Unified smart home resource access along with authentication using Blockchain technology

Abstract Since the last decade, Smart home systems achieved popularity due to their increase in comfort and improvement in quality life. Smart homes with the integration of Internet of Things devices by embedding intelligence into sensors and actuators, data, and services can be communicated efficiently and in a more secure manner. In a Smart home environment, there can be several users who will need to access services from various Smart home devices at any point in time either individually or concurrently. In an Internet of Things, it is possible to process and exchange data without human intervention. Therefore, because of this full autonomy, these entities need to recognize, authenticate entities and ensure the integrity of their exchanged data. In a conventional smart home system, every device has to authenticate separately using credentials. Such authentication is not required in a trusted environment. The same account can be shared across different devices and when shared, the authentication process can be reduced to a consent-based process. In this research, assuming that there are multiple smart devices connected to each other and to the cloud via the hub. Also, there can be multiple sets of users accessing the same set of smart devices and related services through different accounts. The problem with conventional authentication is no common authentication or authorization system to avoid redundant logins. In this regard, Blockchain has been considered for its potential to provide a framework for decentralized-based applications based on the concept of Smart Contracts. By combining the power of Blockchain technology and public-key cryptography it is possible to ensure secure authentication and identification of people and devices. This work avoids the duplicate authentication for accessing the same service and does the communication in a limited latency. Most of the important security goals such as authentication, authorization, confidentiality, and integrity are met.

[1]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[2]  Shuai Wang,et al.  Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[3]  Yan Wang,et al.  A survey on security and privacy issues of blockchain technology , 2018, Math. Found. Comput..

[4]  Angelo Spognardi,et al.  Analysis of DDoS-capable IoT malwares , 2017, 2017 Federated Conference on Computer Science and Information Systems (FedCSIS).

[5]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[6]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[7]  B. D. Parameshachari,et al.  A Modified ABC-SQP-Based Combined Approach for the Optimization of a Parallel Hybrid Electric Vehicle , 2020, Energies.

[8]  Aruna Seneviratne,et al.  A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain , 2018, IEEE Access.

[9]  Lei Hang,et al.  Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity , 2019, Sensors.

[10]  Fauzan Mirza,et al.  On mitigating sampling-induced accuracy loss in traffic anomaly detection systems , 2010, CCRV.

[11]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[12]  Yuan-Ting Zhang,et al.  A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.

[13]  Genshe Chen,et al.  BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT , 2018, Comput..

[14]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[15]  David Lee Kuo Chuen,et al.  Introduction to Bitcoin , 2015 .

[16]  Hyoungshick Kim,et al.  DDoS Attack Mitigation in Internet of Things Using Software Defined Networking , 2017, 2017 IEEE Third International Conference on Big Data Computing Service and Applications (BigDataService).

[17]  R. Thangarajan,et al.  Efficient anomaly detection and mitigation in software defined networking environment , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[18]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[19]  Nanjangud C. Narendra,et al.  Saranyu: Using Smart Contracts and Blockchain for Cloud Tenant Management , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).

[20]  S. Prabu,et al.  A Multimodal Authentication for Biometric Recognition System using Intelligent Hybrid Fusion Techniques , 2019, Journal of Medical Systems.

[21]  Lei Li,et al.  Cognitive Approach for Location Privacy Protection , 2018, IEEE Access.

[22]  K. Suzanne Barber,et al.  An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication , 2019, 2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI).

[23]  Mahmood Yousefi-Azar,et al.  Autoencoder-based feature learning for cyber security applications , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[24]  Maitreyee Dutta,et al.  Contiki-based mitigation of UDP flooding attacks in the Internet of things , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[25]  Kim-Kwang Raymond Choo,et al.  SDTE: A Secure Blockchain-Based Data Trading Ecosystem , 2020, IEEE Transactions on Information Forensics and Security.

[26]  Shahrulniza Musa,et al.  Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure , 2020, ArXiv.

[27]  Nur Haryani Zakaria,et al.  Security, Comfort, Healthcare, and Energy Saving:A Review on Biometric Factors for Smart Home Environment , 2018 .

[28]  A Kanchana,et al.  Detection and monitoring of the asymptotic COVID-19 patients using IoT devices and sensors , 2020, Int. J. Pervasive Comput. Commun..

[29]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..