BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.

[1]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[2]  Lu Zhou,et al.  Lightweight IoT-based authentication scheme in cloud computing circumstance , 2019, Future Gener. Comput. Syst..

[3]  V. N. Sastry,et al.  Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things , 2017, Inf..

[4]  Samiran Chattopadhyay,et al.  Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications , 2019, IEEE Transactions on Industrial Informatics.

[5]  Ashok Kumar Das,et al.  Certificate-Based Anonymous Device Access Control Scheme for IoT Environment , 2019, IEEE Internet of Things Journal.

[6]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[7]  Joel J. P. C. Rodrigues,et al.  LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment , 2019, Sensors.

[8]  Arup Kumar Pal,et al.  An efficient three factor-based authentication scheme in multiserver environment using ECC , 2018, Int. J. Commun. Syst..

[9]  B. B. Gupta,et al.  A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices , 2017, Int. J. Adv. Intell. Paradigms.

[10]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[11]  Alireza Naghizadeh,et al.  Preserving receiver's anonymity for circular structured P2P networks , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[12]  F. Richard Yu,et al.  A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[13]  Rajni Gupta,et al.  Resource Provisioning and Scheduling Techniques of IoT Based Applications in Fog Computing , 2019, Int. J. Fog Comput..

[14]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[15]  Kostas E. Psannis,et al.  Advanced Media-Based Smart Big Data on Intelligent Cloud Systems , 2019, IEEE Transactions on Sustainable Computing.

[16]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[17]  Alireza Naghizadeh,et al.  Structural‐based tunneling: preserving mutual anonymity for circular P2P networks , 2016, Int. J. Commun. Syst..

[18]  Biplab Sikdar,et al.  Mutual Authentication in IoT Systems Using Physical Unclonable Functions , 2017, IEEE Internet of Things Journal.

[19]  Brij B. Gupta,et al.  Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..

[20]  Biplab Sikdar,et al.  BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments , 2018, BlockSys@SenSys.

[21]  Daya Gupta,et al.  NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access , 2018, IEEE Transactions on Consumer Electronics.

[22]  Hui Li,et al.  A Survey on Security Aspects for 3GPP 5G Networks , 2020, IEEE Communications Surveys & Tutorials.

[23]  Ashok Kumar Das,et al.  Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things , 2020, IEEE Transactions on Dependable and Secure Computing.

[24]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[25]  Mohammad S. Obaidat,et al.  An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks , 2020, IEEE Access.

[26]  Mirza Mohd. Sufyan Beg,et al.  Using Vehicles as Fog Infrastructures for Transportation Cyber-Physical Systems (T-CPS): Fog Computing for Vehicular Networks , 2019, Int. J. Softw. Sci. Comput. Intell..

[27]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[28]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[29]  NaghizadehA.,et al.  Structural-based tunneling , 2016 .

[30]  Lianbing Deng,et al.  A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..

[31]  Ahmed Jawad Kadhim,et al.  Energy-efficient multicast routing protocol based on SDN and fog computing for vehicular networks , 2019, Ad Hoc Networks.

[32]  Qingyi Zhu,et al.  Applications of Distributed Ledger Technologies to the Internet of Things , 2019, ACM Comput. Surv..

[33]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[34]  Reza Ebrahimi Atani,et al.  An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks , 2019, 2019 IEEE Conference on Application, Information and Network Security (AINS).

[35]  Dongxi Liu,et al.  Lightweight Mutual Authentication for IoT and Its Applications , 2017, IEEE Transactions on Sustainable Computing.

[36]  Sanjay P. Ahuja,et al.  Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications , 2020, Int. J. Cloud Appl. Comput..

[37]  Yaser Jararweh,et al.  A multi-attack resilient lightweight IoT authentication scheme , 2019, Trans. Emerg. Telecommun. Technol..

[38]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[39]  Joel J. P. C. Rodrigues,et al.  Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment , 2019, IEEE Access.

[40]  Rui Zhang,et al.  Security and Privacy on Blockchain , 2019, ACM Comput. Surv..

[41]  Ben Smyth,et al.  ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial , 2011 .

[42]  Mauro Conti,et al.  A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..