4.5 Article

BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

Journal

PEER-TO-PEER NETWORKING AND APPLICATIONS
Volume 14, Issue 1, Pages 403-419

Publisher

SPRINGER
DOI: 10.1007/s12083-020-00963-w

Keywords

Authentication; IoT; Blockchain; Proverif tool; Security analysis

Ask authors/readers for more resources

The proposed Blockchain based Internet of Things Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G) utilizes private blockchain for IoTD registration and has Distributed Ledger (DL) for storing IoTD credential details, accessed only by authenticated entities. The protocol features mutual authentication, reducing computation cost, location based authentication, blockchain based revocation phase, and IoTD anonymity at device level.
Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available