SATI: Sidechain-Based Access Control & Trust Mechanism for IoT Networks

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Transactions on Network and Service Management Pub Date : 2024-08-07 DOI:10.1109/TNSM.2024.3438621
Aditya Pathak;Irfan Al-Anbagi;Howard J. Hamilton
{"title":"SATI: Sidechain-Based Access Control & Trust Mechanism for IoT Networks","authors":"Aditya Pathak;Irfan Al-Anbagi;Howard J. Hamilton","doi":"10.1109/TNSM.2024.3438621","DOIUrl":null,"url":null,"abstract":"Providing low latency, high security, and high resource utilization for Internet of Things (IoT) networks is challenging due to the heterogeneous nature of these networks and the need for more standardization in security algorithms. Current edge computing-based IoT solutions decrease network latency and improve resource utilization but do not provide adequate security because they offer multiple attack surfaces for adversaries. Recent work uses blockchain technology to provide better security in IoT networks. However, blockchain-based solutions suffer from scalability problems and can increase latency. Sidechains are parallel blockchain networks typically used to increase the scalability of blockchain networks. We propose a novel Sidechain-based Access control and Trust evaluation mechanism for IoT networks (SATI) to decrease network latency and improve scalability, security, and energy efficiency. SATI uses a sidechain with the blockchain network to improve its scalability. It also uses edge computing to provide low network latency and high resource utilization in terms of CPU and memory usage. In addition, trust evaluation and attribute-based access control mechanisms are used to improve the security of the IoT network. We compare our work with existing mechanisms in terms of scalability, security, latency, and CPU and memory usage. In addition, we perform a formal security analysis of the SATI mechanism using reduction-based analysis and the Scyther verification tool.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5888-5903"},"PeriodicalIF":5.4000,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network and Service Management","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10630615/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Providing low latency, high security, and high resource utilization for Internet of Things (IoT) networks is challenging due to the heterogeneous nature of these networks and the need for more standardization in security algorithms. Current edge computing-based IoT solutions decrease network latency and improve resource utilization but do not provide adequate security because they offer multiple attack surfaces for adversaries. Recent work uses blockchain technology to provide better security in IoT networks. However, blockchain-based solutions suffer from scalability problems and can increase latency. Sidechains are parallel blockchain networks typically used to increase the scalability of blockchain networks. We propose a novel Sidechain-based Access control and Trust evaluation mechanism for IoT networks (SATI) to decrease network latency and improve scalability, security, and energy efficiency. SATI uses a sidechain with the blockchain network to improve its scalability. It also uses edge computing to provide low network latency and high resource utilization in terms of CPU and memory usage. In addition, trust evaluation and attribute-based access control mechanisms are used to improve the security of the IoT network. We compare our work with existing mechanisms in terms of scalability, security, latency, and CPU and memory usage. In addition, we perform a formal security analysis of the SATI mechanism using reduction-based analysis and the Scyther verification tool.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SATI:基于侧链的物联网网络访问控制与信任机制
为物联网(IoT)网络提供低延迟、高安全性和高资源利用率具有挑战性,这是因为这些网络具有异构性,而且安全算法需要更加标准化。目前基于边缘计算的物联网解决方案可以降低网络延迟并提高资源利用率,但不能提供足够的安全性,因为它们为对手提供了多个攻击面。最近的研究利用区块链技术为物联网网络提供更好的安全性。然而,基于区块链的解决方案存在可扩展性问题,并可能增加延迟。侧链是并行的区块链网络,通常用于提高区块链网络的可扩展性。我们提出了一种新颖的基于侧链的物联网网络访问控制和信任评估机制(SATI),以降低网络延迟,提高可扩展性、安全性和能效。SATI 与区块链网络一起使用侧链,以提高其可扩展性。它还使用边缘计算来提供低网络延迟和高资源利用率(CPU 和内存使用率)。此外,还使用信任评估和基于属性的访问控制机制来提高物联网网络的安全性。我们从可扩展性、安全性、延迟、CPU 和内存使用率等方面将我们的工作与现有机制进行了比较。此外,我们还使用基于还原的分析和 Scyther 验证工具对 SATI 机制进行了正式的安全性分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Network and Service Management
IEEE Transactions on Network and Service Management Computer Science-Computer Networks and Communications
CiteScore
9.30
自引率
15.10%
发文量
325
期刊介绍: IEEE Transactions on Network and Service Management will publish (online only) peerreviewed archival quality papers that advance the state-of-the-art and practical applications of network and service management. Theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. These transactions will focus on the key technical issues related to: Management Models, Architectures and Frameworks; Service Provisioning, Reliability and Quality Assurance; Management Functions; Enabling Technologies; Information and Communication Models; Policies; Applications and Case Studies; Emerging Technologies and Standards.
期刊最新文献
Privacy-Preserving and Collusion-Resistant Data Query Scheme for Vehicular Platoons End-to-End Deterministic Network Slicing: A Profit-Driven Optimization Framework With Domain-Specific Algorithms IBNS: Optimizing Intent-Based 6G Network Slicing for Conflict Detection and Mitigation Quantum-Enhanced Matching Mechanism for Secure and Efficient Power IoT Data Trading Dynamic Normalization TD3-Based Task Offloading for UAV-Assisted Collaborative Computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1