scispace - formally typeset
Proceedings ArticleDOI

Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain

TLDR
This paper delineates combination of BlockChain and Sensor based PUF authentication mechanism for solving real-time but non-repudiable access to IoT devices in a Smart Home by utilizing a mining less consensus mechanism for the provision of immutable assurance to users' and IoT devices' transactions i.e. commands, status alerts, actions etc.
Abstract
With ubiquitous adoption of connected sensors, actuators and smart devices are finding inroads into daily life. Internet of Things (IoT) authentication is rapidly transforming from classical cryptographic user-centric knowledge based approaches to device signature based automated methodologies to corroborate identity between claimant and a verifier. Physical Unclonable Function (PUF) based IoT authentication mechanisms are gaining widespread interest as users are required to access IoT devices in real time while also expecting execution of sensitive (even physical) IoT actions immediately. This paper, delineates combination of BlockChain and Sensor based PUF authentication mechanism for solving real-time but non-repudiable access to IoT devices in a Smart Home by utilizing a mining less consensus mechanism for the provision of immutable assurance to users' and IoT devices' transactions i.e. commands, status alerts, actions etc.

read more

Citations
More filters
Journal ArticleDOI

Efficient Privacy-Preserving Authentication Protocol Using PUFs with Blockchain Smart Contracts

TL;DR: This paper proposes an efficient privacy-preserving authentication protocol based on blockchain technology and the secret computational model of physically unclonable function (denoted by PUF model), and ensures the security and privacy of outsourced big data in IoT environments.
Proceedings ArticleDOI

Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection

TL;DR: The proposed methodology is based on identifying each one of the used components through the use of PUF responses and employing blockchain technology, in order to set-up a platform for tracking the supply chain of both component and IoT devices, without requiring the existence of any central authority.
Journal ArticleDOI

Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems

TL;DR: In the proposed scheme, an identity-based authentication model is designed, and all communication nodes utilize this model to establish connection and conduct data exchange and a hash pool-based joint consensus algorithm is constructed.
Journal ArticleDOI

PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications

TL;DR: This article proposes a lightweight implementation of proof-of-work (PoW) mining with reconfigurable hardware primitives that can significantly reduce hardware resources and power overheads of PoW mining, while improving the transaction speed of large-scale IoT systems.
Proceedings ArticleDOI

An Infrastructure for Service Accountability based on Digital Identity and Blockchain 3.0

TL;DR: The notion of accountability node, a special case of blockchain 3.0 masternode, is identified as the key element of the devised infrastructure which acts as the main interface to cooperating services and relieves the users from the burden of having to directly interact with the blockchain.
References
More filters
Proceedings ArticleDOI

Physical unclonable functions for device authentication and secret key generation

TL;DR: This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
Proceedings ArticleDOI

Blockchain for IoT security and privacy: The case study of a smart home

TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Proceedings ArticleDOI

Towards an Optimized BlockChain for IoT

TL;DR: A lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits, is proposed.
BookDOI

Cryptographic Hardware and Embedded Systems - CHES 2004

TL;DR: This work considers two variants of secondorder differential power analysis: Zero-Offset 2DPA and FFT2DPA, and explores a couple of attacks that attempt to efficiently employ second-order techniques to overcome masking.
Related Papers (5)