisms for device identity management and device authentication were not designed for huge number of devices and therefore are not suitable for IoT environments. This work presents results of a blockchain-based identity management approach with consensus authentication, as a scalable solution for IoT device authentication management. Our identity management approach relies on having a blockchain secure tamper proof registry and lightweight consensus-based identity authentication.
- Rabiya Abbas, Zainab Sultan, and Shahid Nazir Bhatti. 2017. Comparative analysis of automated load testing tools: Apache JMeter, Microsoft Visual Studio (TFS), LoadRunner, Siege. In 2017 International Conference on Communication Technologies. IEEE, Rawalpindi, Pakistan, 39--44.Google Scholar
Cross Ref
- Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. 2018. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security 78 (2018), 126--142.Google Scholar
Cross Ref
- Dongxing Li, Wei Peng, Wenping Deng, and Fangyu Gai. 2018. A Blockchain-Based Authentication and Security Mechanism for IoT. In 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE, Hangzhou, China, 1--6.Google Scholar
Cross Ref
- Ankur Lohachab and Karambir. 2019. ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. Journal of Information Security and Applications 46 (jun 2019), 1--12.Google Scholar
- Ola Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi. 2016. Identity-based authentication scheme for the Internet of Things. In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, Messina, Italy, 1109--1111.Google Scholar
Cross Ref
- Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, and Ravi Sandhu. 2019. IoT Passport. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. ACM Press, New York, NY, USA, 83--92.Google Scholar
Index Terms
Blockchain-based scalable authentication for IoT: poster abstract
Recommendations
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices
AbstractAs the extension and expansion of the Internet, the Internet of things (IoT) connects things with the network through information sensing equipment to achieve intelligent identification, positioning, monitoring, management and other ...
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
AbstractWith the rapid increase in the number of Internet of Things (IoT) devices in recent years, massive amounts of sensitive IoT data are being generated and transmitted over the Internet. Despite its growing adoption in various fields, IoT ...
Blockchain-Driven Hybrid Model for IoT Authentication
Internet of Things, Smart Spaces, and Next Generation Networks and SystemsAbstractThe Internet of Things has the potential to play a significant part in the ongoing Industrial Revolution. Machines, devices, and sensors are able to connect and communicate with each other via networks. These Internet of Things devices generate an ...





Comments