Fig. 1. Smart Home Environment
Fig. 2. Blockchain Model
Fig. 3. ECC Based Device Authentication
Fig. 4. SDN Based Device Authentication
Fig. 5. Proposed Model
Fig. 6. Proposed Device Authentication Protocol
Table 1. Blockchain Species
Table 2. IoT Devices Authentication Comparison
Table 3. Proposed Protocol Symbol
Table 4. Comparison by Blockchain Types
References
- Zhang, Zhi-Kai, "IoT security: ongoing challenges and research opportunities", Service-Oriented Computing and Applications(SOCA) , 2014 IEEE 7th International Conference on. IEEE, pp. 230-234. 2014. DOI: https://doi.org/10.1109/soca.2014.58
- Seokung Yoon, Haeryong Park, HyeongSeon Yoo, "Security issues on Smarthome in IoT environment", Computer science and its applications, Springer, Berlin, Heidelberg, pp.691-696, 2015. DOI: https://doi.org/10.1007/978-3-662-45402-2_97
- Sivaraman Vijay, "Network-level security and privacy control for smart-home IoT devices", Wireless and Mobile Computing, Networking and Communications (WiMob) , 2015 IEEE 11th International Conference on. IEEE, pp.163-167, 2015. DOI: https://doi.org/10.1109/wimob.2015.7347956
- Konstantinos Christidis, Michael Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things", IEEE Access , IEEE, pp.2292-2303, 2016 DOI: https://doi.org/10.1109/ACCESS.2016.2566339
- Chul-Jin Kim, "A Static and Dynamic Design Technique of Smart Contract based on BlockChain" Korea Academy Industrial Cooperation Society, vol. 19, no. 6, pp. 110-119, Jun. 2018 DOI: https://doi.org/10.5762/KAIS.2018.19.6.110
- Atwady Yahya, Hammoudeh Mohammed, "A survey on authentication techniques for the internet of things", Proceedings of the International Conference on Future Networks and Distributed Systems, ACM, NY, USA, p. 8, 2017. DOI: https://doi.org/10.1145/3102304.3102312
- X. Yao, X. Han, X. Du, X. Zhou, "A lightweight multicast authentication mechanism for small scale IoT applications", IEEE Sensors Journal, vol 13, no. 10, pp.3693-3701, Oct, 2013. DOI: https://doi.org/10.1109/JSEN.2013.2266116
- P. Porambage, C. Schmitt, P. Kumar, A. Gurtov and M. Ylianttila, "Two-phase Authentication Protocol for Wireless Sensor Networks in Distributed IoT Applications", 2014 IEEE Wireless Communications and Networking Conference(WCNC), Istanbul, Turkey, pp. 2728-2733, Apr. 2014. DOI: https://doi.org/10.1109/WCNC.2014.6952860
- Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Brunig and Georg Carle,. "DTLS based security and two-way authentication for the Internet of Things", AD Hoc Networks, vol. 11, issue 8, pp. 2710-2723, Nov. 2013. DOI: https://doi.org/10.1016/j.adhoc.2013.05.003
- N. Mahalle, B. Anggorojati, N. R. Prasad and R. Prasad, "Identity Authentication and Capability Based Access Control(IACAC) for the Internet of Things". Journal of Cyber Security and Mobility , vol. 1, no. 4, pp. 309-348, Mar. 2013.
- Deuk-hun Kim, Jin Kwak, "Design of Improved Authentication Protocol for Sensor Networks in IoT Environment" Journal of the Korea Institute of Information Security & Cryptology , vol. 25, no. 2, pp. 467-478, April, 2015. DOI: https://doi.org/10.13089/JKIISC.2015.25.2.467
- O. Flauzac, C. Gonzalez, A. Hachani and F. Nolot, "SDN based architecture for IoT and improvement of the security", 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangju, p. 688-693, 2015. DOI: https://doi.org/10.1109/WAINA.2015.110
- V. L. Shivraj, M. A. Rajan, M. Singh and P. Balamuralidha, "One time password authentication scheme based on elliptic curves for Internet of Things (IoT)", 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), IEEE, Riyadh, p. 1-6, 2015. DOI: https://doi.org/10.1109/NSITNSW.2015.7176384
- Castro Miguel, "Practical Byzantine fault tolerance", Appears in the Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI), p. 173-186, 1999.
- H. Sukhwani, J. M. Martinez, X. Chang, K. S. Trivedi and A. Rindos, "Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)", 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, p. 253-255, 2017. DOI: https://doi.org/10.1109/SRDS.2017.36