4.8 Article

Authentication and Key Management in Distributed IoT Using Blockchain Technology

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 16, 页码 12947-12954

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3063806

关键词

Blockchain; Internet of Things; Security; Authentication; Distributed ledger; Bitcoin; Smart contracts; Blockchain; decentralization; hash chain; Internet of Things; privacy; security

向作者/读者索取更多资源

This article proposes a Blockchain-based distributed IoT architecture using hash chains for secure key management to ensure data privacy and provide a secure communication environment. It also introduces a secure and efficient key generation and management scheme for mutual authentication between communication entities, utilizing a one-way hash chain technique to provide a set of public and private key pairs to IoT devices. The experimental analysis confirms the superior performance of the proposed scheme compared to conventional mechanisms.
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation center for the generation and management of keys. Trusting a third party has its own ramifications and results in a centralized architecture; therefore, this article addresses these issues by designing a Blockchain-based distributed IoT architecture that uses hash chains for secure key management. The proposed architecture exploits the key characteristics of the Blockchain technology, such as openness, immutability, traceability, and fault tolerance, to ensure data privacy in IoT scenarios and, thus, provides a secure environment for communication. This article also proposes a scheme for secure and efficient key generation and management for mutual authentication between communication entities. The proposed scheme uses a one-way hash chain technique to provide a set of public and private key pairs to the IoT devices that allow the key pairs to verify themselves at any time. Experimental analysis confirms the superior performance of the proposed scheme to the conventional mechanisms.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据