Secure Authentication Protocol for IoT Applications Based on Blockchain Technology

Siddhartha Choubey*, Abha Choubey**, Shiwanee Bajpai***, Prageet Kumar Bajpai****
*-**** Department of Computer Science and Engineering, Shri Shankaracharya Technical Campus, Bhilai, Chhattisgarh, India.
Periodicity:April - June'2023
DOI : https://doi.org/10.26634/jcom.11.1.19380

Abstract

The lack of security in Internet of Things (IoT) infrastructure across different applications has attracted the attention of researchers to work on IoT security issues. The paper presents a scenario where blockchain technology is combined with IoT to provide a decentralized security mechanism. Secure authentication and Key-Agreement technique are proposed for IoT nodes and peers to ensure proper authorization before communication can take place. The proposed protocol uses public key cryptography to generate a shared symmetric key for mutual authentication and two-party conversation. The protocol was tested using Scyther and was found to be robust enough to withstand all known authentication-related attacks, including replay, and typing attacks. Hyperledger, a blockchain technology, was employed to provide a more efficient IoT-enabled infrastructure for the scalability of IoT devices on the network. The proposed technique provides a secure and scalable system for device authentication in a blockchain-enabled IoT environment.

Keywords

Internet of Things (IoT), Blockchain, Bitcoin, Security, Cryptography.

How to Cite this Article?

Choubey, S., Choubey, A., Bajpai, S., and Bajpai, P. K. (2023). Secure Authentication Protocol for IoT Applications Based on Blockchain Technology. i-manager’s Journal on Computer Science, 11(1), 12-25. https://doi.org/10.26634/jcom.11.1.19380

References

[6]. Dolev, D., & Yao, A. C. (1981). On the security of public key protocols. In 22nd Annual Symposium on Foundations of Computer Science (SFCS 1981), (pp. 350–357).
[24]. Ye, N., Zhu, Y., Wang, R. C., Malekian, R., & Lin, Q. M. (2014). An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics & Information Sciences, 8, 1617-1624.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.