An Efficient Blockchain Based Authentication Scheme to Secure Fog Enabled IoT Devices

Jaideep Kaur Mudhar, S. Kalra, J. Malhotra
{"title":"An Efficient Blockchain Based Authentication Scheme to Secure Fog Enabled IoT Devices","authors":"Jaideep Kaur Mudhar, S. Kalra, J. Malhotra","doi":"10.1109/Indo-TaiwanICAN48429.2020.9181356","DOIUrl":null,"url":null,"abstract":"IoT Devices have revolutionized how people interact with each other and their surroundings, with Gartner predicting 50 billion devices by 2020. IoT devices emerging from WSN to RFIDs are capable of sensing, actuating and sharing data but are resource-constrained devices meaning these devices have limited memory, storage, and computation power. Thus, IoT devices are incapable of securing themselves from various security and privacy threats. Moreover, current Cloud-IoT architectures are centralized; managed and controlled by Trusted Third parties also individuals have no control over their data. Fog-IoT integration has better latency, response time and is much secure compared to Cloud-IoT integration. Recently, Blockchain emerged as a decentralized, highly trusted and tamper-proof technology. In this paper, we proposed a blockchain-based scheme for secure User authentication access to Fog enabled IoT devices. The proposed scheme utilizes the Ethereum Smart Contract. We developed our smart contract using Solidity language with Remix-IDE and tested its functionalities on two test networks Test RPC (Ganache) and Rinkeby Test Network. We also analyzed security vulnerabilities of our smart contract on the ChainSecurity analyzing tool.","PeriodicalId":171125,"journal":{"name":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Indo-TaiwanICAN48429.2020.9181356","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

IoT Devices have revolutionized how people interact with each other and their surroundings, with Gartner predicting 50 billion devices by 2020. IoT devices emerging from WSN to RFIDs are capable of sensing, actuating and sharing data but are resource-constrained devices meaning these devices have limited memory, storage, and computation power. Thus, IoT devices are incapable of securing themselves from various security and privacy threats. Moreover, current Cloud-IoT architectures are centralized; managed and controlled by Trusted Third parties also individuals have no control over their data. Fog-IoT integration has better latency, response time and is much secure compared to Cloud-IoT integration. Recently, Blockchain emerged as a decentralized, highly trusted and tamper-proof technology. In this paper, we proposed a blockchain-based scheme for secure User authentication access to Fog enabled IoT devices. The proposed scheme utilizes the Ethereum Smart Contract. We developed our smart contract using Solidity language with Remix-IDE and tested its functionalities on two test networks Test RPC (Ganache) and Rinkeby Test Network. We also analyzed security vulnerabilities of our smart contract on the ChainSecurity analyzing tool.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种有效的基于区块链的认证方案,以保护启用雾的物联网设备
物联网设备彻底改变了人们与他人以及周围环境的互动方式,Gartner预测到2020年将有500亿台设备。从WSN到rfid的物联网设备能够感知、驱动和共享数据,但它们是资源受限的设备,这意味着这些设备的内存、存储和计算能力有限。因此,物联网设备无法保护自己免受各种安全和隐私威胁。此外,当前的云-物联网架构是集中式的;由受信任的第三方管理和控制,个人也无法控制自己的数据。与云-物联网集成相比,雾-物联网集成具有更好的延迟和响应时间,并且更加安全。最近,区块链作为一种去中心化、高度可信和防篡改的技术出现了。在本文中,我们提出了一种基于区块链的方案,用于对启用雾的物联网设备进行安全用户身份验证访问。该方案利用了以太坊智能合约。我们使用solididity语言和Remix-IDE开发了我们的智能合约,并在两个测试网络测试RPC (Ganache)和Rinkeby测试网络上测试了它的功能。我们还在ChainSecurity分析工具上分析了我们的智能合约的安全漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Weather Attribute-Aware Multi-Scale Image Generation with Residual Learning Deep Learning System for Image Retrieval A Novel IoT-based Framework for Indoor Rescue Operations Performance Investigation of Optical Communication System using FSO and OWC Channel Crawler by Inference
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1