Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A formally verified blockchain-based decentralised authentication scheme for the internet of things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT devices is becoming a major concern as an attacker can exploit network services via network capture or deployment of malicious devices. Therefore, IoT device authentication is a key security requirement. Conventional authentication approaches have proved insufficient in dealing with a large number of IoT devices because of various shortcomings, such as centrally designed architectures and expensive cryptographic primitives. Blockchain technology has led to the creation of decentralised IoT authentication solutions with their desirable characteristics. Due to the integration of IoT and Blockchain technology, however, performance is one of the significant challenges. Existing Blockchain-based authentication schemes create extra storage, computing and communication overheads on the Blockchain which restricts its use for different IoT networks. In this paper, we design an efficient decentralised Blockchain-based authentication scheme aimed at achieving a secure authentication for IoT devices using the token mechanism. We design the Ethereum Blockchain network model to implement our scheme, in which smart contracts provide secure connectivity between miner nodes and IoT devices. We demonstrate our proposed scheme with an IoT-based smart home case study, which shows significant performance in computation and communication overheads compared with existing Blockchain-based authentication schemes. The modelling, analysis and verification of the proposed scheme, using high level Petri nets (HLPNs) and Z3 SMT solver are also provided to prove correctness and to verify the claims of our model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. 1 ETC = $45.45 (AUD)- Writing a paper on Apr 20, 2021.

  2. 1 Ether = 0.000000001 Gwei.

References

  1. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad hoc Netw. 10(7):1497–1516

    Article  Google Scholar 

  2. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IOT): a vision, architectural elements, and future directions. Future Gener Comput. Syst. 29(7):1645–1660

    Article  Google Scholar 

  3. Veeramakali T, Siva R, Sivakumar B, Mahesh PS, Krishnaraj N (2021) An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. J Supercomput pp 1–21

  4. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376

    Article  Google Scholar 

  5. Ujjwal K, Garg S, Hilton J, Aryal J, Forbes-Smith N (2019) Cloud computing in natural hazard modeling systems: current research trends and future directions. Int J Disaster Risk Reduct. 38:101188

    Article  Google Scholar 

  6. Khan MA, Abuhasel KA (2020) An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things. J Supercomput pp 1–15

  7. Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of things (IOT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), IEEE, pp 321–326

  8. Kim H, Lee EA (2017) Authentication and authorization for the internet of things. IT Prof 19(5):27–33

    Article  Google Scholar 

  9. Sharma S, Verma VK (2021) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 77(5):4778–4812

    Article  Google Scholar 

  10. Liu J, Xiao Y, Chen CP (2012) Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, IEEE, pp 588–592

  11. Mendez Mena D, Papapanagiotou I, Yang B (2018) Internet of things: survey on security. Inf Secur J A Glob Perspect 27(3):162–182

    Article  Google Scholar 

  12. Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multi-level trust-based intelligence schema for securing of internet of things (IOT) against security threats using cryptographic authentication. J Supercomput pp 1–26

  13. Tu YJ, Kapoor G, Piramuthu S (2021) Security of lightweight mutual authentication protocols. J Supercomput 77(5):4565–4581

    Article  Google Scholar 

  14. Wang P, Chaudhry S, Li L, Li S, Tryfonas T, Li H (2016) The internet of things: a security point of view. Intern Res

  15. Abomhara M et al (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobil 4(1):65–88

    Article  Google Scholar 

  16. Duan Y, Li J, Srivastava G, Yeh JH (2020) Data storage security for the internet of things. J Supercomput pp 1–19

  17. Lau CH, Alan KHY, Yan F (2018) Blockchain-based authentication in IOT networks. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), IEEE, pp 1–8

  18. Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Tech. rep, Manubot

    Google Scholar 

  19. Swan M (2015) Blockchain thinking: the brain as a decentralized autonomous corporation [commentary]. IEEE Technol Soc Mag 34(4):41–52

    Article  Google Scholar 

  20. Puthal D, Malik N, Mohanty SP, Kougianos E, Yang C (2018) The blockchain as a decentralized security framework [future directions]. IEEE Consum Electron Mag 7(2):18–21

    Article  Google Scholar 

  21. Panarello A, Tapas N, Merlino G, Longo F, Puliafito A (2018) Blockchain and IOT integration: a systematic survey. Sensors 18(8):2575

    Article  Google Scholar 

  22. Liu T, Yuan Y, Yu Z (2021) The service architecture of internet of things terminal connection based on blockchain technology. J Supercomput pp 1–21

  23. Košt’ál K, Helebrandt P, Belluš M, Ries M, Kotuliak I (2019) Management and monitoring of IOT devices using blockchain. Sensors 19(4):856

    Article  Google Scholar 

  24. Guin U, Cui P, Skjellum A (2018) Ensuring proof-of-authenticity of IOT edge devices using blockchain technology. 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber. Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, pp 1042–1049

  25. Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj Yellow Pap 151(2014):1–32

    Google Scholar 

  26. Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), IEEE, pp 557–564

  27. Luu L, Chu DH, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 254–269

  28. Atlam HF, Wills GB (2019) Intersections between IOT and distributed ledger. Adv Comput 115:73–113

    Article  Google Scholar 

  29. Zhu X, Badr Y, Pacheco J, Hariri S (2017) Autonomic identity framework for the internet of things. In: 2017 International Conference on Cloud and Autonomic Computing (ICCAC), IEEE, pp 69–79

  30. Fayad A, Hammi B, Khatoun R (2018) An adaptive authentication and authorization scheme for IOT’s gateways: a blockchain based approach. 2018 Third International Conference on Security of Smart Cities. Industrial Control System and Communications (SSIC), IEEE, pp 1–7

  31. Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IOT. Comput Secur 78:126–142

    Article  Google Scholar 

  32. Leng J, Ruan G, Jiang P, Xu K, Liu Q, Zhou X, Liu C (2020) Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey. Renew Sustain Energy Rev 132:110112

    Article  Google Scholar 

  33. Leng J, Ye S, Zhou M, Zhao JL, Liu Q, Guo W, Cao W, Fu L (2020) Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Trans Syst Man Cybern Syst

  34. Huh S, Cho S, Kim S (2017) Managing iot devices using blockchain platform. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), IEEE, pp 464–467

  35. Durand A, Gremaud P, Pasquier J (2017) Decentralized web of trust and authentication for the internet of things. In: Proceedings of the Seventh International Conference on the Internet of Things, pp 1–2

  36. Li D, Peng W, Deng W, Gai F (2018) A blockchain-based authentication and security mechanism for IOT. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), IEEE, pp 1–6

  37. Almadhoun R, Kadadha M, Alhemeiri M, Alshehhi M, Salah K (2018) A user authentication scheme of IOT devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), IEEE, pp 1–8

  38. Lee JH (2017) Bidaas: Blockchain based ID as a service. IEEE Access 6:2274–2278

    Article  Google Scholar 

  39. Lee CH, Kim KH (2018) Implementation of IOT system using block chain with authentication and data protection. In: 2018 International Conference on Information Networking (ICOIN), IEEE, pp 936–940

  40. Patwary AAN, Fu A, Battula SK, Naha RK, Garg S, Mahanti A (2020) Fogauthchain: a secure location-based authentication scheme in fog computing environments using blockchain. Comput Commun 162:212–224

    Article  Google Scholar 

  41. Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IOT. IEEE J Sel Areas Commun 38(5):942–954

    Article  Google Scholar 

  42. Khalid U, Asim M, Baker T, Hung PC, Tariq MA, Rafferty L (2020) A decentralized lightweight blockchain-based authentication mechanism for IOT systems. Clust Comput pp 1–21

  43. Maleh Y, Shojafar M, Alazab M, Romdhani I (2020) Blockchain for cybersecurity and privacy: architectures, challenges, and applications. CRC Press, Boca Raton

    Book  Google Scholar 

  44. Leng J, Zhou M, Zhao LJ, Huang Y, Bian Y (2020) Blockchain security: a survey of techniques and research directions. IEEE Trans Serv Comput

  45. De Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Brazilian Symposium on Formal Methods, Springer, pp 23–36

  46. Jensen K, Rozenberg G (2012) High-level Petri nets: theory and application. Springer Science & Business Media, Berlin

    MATH  Google Scholar 

  47. Genrich HJ, Lautenbach K (1981) System modelling with high-level petri nets. Theor Comput Sci 13(1):109–135

    Article  MathSciNet  Google Scholar 

  48. Sibertin-Blanc C (1985) High level petri nets with data structure

  49. Jensen K (1983) High-level petri nets. In: Applications and theory of Petri nets, Springer, pp 166–180

  50. Vizel Y, Weissenbacher G, Malik S (2015) Boolean satisfiability solvers and their applications in model checking. Proc IEEE 103(11):2021–2035

    Article  Google Scholar 

  51. Clarke EM, Emerson EA, Sistla AP (1986) Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans Program Lang Syst (TOPLAS) 8(2):244–263

    Article  Google Scholar 

  52. Frade MJ, Pinto JS (2011) Verification conditions for source-level imperative programs. Comput Sci Rev 5(3):252–277

    Article  Google Scholar 

  53. Cimatti A, Griggio A, Schaafsma BJ, Sebastiani R (2013) The mathsat5 SMT solver. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Springer, pp 93–107

  54. Brummayer R, Biere A (2009) Boolector: an efficient SMT solver for bit-vectors and arrays. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Springer, pp 174–177

  55. Jha S, Limaye R, Seshia SA (2009) Beaver: engineering an efficient SMT solver for bit-vector arithmetic. In: International Conference on Computer Aided Verification, Springer, pp 668–674

  56. De Moura L, Bjørner N (2008) Z3: An efficient SMT solver. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Springer, pp 337–340

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khizar Hameed.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hameed, K., Garg, S., Amin, M.B. et al. A formally verified blockchain-based decentralised authentication scheme for the internet of things. J Supercomput 77, 14461–14501 (2021). https://doi.org/10.1007/s11227-021-03841-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03841-1

Keywords