DecAuth: Decentralized Authentication Scheme for IoT Device Using Ethereum Blockchain

Internet of Things (IoT) has lots of attention in the last decade. The connected IoT devices are more than the total world population. Due to its low cost, easy to deploy, and simple to implement, application areas are large like smart city, smart home, smart transportation, environment monitoring, agriculture and many more. There exists some security and privacy challenges in IoT system. The device identification is one of the challenges in any IoT application. Authentication is one of the processes to identify the device. Though some work has been done on this problem, most of these are using a centralized system. In this paper, we have proposed a distributed authentication system using the Blockchain technology The implementation of the proposed authentication is done on Ethereum platform for its better results in order to justify it as a superior scheme.

[1]  Hannes Hartenstein,et al.  Network Layer Aspects of Permissionless Blockchains , 2019, IEEE Communications Surveys & Tutorials.

[2]  Kim-Kwang Raymond Choo,et al.  A lightweight machine learning-based authentication framework for smart IoT devices , 2019, Inf. Sci..

[3]  Pin Lv,et al.  An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains , 2019, IEEE Access.

[4]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[5]  Xiaohong Jiang,et al.  Smart Contract-Based Access Control for the Internet of Things , 2018, IEEE Internet of Things Journal.

[6]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[7]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[8]  Archan Misra,et al.  Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks , 2018, Computer.

[9]  Zhiwei Wang,et al.  A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity , 2017, Future Gener. Comput. Syst..

[10]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[11]  Wei Ni,et al.  Blockchain's adoption in IoT: The challenges, and a way forward , 2019, J. Netw. Comput. Appl..

[12]  Biplab Sikdar,et al.  Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices , 2019, IEEE Internet of Things Journal.

[13]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[14]  Ye Li,et al.  Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices , 2019, IEEE Internet of Things Journal.

[15]  Khaled Salah,et al.  Using Blockchain for IOT Access Control and Authentication Management , 2018, ICIOT.

[16]  B. B. Gupta,et al.  A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices , 2017, Int. J. Adv. Intell. Paradigms.