BCTrust: A decentralized authentication blockchain-based mechanism

Internet of Things becomes a major part of our lives, billions of autonomous devices are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes the boundaries between the real and the virtual worlds. The Wireless Sensor Networks are a masterpiece of the success of this technology, using limited capacity sensors and actuators, industrial, medical, agricultural and many other environments can be covered and managed automatically. This autonomous interacting things should authenticate each other, and communicate securely. Otherwise malicious users can cause serious damages on such systems. In this paper we propose a robust, transparent, flexible and energy efficient blockchain-based authentication mechanism called BCTrust, which is designed especially for devices with computational, storage and energy consumption constraints. In order to evaluate our approach, we realized a real implementation with C programming language, and Ethereum Blockchain.

[1]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[2]  Marko Vukolić,et al.  Rethinking Permissioned Blockchains , 2017 .

[3]  Mukul Panwar,et al.  Security for IoT: An effective DTLS with public certificates , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[4]  Chiara Petrioli,et al.  Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).

[5]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[6]  Mihai Romanca,et al.  Applications of energy model in WSN nodes , 2014, 2014 International Conference on Optimization of Electrical and Electronic Equipment (OPTIM).

[7]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[8]  Ahmed Serhrouchni,et al.  A lightweight IoT security protocol , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[9]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[10]  Morris J. Dworkin,et al.  SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .

[11]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[12]  Hitesh Malviya,et al.  How Blockchain Will Defend IOT , 2016 .

[13]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[14]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  M. Iansiti,et al.  The Truth about Blockchain , 2017 .

[17]  Dieter Hogrefe,et al.  Secure and Authenticated Data Communication in Wireless Sensor Networks , 2015, Sensors.