4.8 Article

Authentication and Key Management in Distributed IoT Using Blockchain Technology

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 16, Pages 12947-12954

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3063806

Keywords

Blockchain; Internet of Things; Security; Authentication; Distributed ledger; Bitcoin; Smart contracts; Blockchain; decentralization; hash chain; Internet of Things; privacy; security

Ask authors/readers for more resources

This article proposes a Blockchain-based distributed IoT architecture using hash chains for secure key management to ensure data privacy and provide a secure communication environment. It also introduces a secure and efficient key generation and management scheme for mutual authentication between communication entities, utilizing a one-way hash chain technique to provide a set of public and private key pairs to IoT devices. The experimental analysis confirms the superior performance of the proposed scheme compared to conventional mechanisms.
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation center for the generation and management of keys. Trusting a third party has its own ramifications and results in a centralized architecture; therefore, this article addresses these issues by designing a Blockchain-based distributed IoT architecture that uses hash chains for secure key management. The proposed architecture exploits the key characteristics of the Blockchain technology, such as openness, immutability, traceability, and fault tolerance, to ensure data privacy in IoT scenarios and, thus, provides a secure environment for communication. This article also proposes a scheme for secure and efficient key generation and management for mutual authentication between communication entities. The proposed scheme uses a one-way hash chain technique to provide a set of public and private key pairs to the IoT devices that allow the key pairs to verify themselves at any time. Experimental analysis confirms the superior performance of the proposed scheme to the conventional mechanisms.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available