Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.2.343

Blockchain-Based IoT Device Authentication Scheme  

Park, Byeong-ju (ISAA Lab., Department of Computer Engineering, Ajou University)
Lee, Tae-jin (Department of Information Security, Hoseo University)
Kwak, Jin (Department of Cyber Security, Ajou University)
Abstract
With ICT technology develops, IoT environment is attracting attention. However, IoT devices have various CPU performance as much as various purpose of use. Some IoT devices use the cpu that doesn't support public key cryptogrphy or crypto acceleration. In this paper, we study Blockchain-based IoT Device Authentication Scheme that provides authentication, integirity and non-repudation through analysis of Lamport Hash-chain, Lamport Signature, Blockchain and existing Authentication protocols. The proposed scheme requires only simple hash operation in IoT devices and it can operate in low performance IoT device, thus ensuring secure authentication in IoT environment.
Keywords
IoT; Blockchain; Authentication; Hash-chain;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cisco, "11th annual Visual Networking Index: Global IP Traffic Forecast Update," Dec. 2015
2 L. Lamport, "Constructing digital signatures from a one-way function," Technical Report SRI-CSL-98, SRI International Computer Science Laboratory, Oct. 1979.
3 RFC 2289, A One-Time Password System, Feb. 1990. https://www.ietf.org/rfc/rfc2289.txt
4 L. Lamport, "Password Authentication with Insecure Communication", Communications of the ACM (24.11), pp 880-772., 1981.11.24.
5 Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008.10.31.
6 Ralph C. Merkle, "A digital signature Based on a Conventional Encryption," Advances in Cryptology, Crypto '87. CRYPTO 1987.
7 Aaron Aridiri, "Is it possible to secure micro- controllers used within IoT?," EvoThings, 2014.08.27.
8 Cynthia Harvey, "75 Top IoT Devices," Datamation, 2016.07.25
9 KIISC, "Research on efficient authentication system for machine-to-machine communications," 2010.09.30.
10 Enos Letsoalo, Sunday Ojo, "Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks," IST-Africa Week Conference, 2016.05.11.
11 H. Kupwade Patil, D. Willis, "Identity based authentication in SIP," IETF draft 2008.02.18.