Location-Aware Wi-Fi Authentication Scheme Using Smart Contract

被引:6
|
作者
Chen, Yongle [1 ]
Wang, Xiaojian [1 ]
Yang, Yuli [1 ]
Li, Hong [2 ]
机构
[1] Taiyuan Univ Technol, Coll Informat & Comp, Taiyuan 030024, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100089, Peoples R China
关键词
authentication; blockchain; channel state information; smart contracts; MUTUAL AUTHENTICATION; INTERNET; SECURITY; PROTOCOL; THINGS;
D O I
10.3390/s20041062
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. In this paper, we propose a location-aware authentication scheme using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. We use the smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Location-Aware Services based on Wi-Fi Network
    Wen, Yun-Hui
    Kao, Hsiao-Wen
    Chang, Hsu-Sheng
    Ju, Gwo-Hwa
    [J]. 2014 16TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2014,
  • [2] Smartphone-based Automatic Place Recognition with Wi-Fi Signals for Location-Aware Services
    Bisio, Igor
    Pan, Roberto Lan Cian
    Lavagetto, Fabio
    Marchese, Mario
    Sciarrone, Andrea
    Fra, Cristina
    Valla, Massimo
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [3] Crowdsourced Location Aware Wi-Fi Access Control
    Lu, Bingxian
    Zeng, Zhicheng
    Wang, Lei
    Peck, Brian
    Qiao, Daji
    [J]. MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, : 284 - 286
  • [4] Estimating location using Wi-Fi
    Yang, Qiang
    Pan, Sinno Jialin
    Zheng, Vincent Wenchen
    [J]. IEEE INTELLIGENT SYSTEMS, 2008, 23 (01) : 8 - 13
  • [5] Smart Wi-Fi
    Hills, A
    [J]. SCIENTIFIC AMERICAN, 2005, 293 (04) : 86 - +
  • [6] Using Wi-Fi Enabled Internet of Things Devices for Context-Aware Authentication
    Trnka, Michal
    Rysavy, Filip
    Cerny, Tomas
    Stickney, Nathaniel
    [J]. INFORMATION SCIENCE AND APPLICATIONS 2018, ICISA 2018, 2019, 514 : 635 - 642
  • [7] Improving Wi-Fi Performance using Smart AP
    Kim, Kiseog
    Park, Junhyun
    Kim, Chong-Kwon
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2017, : 21 - 27
  • [8] A Smart Lock System using Wi-Fi Security
    Kassem, Abdallah
    El Murr, Sami
    Jamous, Georges
    Saad, Elie
    Geagea, Marybelle
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTATIONAL TOOLS FOR ENGINEERING APPLICATIONS (ACTEA), 2016, : 222 - 225
  • [9] Indoor Location with Wi-Fi Fingerprinting
    Pritt, Noah
    [J]. 2013 IEEE (AIPR) APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP: SENSING FOR CONTROL AND AUGMENTATION, 2013,
  • [10] Wi-Fi and Super Wi-Fi Co-location for Exploiting Spectrum Heterogeneity
    Shin, Kyubo
    Kim, Hyoil
    Chun, Se Young
    Shin, Dong-Hoon
    [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 674 - 679