Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes

The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced computer science & applications 2020, Vol.11 (4)
Hauptverfasser: Abdalah, Ahmed Nabil, Mohamed, Ammar, A., Hesham
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 4
container_start_page
container_title International journal of advanced computer science & applications
container_volume 11
creator Abdalah, Ahmed Nabil
Mohamed, Ammar
A., Hesham
description The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly.
doi_str_mv 10.14569/IJACSA.2020.0110491
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2655155381</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2655155381</sourcerecordid><originalsourceid>FETCH-LOGICAL-c228t-e07aaafbeef92c57cd4bfd04617b0476128ac11cabc07735b9369f056a54cb0d3</originalsourceid><addsrcrecordid>eNotkE1Lw0AQhhdRsNT-Aw8LnlNnv5NjLLZWigpW8LZsNrttas3W3eTgvze2fS_zMjzMwIPQLYEp4UIW98vncvZeTilQmAIhwAtygUaUCJkJoeDy2POMgPq8RpOUdjCEFVTmbIQWbzEcQnI1Lvtu69qusaZrQouHfRds2GMfIl6GNe5T027wwz7YL7s1TYtNW-N52OCXULt0g6682Sc3Oc8x-pg_rmdP2ep1sZyVq8xSmneZA2WM8ZVzvqBWKFvzytfAJVEVcCUJzY0lxJrKglJMVAWThQchjeC2gpqN0d3p7iGGn96lTu9CH9vhpaZSCCIEy8lA8RNlY0gpOq8Psfk28VcT0Edr-mRN_1vTZ2vsD2i0X7E</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2655155381</pqid></control><display><type>article</type><title>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Abdalah, Ahmed Nabil ; Mohamed, Ammar ; A., Hesham</creator><creatorcontrib>Abdalah, Ahmed Nabil ; Mohamed, Ammar ; A., Hesham</creatorcontrib><description>The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2020.0110491</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Algorithms ; Authentication ; Authentication protocols ; Blockchain ; Cloud computing ; Computer networks ; Cryptography</subject><ispartof>International journal of advanced computer science &amp; applications, 2020, Vol.11 (4)</ispartof><rights>2020. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>Abdalah, Ahmed Nabil</creatorcontrib><creatorcontrib>Mohamed, Ammar</creatorcontrib><creatorcontrib>A., Hesham</creatorcontrib><title>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</title><title>International journal of advanced computer science &amp; applications</title><description>The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Blockchain</subject><subject>Cloud computing</subject><subject>Computer networks</subject><subject>Cryptography</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkE1Lw0AQhhdRsNT-Aw8LnlNnv5NjLLZWigpW8LZsNrttas3W3eTgvze2fS_zMjzMwIPQLYEp4UIW98vncvZeTilQmAIhwAtygUaUCJkJoeDy2POMgPq8RpOUdjCEFVTmbIQWbzEcQnI1Lvtu69qusaZrQouHfRds2GMfIl6GNe5T027wwz7YL7s1TYtNW-N52OCXULt0g6682Sc3Oc8x-pg_rmdP2ep1sZyVq8xSmneZA2WM8ZVzvqBWKFvzytfAJVEVcCUJzY0lxJrKglJMVAWThQchjeC2gpqN0d3p7iGGn96lTu9CH9vhpaZSCCIEy8lA8RNlY0gpOq8Psfk28VcT0Edr-mRN_1vTZ2vsD2i0X7E</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Abdalah, Ahmed Nabil</creator><creator>Mohamed, Ammar</creator><creator>A., Hesham</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2020</creationdate><title>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</title><author>Abdalah, Ahmed Nabil ; Mohamed, Ammar ; A., Hesham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c228t-e07aaafbeef92c57cd4bfd04617b0476128ac11cabc07735b9369f056a54cb0d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Blockchain</topic><topic>Cloud computing</topic><topic>Computer networks</topic><topic>Cryptography</topic><toplevel>online_resources</toplevel><creatorcontrib>Abdalah, Ahmed Nabil</creatorcontrib><creatorcontrib>Mohamed, Ammar</creatorcontrib><creatorcontrib>A., Hesham</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science &amp; applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abdalah, Ahmed Nabil</au><au>Mohamed, Ammar</au><au>A., Hesham</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes</atitle><jtitle>International journal of advanced computer science &amp; applications</jtitle><date>2020</date><risdate>2020</risdate><volume>11</volume><issue>4</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>The IoT offers enormous opportunities and also brings some challenges. Authentication considered one of the main challenges introduced by IoT. IoT devices are not able to protect themselves due to there limited processing and storage capabilities. Researchers proposed authentication algorithms with either a lack of scalability or vulnerable to cyberattacks. In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain. The protocol provides a secure authentication protocol using access token, ECC cryptog-raphy, and also blockchain as decentralized identity storage. The blockchain uses cryptographic identifiers, records immutability, and provenance, which allows the implementation of a decentral-ized authentication protocol. These features ensure a light and secure identity management system. We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong authentication criteria. The paper uses four test cases to test the Ethereum smart contract implementation to ensure the system functions properly.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2020.0110491</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2158-107X
ispartof International journal of advanced computer science & applications, 2020, Vol.11 (4)
issn 2158-107X
2156-5570
language eng
recordid cdi_proquest_journals_2655155381
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Authentication
Authentication protocols
Blockchain
Cloud computing
Computer networks
Cryptography
title Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T01%3A17%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Proposed%20Authentication%20Protocol%20for%20IoT%20using%20Blockchain%20and%20Fog%20Nodes&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Abdalah,%20Ahmed%20Nabil&rft.date=2020&rft.volume=11&rft.issue=4&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2020.0110491&rft_dat=%3Cproquest_cross%3E2655155381%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2655155381&rft_id=info:pmid/&rfr_iscdi=true