Mfokg-Biot: A Secure IOT Framework Based on Block Chain with Enhanced Key Generation

Authors

  • Girija.V, Victo Sudha George G

Keywords:

IoV; Query Assisted Multi-User Authentication Protocol; two-fold optimal clustering; Meliorated Mayfly optimization method (MMO)

Abstract

The increased efficiency, low cost, widespread accessibility and numerous benefits of cloud computing are currently having a significant impact on the information technology sector. Additionally, it gives various Internet users faster data transmission between locations and more storage space for data. The advancement of technology allows users to store data online and access it from anywhere. To exchange data between Internet of Things (IoT) devices, a solid security and storage mechanism for authentication is required. In order to solve this problem, a unique cluster-based secured user authentication mechanism is recommended. The anticipated paradigm consists of four main phases: (a) user authentication, (b) authorised user clustering, (c) data encryption and decryption, and (d) block chain-based secured data transfer. Initial user authentication in the Internet of Vehicles (IoV) network is performed using the Query Assisted Multi-User Authentication Protocol (QMAP). The authenticated users are then grouped using the two-fold optimal clustering model (only authorised users are allowed to participate in data transfer). For the authorised users, the two-fold objectives like angular distance and trust level are computed in the two-fold optimal clustering model. The Cluster Head (CH) is chosen as the authorised user (i.e., node) with the highest trust level and shortest angular distance. Additionally, a new Meliorated Mayfly optimization method (MMO) is presented for the selection of the best CH. The Mayfly Algorithm standard version is expanded in this MMO (MA). Once the CH is chosen, the cluster's nodes communicate with one another by using the CH that was chosen with the greatest consideration for efficiency. Additionally, block chain-based data transmission is utilised for secure data transmission between nodes in various clusters. The newly proposed Optimized Blowfish Algorithm is used to encrypt the data before it is sent via the block chain. These encrypted files are kept in the cloud and sent via blocks of the block chain. The decryption operation is carried out at the receiver end. Additionally, using the brand-new Meliorated Mayfly optimization (MMO) method, the blowfish algorithm's private key is chosen ideally to increase the security level of the data being communicated. In general, data transfer is done safely. The projected model is validated in terms of encryption time, security and decryption time as well.

Downloads

Download data is not yet available.

References

Viriyasitavat, W., Da Xu, L., Bi, Z. and Hoonsopon, D., 2019. Blockchain technology for applications in internet of things—mapping from system design perspective. IEEE Internet of Things Journal, 6(5), pp.8155-8168.

Viriyasitavat, W., Anuphaptrirong, T. and Hoonsopon, D., 2019. When blockchain meets Internet of Things: Characteristics, challenges, and business opportunities. Journal of industrial information integration, 15, pp.21-28.

Alam, T., 2019. Blockchain and its Role in the Internet of Things (IoT). arXiv preprint arXiv:1902.09779.

Sheth, H. and Dattani, J., 2019. Overview of blockchain technology. Asian Journal For Convergence In Technology (AJCT) ISSN-2350-1146.

Ali, J., Ali, T., Musa, S. and Zahrani, A., 2020. Towards secure IoT communication with smart contracts in a blockchain infrastructure. arXiv preprint arXiv:2001.01837.

Bodkhe, U. and Tanwar, S., 2021. Secure data dissemination techniques for IoT applications: Research challenges and opportunities. Software: Practice and Experience, 51(12), pp.2469-2491.

Mylrea, M. and Gourisetti, S.N.G., 2017, September. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In 2017 Resilience Week (RWS) (pp. 18-23). IEEE.

Zhu, X., 2021. Complex event detection for commodity distribution Internet of Things model incorporating radio frequency identification and Wireless Sensor Network. Future Generation Computer Systems, 125, pp.100-111.

Reyna, A., Martín, C., Chen, J., Soler, E. and Díaz, M., 2018. On blockchain and its integration with IoT. Challenges and opportunities. Future generation computer systems, 88, pp.173-190.

Atlam, H.F., Alenezi, A., Alassafi, M.O. and Wills, G., 2018. Blockchain with internet of things: Benefits, challenges, and future directions. International Journal of Intelligent Systems and Applications, 10(6), pp.40-48.

Minoli, D. and Occhiogrosso, B., 2018. Blockchain mechanisms for IoT security. Internet of Things, 1, pp.1-13.

Dedeoglu, V., Jurdak, R., Dorri, A., Lunardi, R.C., Michelin, R.A., Zorzo, A.F. and Kanhere, S.S., 2020. Blockchain technologies for iot. In Advanced applications of blockchain technology (pp. 55-89). Springer, Singapore.

Nair, G. and Sebastian, S., 2017. Blockchain technology; centralised ledger to distributed ledger. International Research Journal of Engineering and Technology, 4(3), pp.2823-2827.

Zhang, J., Rajendran, S., Sun, Z., Woods, R. and Hanzo, L., 2019. Physical layer security for the Internet of Things: Authentication and key generation. IEEE Wireless Communications, 26(5), pp.92-98.

Quilala, T.F.G., Sison, A.M. and Medina, R.P., 2018. Modified blowfish algorithm. Indones. J. Electr. Eng. Comput. Sci, 11(3), pp.1027-1034.

Pavithran, D., Shaalan, K., Al-Karaki, J.N. and Gawanmeh, A., 2020. Towards building a blockchain framework for IoT. Cluster Computing, 23(3), pp.2089-2103.

Singh, S., Hosen, A.S. and Yoon, B., 2021. Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access, 9, pp.13938-13959.

Kuzminykh, I., Yevdokymenko, M. and Sokolov, V., Encryption Algorithms in IoT: Security vs Lifetime.

Kiruthiga, N., Lokitha Karthi, R. and Ramya, B., 2018. SECURED SMART HOME AUTOMATION SYSTEM BASED ON USER BEHAVIOUR USING INTERNET OF THINGS. Pakistan Journal of Biotechnology, 15(2), pp.383-389.

Singh, S.K., Rathore, S. and Park, J.H., 2020. Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence. Future Generation Computer Systems, 110, pp.721-743.

Hammi, M.T., Hammi, B., Bellot, P. and Serhrouchni, A., 2018. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, pp.126-142.

Cui, Z., Fei, X.U.E., Zhang, S., Cai, X., Cao, Y., Zhang, W. and Chen, J., 2020. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, 13(2), pp.241-251.

Panda, S.S., Jena, D., Mohanta, B.K., Ramasubbareddy, S., Daneshmand, M. and Gandomi, A.H., 2021. Authentication and key management in distributed iot using blockchain technology. IEEE Internet of Things Journal, 8(16), pp.12947-12954.

Hang, L. and Kim, D.H., 2019. Design and implementation of an integrated iot blockchain platform for sensing data integrity. Sensors, 19(10), p.2228.

Alrubei, S.M., Ball, E. and Rigelsford, J.M., 2022. A Secure Blockchain Platform for Supporting AI-Enabled IoT Applications at the Edge Layer. IEEE Access, 10, pp.18583-18595.

Downloads

Published

07.05.2024

How to Cite

Girija.V. (2024). Mfokg-Biot: A Secure IOT Framework Based on Block Chain with Enhanced Key Generation. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 3321–3330. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5940

Issue

Section

Research Article