A consortium blockchain-edge enabled authentication scheme for underwater acoustic network (UAN)

IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Neeraj Kumar, Rifaqat Ali
{"title":"A consortium blockchain-edge enabled authentication scheme for underwater acoustic network (UAN)","authors":"Neeraj Kumar,&nbsp;Rifaqat Ali","doi":"10.1016/j.iot.2024.101426","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Things (IoT) allows for automated operations in diverse fields, such as agriculture monitoring, pollution monitoring, health care, and underwater monitoring. The Internet of Underwater Things (IoUT) observes the underwater environment, assists in exploration, mitigates disasters, and monitors some factors including temperature, pressure, and pollution. The IoUT relies on a network of intelligent underwater sensors that send data to surface base stations and IoT devices for storage and analysis. Nevertheless, these systems face security risks as they operate in unattended environments. Many authentication methods depend on a centralized third party, leading to higher computation costs and energy usage. To mitigate security risks, autonomous underwater devices need secure connections and authentication. This paper suggests a decentralized authentication mechanism for UAN to safeguard against unauthorized access and ensure secure data storage in the cloud. The proposed mechanism prioritizes robustness, transparency, and energy efficiency. The suggested solution incorporates an architecture based on edge and cloud layers, utilizing customized blockchain technology for secure storage and processing of data. The security of the proposed solution has been thoroughly examined through formal analysis utilizing the Real or Random (ROR) Oracle model and Scyther tool. Informal analysis further confirms the solution’s resilience against various malicious attacks. Additionally, performance and comparative analysis demonstrate that the proposed solution surpasses existing schemes.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101426"},"PeriodicalIF":6.0000,"publicationDate":"2024-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660524003676","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) allows for automated operations in diverse fields, such as agriculture monitoring, pollution monitoring, health care, and underwater monitoring. The Internet of Underwater Things (IoUT) observes the underwater environment, assists in exploration, mitigates disasters, and monitors some factors including temperature, pressure, and pollution. The IoUT relies on a network of intelligent underwater sensors that send data to surface base stations and IoT devices for storage and analysis. Nevertheless, these systems face security risks as they operate in unattended environments. Many authentication methods depend on a centralized third party, leading to higher computation costs and energy usage. To mitigate security risks, autonomous underwater devices need secure connections and authentication. This paper suggests a decentralized authentication mechanism for UAN to safeguard against unauthorized access and ensure secure data storage in the cloud. The proposed mechanism prioritizes robustness, transparency, and energy efficiency. The suggested solution incorporates an architecture based on edge and cloud layers, utilizing customized blockchain technology for secure storage and processing of data. The security of the proposed solution has been thoroughly examined through formal analysis utilizing the Real or Random (ROR) Oracle model and Scyther tool. Informal analysis further confirms the solution’s resilience against various malicious attacks. Additionally, performance and comparative analysis demonstrate that the proposed solution surpasses existing schemes.
用于水下声学网络 (UAN) 的联盟区块链边缘认证方案
物联网(IoT)可在农业监测、污染监测、医疗保健和水下监测等不同领域实现自动化操作。水下物联网(IoUT)可观测水下环境,协助勘探,减轻灾害,并监测温度、压力和污染等因素。IoUT 依靠智能水下传感器网络将数据发送到地面基站和物联网设备进行存储和分析。然而,这些系统在无人值守的环境中运行时面临着安全风险。许多身份验证方法依赖于集中的第三方,导致计算成本和能耗增加。为了降低安全风险,自主水下设备需要安全连接和认证。本文提出了一种用于 UAN 的分散式身份验证机制,以防止未经授权的访问并确保云中数据的安全存储。建议的机制优先考虑稳健性、透明度和能效。建议的解决方案采用基于边缘和云层的架构,利用定制的区块链技术实现数据的安全存储和处理。通过利用真实或随机(ROR)甲骨文模型和 Scyther 工具进行形式分析,对所建议解决方案的安全性进行了彻底检查。非正式分析进一步证实了该解决方案能够抵御各种恶意攻击。此外,性能和比较分析表明,拟议解决方案超越了现有方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Internet of Things
Internet of Things Multiple-
CiteScore
3.60
自引率
5.10%
发文量
115
审稿时长
37 days
期刊介绍: Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT. The journal will place a high priority on timely publication, and provide a home for high quality. Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信