Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective

IF 0.5 Q4 COMPUTER SCIENCE, THEORY & METHODS
E. Babu, Ilaiah Kavati, Ramalingaswamy Cheruku, Soumyabrata Nayak, Uttam Ghosh
{"title":"Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective","authors":"E. Babu, Ilaiah Kavati, Ramalingaswamy Cheruku, Soumyabrata Nayak, Uttam Ghosh","doi":"10.1142/s0219265922430010","DOIUrl":null,"url":null,"abstract":"The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service. IoT examples in retail commerce are smart refrigerators, smart speakers, smart washing machines, smart automobiles, and automatic re-purchase of groceries using RFID tags. Despite the rise, one of the significant inconveniences slowing rapid adaption is the “security” of these devices, which are vulnerable to various attacks. One such attack is Distributed Denial-of-Service (DDoS) attacks targeting offline or online sensitive data. Hence, a lightweight cryptographic mechanism needs to establish secure communication among IoT devices. This paper presents the solution to secure communication among IoT devices using a permissioned blockchain network. Specifically, in this work, we proposed a mechanism for identifying and authenticating the smart devices using the Elliptic-curve cryptography (ECC) protocol. This proposed work uses permissioned blockchain infrastructure, which acts as a source of trust that aids the authentication process using ECC cryptosystem. In addition, lightweight Physical Unclonable Function (PUF) technology is also used to securely store the device’s keys. Using this technology, the private keys need not be stored anywhere, but it is generated on the fly from the trusted zone whenever the private key is required.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF INTERCONNECTION NETWORKS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/s0219265922430010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service. IoT examples in retail commerce are smart refrigerators, smart speakers, smart washing machines, smart automobiles, and automatic re-purchase of groceries using RFID tags. Despite the rise, one of the significant inconveniences slowing rapid adaption is the “security” of these devices, which are vulnerable to various attacks. One such attack is Distributed Denial-of-Service (DDoS) attacks targeting offline or online sensitive data. Hence, a lightweight cryptographic mechanism needs to establish secure communication among IoT devices. This paper presents the solution to secure communication among IoT devices using a permissioned blockchain network. Specifically, in this work, we proposed a mechanism for identifying and authenticating the smart devices using the Elliptic-curve cryptography (ECC) protocol. This proposed work uses permissioned blockchain infrastructure, which acts as a source of trust that aids the authentication process using ECC cryptosystem. In addition, lightweight Physical Unclonable Function (PUF) technology is also used to securely store the device’s keys. Using this technology, the private keys need not be stored anywhere, but it is generated on the fly from the trusted zone whenever the private key is required.
基于信任的智能设备互联网识别与认证许可区块链网络:电子商务展望
物联网指的是我们周围数十亿台连接到无线互联网的设备。这些物联网设备是内存受限的设备,可以在没有人工帮助的情况下通过网络收集和传输数据。最近,物联网在零售商业中实现,从识别服务向购后参与服务转变。零售商业中的物联网示例包括智能冰箱、智能扬声器、智能洗衣机、智能汽车以及使用RFID标签的杂货自动再购买。尽管有所上升,但减缓快速适应的一个重大不便是这些设备的“安全性”,容易受到各种攻击。其中一种攻击是针对离线或在线敏感数据的分布式拒绝服务(DDoS)攻击。因此,需要一种轻量级的加密机制来建立物联网设备之间的安全通信。本文提出了使用许可的区块链网络来保护物联网设备之间通信的解决方案。具体来说,在这项工作中,我们提出了一种使用椭圆曲线加密(ECC)协议识别和认证智能设备的机制。这项提议的工作使用许可的区块链基础设施,作为信任的来源,帮助使用ECC密码系统的身份验证过程。此外,轻量级的物理不可克隆功能(PUF)技术也用于安全存储设备的密钥。使用这种技术,私钥不需要存储在任何地方,而是在需要私钥时从可信区域动态生成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
JOURNAL OF INTERCONNECTION NETWORKS
JOURNAL OF INTERCONNECTION NETWORKS COMPUTER SCIENCE, THEORY & METHODS-
自引率
14.30%
发文量
121
期刊介绍: The Journal of Interconnection Networks (JOIN) is an international scientific journal dedicated to advancing the state-of-the-art of interconnection networks. The journal addresses all aspects of interconnection networks including their theory, analysis, design, implementation and application, and corresponding issues of communication, computing and function arising from (or applied to) a variety of multifaceted networks. Interconnection problems occur at different levels in the hardware and software design of communicating entities in integrated circuits, multiprocessors, multicomputers, and communication networks as diverse as telephone systems, cable network systems, computer networks, mobile communication networks, satellite network systems, the Internet and biological systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信