Browse > Article
http://dx.doi.org/10.3837/tiis.2020.09.003

A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value  

Zhang, Shiqiang (Faculty of Information Technology, Beijing University of Technology)
Cao, Yang (School of Information, Beijing Wuzi University)
Ning, Zhenhu (Faculty of Information Technology, Beijing University of Technology)
Xue, Fei (School of Information, Beijing Wuzi University)
Cao, Dongzhi (Faculty of Information Technology, Beijing University of Technology)
Yang, Yongli (Faculty of Information Technology, Beijing University of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.9, 2020 , pp. 3615-3638 More about this Journal
Abstract
Node identity authentication is an essential means to ensure the security of the Internet of Things. Existing blockchain-based IoT node authentication schemes have many problems. A heterogeneous IoT node authentication scheme based on an improved hybrid blockchain is proposed. Firstly, the hybrid blockchain model is designed to make the blockchain and IoT environment more compatible. Then the proxy node selection mechanism is intended to establish a bridge between the ordinary IoT node and the blockchain, building by calculating the trust value between nodes. Finally, based on the improved hybrid blockchain, the node authentication scheme of the model and proxy node selection mechanism establishes a secure connection for communication between nodes. Safety and performance analysis shows proper safety and performance.
Keywords
IoT; Hybrid Blockchain; Proxy node; Trust value; Authentication;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. G. Masciotta, A. Barontini, L. I. S. F. Ramos, P. A. Mendes and P. B. L. C. O, "An overview on structural health monitoring: from the current state-of-the-art to new bio-inspired sensing paradigms," International Journal of Bio-Inspired Computation, vol. 14, no. 1, pp. 1-26, 2019.   DOI
2 S. Kumari, H. Om, "Authentication Protocol for Wireless Sensor Networks Applications like Safety Monitoring in Coal Mines," Computer Networks, vol. 104, pp. 137-154, 2016.   DOI
3 Y. Jeong, J. H. Park, "IoT and Smart City Technology: Challenges, Opportunities, and Solutions," Journal of Information Processing Systems, vol. 15, no. 2, pp. 233-238, 2019.   DOI
4 O. Alfandi, A. Bochem, A. Kellner and D. Hogrefe, "Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs," in Proc. of 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), 2013.
5 B. Kadri, M. Feham and A. M Hamed, "Lightweight PKI for WSN ${\mu}$PKI," The Journal of Security and Communication Networks, vol. 10, no. 2, pp. 135-141, 2010.
6 M. Prasad, R. Manoharan, "A secure certificate based authentication to reduce overhead for heterogeneous wireless network," in Proc. of International Conference on Advanced Computing & Communication Systems, 2017.
7 Novo, Oscar, "Blockchain Meets IoT: an Architecture for Scalable Access Management in IoT," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1184-1195, 2018.   DOI
8 Q. Nong, "Practical Secure Certificateless Cryptographic Protocol with Batch Verification for Intelligent Robot Authentication," in Proc. of International Conference on Mechatronics and Intelligent Robotics, pp. 483-488, 2018.
9 M. A. Khan, K. Salah, "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems, vol. 82, pp. 395-411, 2018.   DOI
10 Z. Bao, W. Shi, D. He and K. R. Chood, "Iotchain: A three-tier blockchain-based iot security architecture," arXiv preprint arXiv:1806.02008, 2018.
11 P. K. Sharma, S. Singh, Y. Jeong and J. H. Park, "Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks," IEEE Communications Magazine, vol. 55, no. 9, pp. 78-85, 2017.   DOI
12 M. T. Hammi, B. Hammi, P. Bellot and A. Serhrouchni, "Bubbles of Trust: A decentralized blockchain-based authentication system for IoT," Computers & Security, vol. 78, pp. 126-142, 2018.   DOI
13 W. Dai, C. Dai, K. R. Choo, C. Cui, D. Zou and H. Jin, "SDTE: A secure blockchain-based data trading ecosystem," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 725-737, 2019.   DOI
14 R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi and K. Salah, "A user authentication scheme of iot devices using blockchain-enabled fog nodes," in Proc. of 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018.
15 S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008.
16 M. El Ghazouani, M. A. El Kiram and L. Er-Rajy, "Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication," International Journal of Communication Networks and Information Security, vol. 11, no. 1, pp. 175-184, 2019.
17 X. Yue, H. Wang, D. Jin, M. Li and W. Jiang, "Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control," Journal of medical systems, vol. 40, no. 10, pp. 218, 2016.   DOI
18 M. U. Hassan, M. H. Rehmani and J. Chen, "Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions," Future Generation Computer Systems, vol. 97, pp. 512-529, 2019.   DOI
19 M. Polina, O. Lucy, Y. Yury, O. Alex, B. Alex, P. Pavel, I. Eugene, A. Alexander, R. Konstantin and Z. Alexander, "Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare," Oncotarget, vol. 9, no. 5, pp. 5665-5690, 2018.   DOI
20 J. Shi, S. Chengchao, H. Lei and X. Mengxi, "Smart grid short-term load estimation model based on BP neural network," International Journal of Computing Science and Mathematics, vol. 11, no. 2, pp. 123-136, 2020.   DOI
21 X. Cai, P. Wang, L. Du, Z. Cui, W. Zhang and J. Chen, "Multi-Objective Three-Dimensional DV-Hop Localization Algorithm With NSGA-II," IEEE Sensors Journal, vol. 19, no. 21, pp. 10003-100015, 2019.   DOI
22 M. Tao, J. Zuo, Z. Liu, A. Castiglione and F. Palmieri, "Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes," Future Generation Computer Systems, vol. 78, pp. 1040-1051, 2018.   DOI
23 T. Mekki, I. Jabri, A. Rachedi and M. B. Jemaa, "Vehicular cloud networking: evolutionary game with reinforcement learning-based access approach," Int. J. Bio-Inspired Computation,13, 45-58, 2019.   DOI
24 E. P. K. Gilbert, B. Kaliaperumal, E. B. Rajsingh, M. Lydia and A. I. Selvakumar, "Trust aware nature inspired optimized routing in clustered wireless sensor networks," International Journal of Bio-Inspired Computation, vol. 14, no. 2, pp. 103-113, 2019.   DOI
25 Z. Cui, X. Xu, F. Xue, X. Cai and J. Chen, "Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios," IEEE Transactions on Services Computing, vol. 13, no. 4, pp. 685-695, 2020.   DOI
26 S. Asghari, N. J. Navimipour, "Cloud service composition using an inverted ant colony optimization algorithm," International Journal of Bio-Inspired Computation, vol. 13, no. 4, pp. 257-268, 2019.   DOI
27 X. Cai, Y. Niu, S. Geng, J. Zhang, Z. Cui, J. Li and J. Chen, "An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search," Concurrency and Computation: Practice and Experience, vol. 32, no. 5, pp. e5478, 2020.   DOI
28 P. Wang, J. Huang, Z. Cui, L. Xie and J. Chen, "A Gaussian error correction multi-objective positioning model with NSGA-II," Concurrency and Computation: Practice and Experience, vol. 32, no. 5, pp. e5464, 2020.   DOI
29 S. Hati, D. De and A. Mukherjee, "Bio-inspired innovative green fault recovery modelling for macro-femtocell mobile network," International Journal of Bio-Inspired Computation, vol. 14, no. 3, pp. 181-189, 2019.   DOI
30 Z. Shen, Y. Niu, Y. Zuo, Q. Xie and Z. Chen, "Power control of wind energy conversion system under multiple operating regimes with deep residual recurrent neural network: theory and experiment," International Journal of Computing Science and Mathematics, vol. 10, no. 4, pp. 413-428, 2019.   DOI
31 W. H. Bangyal, J. Ahmed and H. T. Rauf, "A modified bat algorithm with torus walk for solving global optimization problems," International Journal of Bio-Inspired Computation, vol. 15, no. 1, pp. 1-13, 2020.   DOI
32 K. G. Dhal, S. Das, "Local search-based dynamically adapted bat algorithm in image enhancement domain," International Journal of Computing Science and Mathematics, vol. 11, no. 1, pp. 1-28, 2020.   DOI
33 S. Sharma, "Respondents view of novel framework for data protection in social networking sites: an analysis," International Journal of Computing Science and Mathematics, vol. 10, no. 1, pp. 22-31, 2019.   DOI
34 Y. Lu, X. Huang, Y. Dai, S. Maharjan and Y. Zhang, "Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT," IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4177-4186, 2020.   DOI
35 Z. Cui, L. Du, P. Wang, X. Cai and W. Zhang, "Malicious code detection based on CNNs and multi-objective algorithm," Journal of Parallel and Distributed Computing, vol. 129, pp. 50-58, 2019.   DOI
36 Z. Cui, F. Xue, S. Zhang, X. Cai and J. Chen, "A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN," IEEE Transactions on Services Computing, vol. 13, no. 2, pp. 241-251, 2020.   DOI
37 P. Gope, T. Hwang, "A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-time Application Data Access in Wireless Sensor Networks," IEEE Transactions on Industrial Electronics, vol. 63, no. 11, pp. 7124-7132, 2016.   DOI
38 J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.   DOI