4.6 Article

A secure and efficient authentication and data sharing scheme for Internet of based on blockchain

Journal

JOURNAL OF SYSTEMS ARCHITECTURE
Volume 117, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.sysarc.2021.102112

Keywords

Authentication; Secure data transmission; Internet of Things (ioT); Blockchain

Funding

  1. National Natural Science Foundation of China [61932016, 61972294]

Ask authors/readers for more resources

Internet of Things (IoT) is a network convergence of multiple intelligent devices and advanced technologies aiming at connecting and exchanging data over the Internet. Security issues such as authentication and data privacy are critical concerns in IoT applications, and blockchain technology supports secure data sharing. An improved scheme has been proposed to overcome security flaws and achieve a well tradeoff between security and efficiency.
Internet of Things (IoT) is a network convergence of multiple intelligent devices and advanced technologies aiming at connecting and exchanging data over the Internet. IoT is extensively applied in consumer, commercial, industrial, infrastructure and military spaces. With the prevalence of IoT applications, security issues such as identity authenticity and data privacy are increasingly become critical concerns. Authentication and confidential data sharing are the important measures towards secure IoT communication and applications. Blockchain is a burgeoning technology supporting for efficient authentication and secure data sharing. A secure and accountable data transmission scheme based on blockchain has been proposed by Hong et al. recently. But this scheme has security weaknesses of impersonation attack, man-in-the-middle attack, replay attack, denial of service attack (DoS) and key compromise attack. Thus we put forward an improved scheme to overcome the identified security flaws. Our scheme is provably secure and performance analysis shows that our scheme reduces 15.34% computation costs and 40.68% communication costs compared with Hong et al.'s scheme. Meanwhile, we also compare our scheme with other three recent and related researches, which finally indicates that our scheme realizes a well tradeoff between security and efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available