{"title":"基于区块链技术的物联网应用安全认证协议","authors":"Choubey Siddhartha, Choubey Abha, Bajpai Shiwanee, Kumar Bajpai Prageet","doi":"10.26634/jcom.11.1.19380","DOIUrl":null,"url":null,"abstract":"The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure authentication protocol for IoT applications based on blockchain technology\",\"authors\":\"Choubey Siddhartha, Choubey Abha, Bajpai Shiwanee, Kumar Bajpai Prageet\",\"doi\":\"10.26634/jcom.11.1.19380\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.\",\"PeriodicalId\":130578,\"journal\":{\"name\":\"i-manager's Journal on Computer Science\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"i-manager's Journal on Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.26634/jcom.11.1.19380\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"i-manager's Journal on Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26634/jcom.11.1.19380","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure authentication protocol for IoT applications based on blockchain technology
The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.