Private and Consortium Blockchain-based Authentication Protocol for IoT Devices Using PUF

被引:0
|
作者
Cunha, Tyson Baptist D. [1 ]
Manjappa, Kiran [1 ]
机构
[1] Karnataka Ringgold Stand Inst Informat Technol, Natl Inst Technol, Visakhapatnam, India
关键词
Authentication; blockchain; PUF; ROR; Scyther; SRAM; PHYSICAL UNCLONABLE FUNCTION; DATA-SECURITY; INTERNET; GENERATION; SCHEME;
D O I
10.23919/JCN.2024.000014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
this work, a static random access memoryphysical unclonable function (SRAM-PUF) based device security framework is proposed which uses the trending blockchain technology for securing the device credentials. The proposed framework produces a unique fingerprint called PUF key for each device based on its hardware characteristics which will act as an authenticating parameter for the devices during the authentication and re-authentication phase. The proposed work uses both consortium and private blockchains for storing device credentials and authentication, unlike the current trend of using either a secured database or only a public blockchain. The consortium blockchain is used for first-time authentication, while the private blockchain is used for repeated authentication which saves the time incurred in accessing the consortium blockchain during repeated authentication. The proposed protocol also includes mutual authentication between the entities involved and thus provides dual security (device authentication and mutual authentication) to the proposed protocol making the system more secure and robust against attacks. Security analysis of the proposed protocol is done using the Scyther tool and the protocol is also theoretically proven to be stable under various attacks using threat analysis and the real-or-random model (ROR). The performance analysis of the protocol is done by analyzing the computation and communication cost of the proposed protocol against other state-of-the-art protocols. Further, the proposed protocol is also evaluated in the blockchain testbed which includes Raspberry PI and Arduino components. The results conveyed that the introduction of a private blockchain reduces the time incurred in the device re-authentication.
引用
收藏
页码:166 / 181
页数:16
相关论文
共 50 条
  • [21] Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment
    Chen, Chien-Ming
    Chen, Zhaoting
    Kumari, Saru
    Obaidat, Mohammad S.
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 25394 - 25412
  • [22] Blockchain-based authentication and secure communication in IoT networks
    Lau, Chi Ho
    Yeung, Kai Hau
    Yan, Fan
    Chan, Sammy
    SECURITY AND PRIVACY, 2023, 6 (06)
  • [23] A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices
    Kandi, Mohamed Ali
    Kouicem, Djamel Eddine
    Doudou, Messaoud
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    COMPUTER COMMUNICATIONS, 2022, 191 : 11 - 25
  • [24] Blockchain-based Solution for Sharing IoT Devices
    Dawod, Anas
    PROCEEDINGS OF THE 2024 25TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, MDM 2024, 2024, : 337 - 339
  • [25] Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices
    Vinko, Davor
    Milicevic, Kruno
    Lukic, Ivica
    Kohler, Mirko
    SENSORS, 2023, 23 (15)
  • [26] Consortium Blockchain-Based Malware Detection in Mobile Devices
    Gu, Jingjing
    Sun, Binglin
    Du, Xiaojiang
    Wang, Jun
    Zhuang, Yi
    Wang, Ziwang
    IEEE ACCESS, 2018, 6 : 12118 - 12128
  • [27] PUF based Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Roy, Suchismita
    Sen, Bibhash
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 698 - 703
  • [28] Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
    Sun, Da-Zhi
    Tian, Yangguang
    MATHEMATICS, 2022, 10 (22)
  • [29] Blockchain-based cross-domain authentication strategy for trusted access to mobile devices in the IoT
    Dong, Shuai
    Yang, Hui
    Yuan, Jiaqi
    Jiao, Libin
    Yu, Ao
    Zhang, Jie
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1610 - 1612
  • [30] A Blockchain-Based Mutual Authentication Protocol for Smart Home
    Chen, Biwen
    Tang, Bo
    Guo, Shangwei
    Yang, Jiyun
    Xiang, Tao
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 250 - 265