Blockchain Based Access Control System for Internet of Things Devices
Keywords:
IoT (Internet of Things), Blockchain, Cloud Architecture, Multifactor AuthenticationAbstract
The dispersed Internet of Things (IoT) poses several security and privacy challenges due to its architecture and fast, massive growth. The management of access is now a top priority. Centralized solutions to this problem frequently depend on a third party, have availability and scalability limitations, and may even be a performance barrier. In this study, a unique method is proposed for coordinating the provision of decentralised, lightweight, secure access management for an IoT system, making use of a multi-agent system and a blockchain. This suggested method's principal objective is to build Blockchain Managers (BCMs) to protect IoT access management by promoting secure interoperability amongst neighbourhood IoT gadgets. The technology also allows for secure communications between cloud servers, fog nodes, and Internet of Things devices.
Downloads
References
Li, Y. Emerging blockchain-based applications and techniques. Serv. Oriented Comput. Appl. 2019, 13, 279–285.
Kebande, V.R.; Karie, N.M.; Venter, H. A generic Digital Forensic Readiness model for BYOD using honeypot technology. In Proceedings of the 2016 IST-Africa Week Conference, Durban, South Africa, 11–13 May 2016; pp. 1–12.
Alshehri, M.D.; Hussain, F.K. A centralized trust management mechanism for the internet of things (CTM-IoT). In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications, Barcelona, Spain, 8–10 November 2017; pp. 533–543.
Alshehri, M.D.; Hussain, F.; Elkhodr, M.; Alsinglawi, B.S. A Distributed Trust Management Model for the Internet of Things (DTM-IoT). In Recent Trends and Advances in Wireless and IoT-enabled Networks; Springer: Cham, Switzerland, 2019; pp. 1–9.
Ouaddah, A.; Abou Elkalam, A.; Ait Ouahman, A. FairAccess: A new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 2016, 9, 5943–5964.
Huang, J.; Kong, L.; Chen, G.; Cheng, L.; Wu, K.; Liu, X. B-IoT: Blockchain driven Internet of Things with credit-based consensus mechanism. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Richardson, TX, USA, 7–9 July 2019; pp. 1348–1357.
Gupta, M.; Awaysheh, F.M.; Benson, J.; Alazab, M.; Patwa, F.; Sandhu, R. An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles. IEEE Trans. Ind. Inform. 2020, 17, 4288–4297.
Awaysheh, F.; Cabaleiro, J.C.; Pena, T.F.; Alazab, M. Big data security frameworks meet the intelligent transportation systems trust challenges. In Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; pp. 807–813.
Aladwan, M.; Awaysheh, F.; Cabaleiro, J.; Pena, T.; Alabool, H.; Alazab, M. Common security criteria for vehicular clouds and internet of vehicles evaluation and selection. In Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; pp. 814–820.
Aladwan, M.N.; Awaysheh, F.M.; Alawadi, S.; Alazab, M.; Pena, T.F.; Cabaleiro, J.C. TrustE-VC: Trustworthy evaluation framework for industrial connected vehicles in the cloud. IEEE Trans. Ind. Inform. 2020, 16, 6203–6213.
Elkhodr, M.; Alsinglawi, B.; Alshehri, M. A privacy risk assessment for the Internet of Things in healthcare. In Applications of Intelligent Technologies in Healthcare; Springer: Cham, Switzerland, 2019; pp. 47–54.
Alshehri, M.D.; Hussain, F.K. A comparative analysis of scalable and context-aware trust management approaches for internet of things. In Proceedings of the International Conference on Neural Information Processing, Istanbul, Turkey, 9–12 November 2015; pp. 596–605.
Kebande, V.R.; Alawadi, S.; Awaysheh, F.M.; Persson, J.A. Active Machine Learning Adversarial Attack Detection in the User Feedback Process. IEEE Access 2021, 9, 36908–36923.
Awaysheh, F.M.; Aladwan, M.N.; Alazab, M.; Alawadi, S.; Cabaleiro, J.C.; Pena, T.F. Security by Design for Big Data Frameworks Over Cloud Computing. IEEE Trans. Eng. Manag. 2021, 1–18.
Chaturvedi, K.; Matheus, A.; Nguyen, S.H.; Kolbe, T.H. Securing spatial data infrastructures for distributed smart city applications and services. Future Gener. Comput. Syst. 2019, 101, 723–736
Karie, N.M.; Kebande, V.R.; Ikuesan, R.A.; Sookhak, M.; Venter, H. Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, 31 March–2 April 2020; pp. 1–6
Ramatsakane, K.I.; Leung, W.S. Pick location security: Seamless integrated multi-factor authentication. In Proceedings of the 2017 IST-Africa Week Conference (IST-Africa), Windhoek, Namibia, 31 May–2 June 2017; pp. 1–10.
Rehman, F.; Akram, S.; Shah, M.A. The framework for efficient passphrase-based multifactor authentication in cloud computing. In Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC), Colchester, UK, 7–8 September 2016; pp. 37–41.
Furnell, S. The usability of security–revisited. Comput. Fraud Secur. 2016, 2016, 5–11.
Zhu, H.H.; He, Q.H.; Tang, H.; Cao, W.H. Voiceprint-biometric template design and authentication based on cloud computing security. In Proceedings of the 2011 International Conference on Cloud and Service Computing, Hong Kong, China, 12–14 December 2011; pp. 302–308.
An, Y.; Zaaba, Z.; Samsudin, N. Reviews on security issues and challenges in cloud computing. IOP Conf. Ser. Mater. Sci. Eng. 2016, 160, 012106.
Radha, V.; Reddy, D.H. A survey on single sign-on techniques. Procedia Technol. 2012, 4, 134–139.
Awaysheh, F.M.; Cabaleiro, J.C.; Pena, T.F.; Alazab, M. Poster: A pluggable authentication module for big data federation architecture. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, Toronto, ON, Canada, 4–6 June 2019; pp. 223–225.
Awaysheh, F.M.; Alazab, M.; Gupta, M.; Pena, T.F.; Cabaleiro, J.C. Next,-generation big data federation access control: A reference model. Future Gener. Comput. Syst. 2020, 108, 726–741.
Awaysheh, F.M.; Alazab, M.; Garg, S.; Niyato, D.; Verikoukis, C. Big Data Resource Management & Networks: Taxonomy, Survey, and Future Directions. IEEE Commun. Surv. Tutor. 2021, 1.
Asim, J.; Khan, A.S.; Saqib, R.M.; Abdullah, J.; Ahmad, Z.; Honey, S.; Afzal, S.; Alqahtani, M.S.; Abbas, M. Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review. Appl. Sci. 2022, 12, 3551. https:// doi.org/10.3390/app12073551
Bagga, P., Das, A.K., Chamola, V. et al. Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions. Telecommun Syst 81, 125–173 (2022). https://doi.org/10.1007/s11235-022-00938-7
Attkan, A., Ranga, V. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex Intell. Syst. 8, 3559–3591 (2022). https://doi.org/10.1007/s40747-022-00667-z
Youcef Ould-Yahia, Samia Bouzefrane, Hanifa Boucheneb, Soumya Banerjee. A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment. International Journal of Information and Computer Security, Inderscience, 2022, 17 (3/4), pp.261. ff10.1504/IJICS.2022.122374ff. ffhal-03688529
Li Z, Miao Q, Chaudhry SA, Chen C-M. A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. International Journal of Distributed Sensor Networks. 2022;18(6). doi:10.1177/15501329221104332
Meneses-Claudio, B. ., Perez-Siguas, R. ., Matta-Solis, H. ., Matta-Solis, E. ., Matta-Perez, H. ., Cruzata-Martinez, A. ., Saberbein-Muñoz, J. ., & Salinas-Cruz, M. . (2023). Automatic System for Detecting Pathologies in the Respiratory System for the Care of Patients with Bronchial Asthma Visualized by Computerized Radiography. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 27–34. https://doi.org/10.17762/ijritcc.v11i2.6107
Rodriguez, L., Rodríguez, D., Martinez, J., Perez, A., & Ólafur, J. Leveraging Machine Learning for Adaptive Learning Systems in Engineering Education. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/103
Dhabliya, D. (2019). Security analysis of password schemes using virtual environment. International Journal of Advanced Science and Technology, 28(20), 1334-1339. Retrieved from www.scopus.com
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.