{"title":"SATI: Sidechain-Based Access Control & Trust Mechanism for IoT Networks","authors":"Aditya Pathak;Irfan Al-Anbagi;Howard J. Hamilton","doi":"10.1109/TNSM.2024.3438621","DOIUrl":null,"url":null,"abstract":"Providing low latency, high security, and high resource utilization for Internet of Things (IoT) networks is challenging due to the heterogeneous nature of these networks and the need for more standardization in security algorithms. Current edge computing-based IoT solutions decrease network latency and improve resource utilization but do not provide adequate security because they offer multiple attack surfaces for adversaries. Recent work uses blockchain technology to provide better security in IoT networks. However, blockchain-based solutions suffer from scalability problems and can increase latency. Sidechains are parallel blockchain networks typically used to increase the scalability of blockchain networks. We propose a novel Sidechain-based Access control and Trust evaluation mechanism for IoT networks (SATI) to decrease network latency and improve scalability, security, and energy efficiency. SATI uses a sidechain with the blockchain network to improve its scalability. It also uses edge computing to provide low network latency and high resource utilization in terms of CPU and memory usage. In addition, trust evaluation and attribute-based access control mechanisms are used to improve the security of the IoT network. We compare our work with existing mechanisms in terms of scalability, security, latency, and CPU and memory usage. In addition, we perform a formal security analysis of the SATI mechanism using reduction-based analysis and the Scyther verification tool.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5888-5903"},"PeriodicalIF":5.4000,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network and Service Management","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10630615/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Providing low latency, high security, and high resource utilization for Internet of Things (IoT) networks is challenging due to the heterogeneous nature of these networks and the need for more standardization in security algorithms. Current edge computing-based IoT solutions decrease network latency and improve resource utilization but do not provide adequate security because they offer multiple attack surfaces for adversaries. Recent work uses blockchain technology to provide better security in IoT networks. However, blockchain-based solutions suffer from scalability problems and can increase latency. Sidechains are parallel blockchain networks typically used to increase the scalability of blockchain networks. We propose a novel Sidechain-based Access control and Trust evaluation mechanism for IoT networks (SATI) to decrease network latency and improve scalability, security, and energy efficiency. SATI uses a sidechain with the blockchain network to improve its scalability. It also uses edge computing to provide low network latency and high resource utilization in terms of CPU and memory usage. In addition, trust evaluation and attribute-based access control mechanisms are used to improve the security of the IoT network. We compare our work with existing mechanisms in terms of scalability, security, latency, and CPU and memory usage. In addition, we perform a formal security analysis of the SATI mechanism using reduction-based analysis and the Scyther verification tool.
期刊介绍:
IEEE Transactions on Network and Service Management will publish (online only) peerreviewed archival quality papers that advance the state-of-the-art and practical applications of network and service management. Theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. These transactions will focus on the key technical issues related to: Management Models, Architectures and Frameworks; Service Provisioning, Reliability and Quality Assurance; Management Functions; Enabling Technologies; Information and Communication Models; Policies; Applications and Case Studies; Emerging Technologies and Standards.