scispace - formally typeset
Book ChapterDOI

Efficient Authentication Scheme Using Blockchain in IoT Devices

Reads0
Chats0
TLDR
An authentication scheme that uses no centralized servers and makes IoT devices interact directly with Blockchain is designed and is implemented, which provides users the flexibility to design there own rules for authentication.
Abstract
Authentication of users and devices is one of the security issues on the internet of things (IoT). Traditionally, the authentication system is based on a centralized server, which makes it prone to various security threats and potential attacks; also, the stored data can tamper. In this paper, existing issues are resolved using Blockchain. IoT devices do not have much computational power. Blockchain technology, which uses the Proof-of-Work concept, consumes a lot of energy, which makes it not suitable for IoT devices. A new efficient scheme to reduce the computational energy of the devices is discussed, along with an authentication scheme that uses no centralized servers and makes IoT devices interact directly with Blockchain is designed and is implemented. The smart contract concept is used in this scheme, which provides users the flexibility to design there own rules for authentication.

read more

Citations
More filters
Posted Content

On the Security and Performance of Proof of Work Blockchains

TL;DR: In this article, the authors introduce a quantitative framework to analyze the security and performance implications of various consensus and network parameters of PoW blockchains, and devise optimal adversarial strategies for double-spending and selfish mining.
Proceedings ArticleDOI

A Lightweight And Secure Authentication Protocol for WSN.

TL;DR: There is a need for a lightweight and secure authentication protocol for WSNs, where the sensors used in WSN are designed for low power environments, and longevity and hence do not possess these hardware resources to secure the communication.
Book ChapterDOI

A Security Model of IoT Device Identity Authentication Based on Digital Identity Certificate and Public Key Encryption

TL;DR: In this paper , the authors adopt the digital identity certificate and public key encryption technical scheme based on cryptographic technology to construct a credible security architecture for identity authentication of Internet of Things devices.
Proceedings ArticleDOI

An Efficient Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV).

TL;DR: The performance analysis proves that the proposed improvised authentication and lightweight batch verification method is more reliable that reduces the computational delay and has a better performance in the delay-sensitive network as compared to the existing schemes.
Proceedings ArticleDOI

SMMAP: Secure MAC-based Mutual Authentication Protocol for IoV

TL;DR: Secure MAC-based Mutual Authentication Protocol (SMMAP) for Internet of Vehicles (IoV) is proposed in this article , which provides a rigorous proof of security and authenticity for the proposed SMMAP scheme using the BAN logic.
References
More filters
Proceedings ArticleDOI

On the Security and Performance of Proof of Work Blockchains

TL;DR: This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.
Proceedings ArticleDOI

Managing IoT devices using blockchain platform

TL;DR: This work proposes using blockchain to build IoT system, which can control and configure IoT devices and build key management system, and chooses Ethereum because it can manage the system in a more fine-grained way.
Proceedings ArticleDOI

Towards an Optimized BlockChain for IoT

TL;DR: A lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits, is proposed.
Journal ArticleDOI

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT

TL;DR: This paper proposes an original decentralized system called bubbles of trust, which ensures a robust identification and authentication of devices, and protects the data integrity and availability in IoT.
Journal ArticleDOI

Survey on blockchain for Internet of Things

TL;DR: The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures.
Related Papers (5)