Browse > Article
http://dx.doi.org/10.9708/jksci.2019.24.07.087

Blockchain-based IoT Authentication techniques for DDoS Attacks  

Choi, Wonseok (School of Computer Science and Engineering, Kyungpook National University)
Kim, Sungsoo (Department of Aeronautical Software Engineering, Kyungwoon University)
Abstract
In the IoT(Internet of Things) environment, various devices are utilized and applied for different sites. But attackers can access easy to IoT systems, and try to operate DDoS(Distributed Denial-of-Service) attacks. In this paper, Sensor nodes, Cluster heads, and Gateways operates lightweight mutual authentication each others. Since authenticated sensor nodes and cluster heads only send transactions to Gateways, proposed techniques prevent DDoS attacks. In addition, the blockchain system contains secure keys to decrypt data from sensor nodes. Therefore, attackers can not decrypt the data even if the data is eavesdropped.
Keywords
Authentication Protocol; Blockchain; IoT; DDoS;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," www.bitcoin.org, 2008.
2 B. Park, T. Lee, and J. Kwak, "Blockchain-Based IoT Device Authentication Scheme," Journal of The Korea Institute of Information of Information Security & Cryptology, Vol. 27, No. 2, Apr. 2017.
3 P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, Vol. 14, 2014.
4 E. Buchman, "Tendermint: Byzantine fault tolerance in the age of blockchains," M.Sc. Thesis, University of Guelph, Canada, June 2016.
5 V. Buterin, "A next-generation smart contract and decentralized application platform," White paper, 2014.
6 D. Kim, and J. Kwak, "Design of Improved Authentication Protocol for Sensor Networks in IoT Environment," Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, Apr. 2015.
7 W. Choi, S. Kim, Y. Kim, Y. Park, and K. Ahn, "PUF-based encryption processor for the RFID systems," 2010 IEEE 10th International Conference on Computer and Information Technology, pp. 2323-2328, United Kingdom, Jun.-Jul. 2010.
8 D. Duc, and K. Kim, "Defending RFID authentication protocols and against DoS attacks," Computer Communications, Journal of Computer Communications, 2011.
9 J. Park, S. Shin, and N. Kang, "Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things," The Journal of Korean of Communications and Information Sciences, Vol. 38B, No. 09, 2013.
10 L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks," Proceedings of Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, 2006.
11 W. Choi, S. Kim, Y. Kim, T. Yun, K. Ahn, and K. Han, "Design of PUF-based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication," The Journal of Korean Institute of Communications and Information Sciences, Vol. 39B, No. 12, Dec. 2014.
12 M. Stamp, Information Security Textbook(Principles and Practice) 1st Ed., NY: John Willey & Sons Inc., 2005.
13 P. Gope, J. Lee, and T. Quek, "Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Vol. 13, No. 11, Nov. 2018.