Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3352411.3352435acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsitConference Proceedingsconference-collections
research-article

A Survey of Methods Guaranteeing User Privacy based on Blockchain in Internet-of -Things

Published: 19 July 2019 Publication History

Abstract

The emerging technology that is the internet of things (IOT) has attracted both the industrial sector and the academic sector. In the industrial sector like transportation, healthcare, smart cities and energy systems, this IOT technology will be important. However, there are many problems to be solved. One of the problems is that security must be guaranteed. For safe security, we are considering two privacy issues which are mostly encountered in the field of IOT that is device authentication and decentralized identifiers. To provide device authentication and decentralized identifiers, the Blockchain technology can be applied to. This paper survey the related work for device authentication and decentralized identifiers in the IOT.

References

[1]
Satoshi Nakamoto. 2018. Bitcoin: A peer-to-peer electronic cash system, 9 pages.
[2]
Imran Makhdoom, Mehran Abolhasan, Haider Abbas and Wei Ni. 2018. Blockchain's adoption in IOT: The challenges, and a way forward. In Journal of Network and Computer Applications, 29 pages.
[3]
Decentralized Identifiers (DIDs) v0.10 https://w3c-ccg.github.io/did-spec/.
[4]
Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, and Christoph Meinel. 2019. A Comparative Analysis of Trust Requirements in Decentralized Identity Management. International Conference on Advanced Information Networking and Applications, Springer, Cham, 14 pages.
[5]
Akshay Bakre, Nikita Patil, and Sakshum Gupta. 2017. Implementing decentralized digital identity using Blockchain. International Journal of Engineering Technology Science and Research, 7pages.
[6]
Dipto Chakravarty and Tushar Deshpande. 2018. Blockchain-enhanced Identities for Secure Interaction. 2018 IEEE International Symposium on Technologies for Homeland Security (HST), 4 pages.
[7]
Yki Kortesniemi, Dmitrij Lagutin, Tommi Elo and Nikos Fotiou. 2019. Improving the Privacy of IOT with Decentralised Identifiers (DIDs). Journal of Computer Networks and Communications, 10 pages.
[8]
Dmitrij Lagutin, Yki Kortesniemi, Nikos Fotiou and Vasilios A. Siris. 2019. Enabling Decentralised Identifiers and Verifiable Credentials for Constrained Internet-of-Things Devices using OAuth-based Delegation. Workshop on Decentralized IoT Systems and Security (DISS), 6 pages.
[9]
Makoto Takemiya and Bohdan Vanieiev. 2018. Sora Identity: Secure, Digital Identity on the Blockchain. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol. 2, 6pages.
[10]
Chao Qu, Ming Tao, Jie Zhang, Xiaoyu Hong and Ruifen Yuan. 2018. Blockchain based credibility verification method for IOT entities. Security and Communication Networks, 11pages.
[11]
Ujjwal Guin, Adit Singh, Mahabubul Alam, Janice Canedo and Anthony Skjellum. 2018. A Secure Low-Cost Edge Device Authentication Scheme for the Internet of Things. 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), 6 pages.
[12]
Binod Vaidya, Dimitrios Makrakis and Hussein T. Mouftah. 2011. Device authentication mechanism for smart energy home area networks. 2011 IEEE International Conference on Consumer Electronics (ICCE), 2pages.
[13]
F. Wortmann and K. Flutcher. 2015. Internet of Things Authentication: A Blockchain solution using SRAM Physical Unclonable Functions. Bus Inf Syst Eng, 4pages. https://www.intrinsic-id.com/wp-content /uploads/2017/05/gt_KSI-PUF-web-1611.pdf
[14]
Kashif Rahim, Hasan Tahir and Nassar Ikram. 2018. Sensor Based PUF IOT Authentication Model for a Smart Home with Private Blockchain. 2018 International Conference on Applied and Engineering Mathematics (ICAEM), 7 pages.
[15]
Lydia Negka, Georgios Gketsios, Nikolaos A. Anagnostopoulos, Georgios Spathoulas, Athanasios Kakarountas and Stefan Katzenbeisser. 2019. Employing Blockchain and Physical Unclonable Functions for Counterfeit IOT Devices Detection. Proceedings of the International Conference on Omni-Layer Intelligent Systems, ACM, 7 pages.

Cited By

View all
  • (2023)Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCsProceedings of the 2023 6th International Conference on Information Science and Systems10.1145/3625156.3625193(254-261)Online publication date: 11-Aug-2023
  • (2021)A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform2021 International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN52240.2021.9522184(1-7)Online publication date: Jul-2021
  • (2021)A blockchain empowered and privacy preserving digital contact tracing platformInformation Processing & Management10.1016/j.ipm.2021.10257258:4(102572)Online publication date: Jul-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
DSIT 2019: Proceedings of the 2019 2nd International Conference on Data Science and Information Technology
July 2019
280 pages
ISBN:9781450371414
DOI:10.1145/3352411
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • The Hong Kong Polytechnic: The Hong Kong Polytechnic University
  • Natl University of Singapore: National University of Singapore

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 July 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. Internet of things
  3. decentralized identifiers
  4. device authentication
  5. security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

DSIT 2019

Acceptance Rates

DSIT 2019 Paper Acceptance Rate 43 of 95 submissions, 45%;
Overall Acceptance Rate 114 of 277 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)5
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCsProceedings of the 2023 6th International Conference on Information Science and Systems10.1145/3625156.3625193(254-261)Online publication date: 11-Aug-2023
  • (2021)A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform2021 International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN52240.2021.9522184(1-7)Online publication date: Jul-2021
  • (2021)A blockchain empowered and privacy preserving digital contact tracing platformInformation Processing & Management10.1016/j.ipm.2021.10257258:4(102572)Online publication date: Jul-2021
  • (2021)Casper: a blockchain-based system for efficient and secure customer credential verificationJournal of Banking and Financial Technology10.1007/s42786-021-00036-36:1(43-62)Online publication date: 1-Dec-2021
  • (2021)Privacy-Preserving Blockchain-Based Solutions in the Internet of ThingsScience and Technologies for Smart Cities10.1007/978-3-030-76063-2_27(386-405)Online publication date: 22-May-2021

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media