Private and Consortium Blockchain-based Authentication Protocol for IoT Devices Using PUF

被引:0
|
作者
Cunha, Tyson Baptist D. [1 ]
Manjappa, Kiran [1 ]
机构
[1] Karnataka Ringgold Stand Inst Informat Technol, Natl Inst Technol, Visakhapatnam, India
关键词
Authentication; blockchain; PUF; ROR; Scyther; SRAM; PHYSICAL UNCLONABLE FUNCTION; DATA-SECURITY; INTERNET; GENERATION; SCHEME;
D O I
10.23919/JCN.2024.000014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
this work, a static random access memoryphysical unclonable function (SRAM-PUF) based device security framework is proposed which uses the trending blockchain technology for securing the device credentials. The proposed framework produces a unique fingerprint called PUF key for each device based on its hardware characteristics which will act as an authenticating parameter for the devices during the authentication and re-authentication phase. The proposed work uses both consortium and private blockchains for storing device credentials and authentication, unlike the current trend of using either a secured database or only a public blockchain. The consortium blockchain is used for first-time authentication, while the private blockchain is used for repeated authentication which saves the time incurred in accessing the consortium blockchain during repeated authentication. The proposed protocol also includes mutual authentication between the entities involved and thus provides dual security (device authentication and mutual authentication) to the proposed protocol making the system more secure and robust against attacks. Security analysis of the proposed protocol is done using the Scyther tool and the protocol is also theoretically proven to be stable under various attacks using threat analysis and the real-or-random model (ROR). The performance analysis of the protocol is done by analyzing the computation and communication cost of the proposed protocol against other state-of-the-art protocols. Further, the proposed protocol is also evaluated in the blockchain testbed which includes Raspberry PI and Arduino components. The results conveyed that the introduction of a private blockchain reduces the time incurred in the device re-authentication.
引用
收藏
页码:166 / 181
页数:16
相关论文
共 50 条
  • [31] Blockchain-based mutual authentication protocol without CA
    Yue Li
    Mingcheng Xu
    Gaojian Xu
    The Journal of Supercomputing, 2022, 78 : 17261 - 17283
  • [32] A Hybrid Blockchain-Based Authentication Protocol for a Multiserver Environment
    Ashish Kumar
    Hari Om
    SN Computer Science, 6 (2)
  • [33] Blockchain-based identity and authentication scheme for MQTT protocol
    Abubakar, Mwrwan Abdelrazig
    Jaroucheh, Zakwan
    Al-Dubai, Ahmed
    Liu, Xiaodong
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 73 - 81
  • [34] A Blockchain-based Lightweight Authentication Protocol for Vehicular Platoons
    Carvajal-Roca, Ivan E.
    Shi, Jinming
    Wang, Jian
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [35] Blockchain-based batch authentication protocol for Internet of Vehicles
    Bagga, Palak
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Vijayakumar, Pandi
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 113
  • [36] Blockchain-based mutual authentication protocol without CA
    Li, Yue
    Xu, Mingcheng
    Xu, Gaojian
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (15): : 17261 - 17283
  • [37] Blockchain-Based Multistage Continuous Authentication for Smart Devices
    Yao, Yue
    Zhang, Xiaomei
    Hu, Haomin
    Liu, Huibin
    Huang, Rong
    Wang, Zejie
    APPLIED SCIENCES-BASEL, 2023, 13 (23):
  • [38] Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    SENSORS, 2023, 23 (03)
  • [39] A decentralized lightweight blockchain-based authentication mechanism for IoT systems
    Khalid, Umair
    Asim, Muhammad
    Baker, Thar
    Hung, Patrick C. K.
    Tariq, Muhammad Adnan
    Rafferty, Laura
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 2067 - 2087
  • [40] A New Blockchain-Based Authentication Framework for Secure IoT Networks
    Al Hwaitat, Ahmad K.
    Almaiah, Mohammed Amin
    Ali, Aitizaz
    Al-Otaibi, Shaha
    Shishakly, Rima
    Lutfi, Abdalwali
    Alrawad, Mahmaod
    Tripathy, Sushanta
    ELECTRONICS, 2023, 12 (17)