Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment
Autor: | N Sivaselvan, Vivekananda Bhat K, Muttukrishnan Rajarajan |
---|---|
Rok vydání: | 2020 |
Předmět: |
021110 strategic
defence & security studies Authentication Spoofing attack Blockchain business.industry Computer science Interoperability 0211 other engineering and technologies 020206 networking & telecommunications Access control 02 engineering and technology Computer security computer.software_genre Security token Scalability 0202 electrical engineering electronic engineering information engineering Key (cryptography) business computer |
Zdroj: | UEMCON |
DOI: | 10.1109/uemcon51285.2020.9298116 |
Popis: | Authentication and access control techniques are fundamental security elements to restrict access to critical resources in IoT environment. In the current state-of-the-art approaches in the literature, the architectures do not address the security features of authentication and access control together. Besides, they don’t completely fulfill the key Internet-of-Things (IoT) features such as usability, scalability, interoperability and security. In this paper, we introduce a novel blockchain-based architecture for authentication and capability-based access control for IoT environment. A capability is a token which contains the access rights authorized to the device holding it. The architecture uses blockchain technology to carry out all the operations in the scheme. It does not embed blockchain technology into the resource-constrained IoT devices for the purpose of authentication and access control of the devices. However, the IoT devices and blockchain are connected by means of interfaces through which the essential communications are established. The authenticity of such interfaces are verified before any communication is made. Consequently, the architecture satisfies usability, scalability, interoperability and security features. We carried out security evaluation for the scheme. It exhibits strong resistance to threats like spoofing, tampering, repudiation, information disclosure, and Denial-of-Service (DoS). We also developed a proof of concept implementation where cost and storage overhead of blockchain transactions are studied. |
Databáze: | OpenAIRE |
Externí odkaz: |