BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applicatio
- PDF / 2,216,098 Bytes
- 17 Pages / 595.224 x 790.955 pts Page_size
- 22 Downloads / 217 Views
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology Manojkumar Vivekanandan1,2 · Sastry V. N.1 · Srinivasulu Reddy U.2 Received: 30 April 2020 / Accepted: 3 July 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols. Keywords Authentication · IoT · Blockchain · Proverif tool · Security analysis
1 Introduction Now-a-days, 5G technology which is advantageous than other generations (1G, 2G, 3G, 4G) offers mobility support, low latency, high network speed (10 Gb/s) etc. 5G technology is widely used in various applications such as smart home, high definition visual communication, vehicle communication, multimedia communication, medical sector, industrial sector and environmental monitoring [9]. The
This article belongs to the Topical Collection: Special Issue on P2P Computing for Beyond 5G Network and Internet-ofEverything Guest Editors: Prakasam P, Ajayan John, Shohel Sayeed Srinivasulu Reddy U.
[email protected]
Extended author information available on the last page of the article.
objects (things like smart watch, smart phone) are connected with the Internet through wireless technologies which is popularly refered as loT [14]. The physical objects are connected to each other to form a network for communication to achieve common goals according to International Telecom
Data Loading...