Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes
The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with...
Gespeichert in:
Veröffentlicht in: | International journal of advanced computer science & applications 2020, Vol.11 (4) |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 4 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 11 |
creator | Abdalah, Ahmed Nabil Mohamed, Ammar A., Hesham |
description | The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly. |
doi_str_mv | 10.14569/IJACSA.2020.0110491 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2655155381</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2655155381</sourcerecordid><originalsourceid>FETCH-LOGICAL-c228t-e07aaafbeef92c57cd4bfd04617b0476128ac11cabc07735b9369f056a54cb0d3</originalsourceid><addsrcrecordid>eNotkE1Lw0AQhhdRsNT-Aw8LnlNnv5NjLLZWigpW8LZsNrttas3W3eTgvze2fS_zMjzMwIPQLYEp4UIW98vncvZeTilQmAIhwAtygUaUCJkJoeDy2POMgPq8RpOUdjCEFVTmbIQWbzEcQnI1Lvtu69qusaZrQouHfRds2GMfIl6GNe5T027wwz7YL7s1TYtNW-N52OCXULt0g6682Sc3Oc8x-pg_rmdP2ep1sZyVq8xSmneZA2WM8ZVzvqBWKFvzytfAJVEVcCUJzY0lxJrKglJMVAWThQchjeC2gpqN0d3p7iGGn96lTu9CH9vhpaZSCCIEy8lA8RNlY0gpOq8Psfk28VcT0Edr-mRN_1vTZ2vsD2i0X7E</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2655155381</pqid></control><display><type>article</type><title>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Abdalah, Ahmed Nabil ; Mohamed, Ammar ; A., Hesham</creator><creatorcontrib>Abdalah, Ahmed Nabil ; Mohamed, Ammar ; A., Hesham</creatorcontrib><description>The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2020.0110491</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Algorithms ; Authentication ; Authentication protocols ; Blockchain ; Cloud computing ; Computer networks ; Cryptography</subject><ispartof>International journal of advanced computer science & applications, 2020, Vol.11 (4)</ispartof><rights>2020. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>Abdalah, Ahmed Nabil</creatorcontrib><creatorcontrib>Mohamed, Ammar</creatorcontrib><creatorcontrib>A., Hesham</creatorcontrib><title>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</title><title>International journal of advanced computer science & applications</title><description>The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Computer networks</subject><subject>Cryptography</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkE1Lw0AQhhdRsNT-Aw8LnlNnv5NjLLZWigpW8LZsNrttas3W3eTgvze2fS_zMjzMwIPQLYEp4UIW98vncvZeTilQmAIhwAtygUaUCJkJoeDy2POMgPq8RpOUdjCEFVTmbIQWbzEcQnI1Lvtu69qusaZrQouHfRds2GMfIl6GNe5T027wwz7YL7s1TYtNW-N52OCXULt0g6682Sc3Oc8x-pg_rmdP2ep1sZyVq8xSmneZA2WM8ZVzvqBWKFvzytfAJVEVcCUJzY0lxJrKglJMVAWThQchjeC2gpqN0d3p7iGGn96lTu9CH9vhpaZSCCIEy8lA8RNlY0gpOq8Psfk28VcT0Edr-mRN_1vTZ2vsD2i0X7E</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Abdalah, Ahmed Nabil</creator><creator>Mohamed, Ammar</creator><creator>A., Hesham</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2020</creationdate><title>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</title><author>Abdalah, Ahmed Nabil ; Mohamed, Ammar ; A., Hesham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c228t-e07aaafbeef92c57cd4bfd04617b0476128ac11cabc07735b9369f056a54cb0d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Computer networks</topic><topic>Cryptography</topic><toplevel>online_resources</toplevel><creatorcontrib>Abdalah, Ahmed Nabil</creatorcontrib><creatorcontrib>Mohamed, Ammar</creatorcontrib><creatorcontrib>A., Hesham</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abdalah, Ahmed Nabil</au><au>Mohamed, Ammar</au><au>A., Hesham</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2020</date><risdate>2020</risdate><volume>11</volume><issue>4</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2020.0110491</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2020, Vol.11 (4) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_2655155381 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms Authentication Authentication protocols Blockchain Cloud computing Computer networks Cryptography |
title | Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T01%3A17%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Proposed%20Authentication%20Protocol%20for%20IoT%20using%20Blockchain%20and%20Fog%20Nodes&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Abdalah,%20Ahmed%20Nabil&rft.date=2020&rft.volume=11&rft.issue=4&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2020.0110491&rft_dat=%3Cproquest_cross%3E2655155381%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2655155381&rft_id=info:pmid/&rfr_iscdi=true |