Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks

View through CrossRef
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be computationally demanding because they require complex mathematical calculations. In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. Additionally, a test bed consisting of a Raspberry Pi network is presented to analyze the performance of the proposed protocol.
Title: Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
Description:
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications.
The security aspect of IoT networks is critical, especially the authentication of the devices in the network.
The current security model in IoT networks uses centralized key exchange servers that present a security weak point.
IoT networks need decentralized management for network security.
Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks.
However, blockchain authentication models are known to be computationally demanding because they require complex mathematical calculations.
In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger.
The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster.
These cluster chains are connected by another blockchain.
A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices.
The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested.
Additionally, a test bed consisting of a Raspberry Pi network is presented to analyze the performance of the proposed protocol.

Related Results

Convergence and representation of blockchain and smart contracts using the semantic web
Convergence and representation of blockchain and smart contracts using the semantic web
The Internet and the World Wide Web were designed with the intention of being decentralised and interoperable, and therefore more democratic, where users have power over their data...
La qualification de la blockchain
La qualification de la blockchain
La création de la blockchain a remis en question les notions traditionnelles de collaboration et d'échange. Cette thèse vise à démontrer que cette innovation n'est pas seulement te...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Anomaly Detection in Blockchain Using Machine Learning
Anomaly Detection in Blockchain Using Machine Learning
Blockchain technology has gained significant attention as a secure and decentralized platform for various applications. However, the immutable and distributed nature of blockchain ...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Decentralized energy supply chain networks using blockchain and IoT
Decentralized energy supply chain networks using blockchain and IoT
The integration of Blockchain and Internet of Things (IoT) technologies into decentralized energy supply chain networks offers transformative potential for enhancing efficiency, se...
Streamlining IoT-driven Data Using Blockchain
Streamlining IoT-driven Data Using Blockchain
The integration of Internet of Things (IoT) technology has revolutionized data collection and analytics, creating vast networks of interconnected devices generating large volumes o...

Back to Top