Proceedings ArticleDOI
Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain
TLDR
This paper delineates combination of BlockChain and Sensor based PUF authentication mechanism for solving real-time but non-repudiable access to IoT devices in a Smart Home by utilizing a mining less consensus mechanism for the provision of immutable assurance to users' and IoT devices' transactions i.e. commands, status alerts, actions etc.Abstract:
With ubiquitous adoption of connected sensors, actuators and smart devices are finding inroads into daily life. Internet of Things (IoT) authentication is rapidly transforming from classical cryptographic user-centric knowledge based approaches to device signature based automated methodologies to corroborate identity between claimant and a verifier. Physical Unclonable Function (PUF) based IoT authentication mechanisms are gaining widespread interest as users are required to access IoT devices in real time while also expecting execution of sensitive (even physical) IoT actions immediately. This paper, delineates combination of BlockChain and Sensor based PUF authentication mechanism for solving real-time but non-repudiable access to IoT devices in a Smart Home by utilizing a mining less consensus mechanism for the provision of immutable assurance to users' and IoT devices' transactions i.e. commands, status alerts, actions etc.read more
Citations
More filters
Journal ArticleDOI
Efficient Privacy-Preserving Authentication Protocol Using PUFs with Blockchain Smart Contracts
TL;DR: This paper proposes an efficient privacy-preserving authentication protocol based on blockchain technology and the secret computational model of physically unclonable function (denoted by PUF model), and ensures the security and privacy of outsourced big data in IoT environments.
Proceedings ArticleDOI
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection
Lydia Negka,Georgios Gketsios,Nikolaos Athanasios Anagnostopoulos,Georgios Spathoulas,Athanasios Kakarountas,Stefan Katzenbeisser +5 more
TL;DR: The proposed methodology is based on identifying each one of the used components through the use of PUF responses and employing blockchain technology, in order to set-up a platform for tracking the supply chain of both component and IoT devices, without requiring the existence of any central authority.
Journal ArticleDOI
Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems
TL;DR: In the proposed scheme, an identity-based authentication model is designed, and all communication nodes utilize this model to establish connection and conduct data exchange and a hash pool-based joint consensus algorithm is constructed.
Journal ArticleDOI
PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications
TL;DR: This article proposes a lightweight implementation of proof-of-work (PoW) mining with reconfigurable hardware primitives that can significantly reduce hardware resources and power overheads of PoW mining, while improving the transaction speed of large-scale IoT systems.
Proceedings ArticleDOI
An Infrastructure for Service Accountability based on Digital Identity and Blockchain 3.0
TL;DR: The notion of accountability node, a special case of blockchain 3.0 masternode, is identified as the key element of the devised infrastructure which acts as the main interface to cooperating services and relieves the users from the burden of having to directly interact with the blockchain.
References
More filters
Proceedings ArticleDOI
Physical unclonable functions for device authentication and secret key generation
G. Edward Suh,Srinivas Devadas +1 more
TL;DR: This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
Proceedings Article
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Proceedings ArticleDOI
Blockchain for IoT security and privacy: The case study of a smart home
TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Proceedings ArticleDOI
Towards an Optimized BlockChain for IoT
TL;DR: A lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits, is proposed.
BookDOI
Cryptographic Hardware and Embedded Systems - CHES 2004
TL;DR: This work considers two variants of secondorder differential power analysis: Zero-Offset 2DPA and FFT2DPA, and explores a couple of attacks that attempt to efficiently employ second-order techniques to overcome masking.