scispace - formally typeset
Open AccessJournal ArticleDOI

An Improved Blockchain-Based Authentication Protocol for IoT Network Management

Reads0
Chats0
TLDR
This paper shows that the proposed improved blockchain-based authentication protocol (IBCbAP) has security vulnerabilities against secret disclosure, replay, traceability, and reuse attacks with the success probability of 1 and constant complexity of also 1, and proposes an improved protocol that has security properties such as secure access management and anonymity.
Abstract
Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices information with distributed attitude a new authentication protocol based on blockchain is proposed and it is claimed that this protocol satisfies user privacy preserving and security. However, in this paper, we show that this protocol has security vulnerabilities against secret disclosure, replay, traceability, and reuse attacks with the success probability of 1 and constant complexity of also 1. We also proposed an improved blockchain-based authentication protocol (IBCbAP) that has security properties such as secure access management and anonymity. We implemented IBCbAP using JavaScript programming language and Ethereum local blockchain. We also proved IBCbAP’s security both informally and formally through the Scyther tool. Our comparisons showed that IBCbAP could provide suitable security along with reasonable cost.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs

TL;DR: In this paper, the authors proposed a blockchain-based anonymous authentication scheme for VANETs, which is used to reduce the computational cost compared to conventional authentication schemes and is proven to provide better security.
Journal ArticleDOI

A secure blockchain-based group key agreement protocol for IoT

TL;DR: This paper proposes a blockchain-based authenticated group key agreement protocol for IoT, which introduces a new entity called the device manager, who acts as an intermediary to connect IoT devices with blockchain networks.
Journal ArticleDOI

Leveraging blockchain for ensuring trust in IoT: A survey

TL;DR: The significance of integrating Blockchain technology in the IoT environment to ensure trust among IoT devices is illustrated and a comparative analysis between traditional and Blockchain-based trust management techniques is presented to represent the significance of Blockchain in ensuring trust.
Journal ArticleDOI

Leveraging blockchain for ensuring trust in IoT: A survey

TL;DR: In this paper , the authors present a comparative analysis between traditional and blockchain-based trust management techniques as proof of work to represent the significance of blockchain in ensuring trust among IoT devices.
Journal ArticleDOI

Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy.

TL;DR: The implemented solution provides better address management with secured sharing and communication of IoT data, complete access control over the ownership of data and high scalability in terms of number of transactions that can be handled.
References
More filters
Proceedings ArticleDOI

Blockchain for IoT security and privacy: The case study of a smart home

TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Book

A Programming Language

TL;DR: The paper describes a succinct problem-oriented programming language that relies heavily on a systematic extension of a small set of basic operations to vectors, matrices, and trees, and on a family of flexible selection operations controlled by logical vectors.
Journal ArticleDOI

Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT

TL;DR: This paper proposes a new architecture for arbitrating roles and permissions in IoT based on blockchain technology and shows that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.
Book ChapterDOI

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

TL;DR: The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif or the Avispa tools, which have shown to be effective at finding attacks on protocols or establishing correctness of protocols.
Journal ArticleDOI

A Decentralized Privacy-Preserving Healthcare Blockchain for IoT

TL;DR: This work proposes a novel framework of modified blockchain models suitable for IoT devices that rely on their distributed nature and other additional privacy and security properties of the network that make IoT application data and transactions more secure and anonymous over a blockchain-based network.
Related Papers (5)