BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

M. Vivekanandan1,2, V. N. Sastry1, U. Srinivasulu Reddy2
1Center for Mobile Banking (CMB), Institute for Development and Research in Banking Technology (IDRBT), Hyderabad, India
2Machine Learning and Data Analytics Lab, Department of Computer Applications, National Institute of Technology, Tiruchirappalli, India

Tóm tắt

Từ khóa


Tài liệu tham khảo

Adeel A, Ali M, Khan AN, Khalid T, Rehman F, Jararweh Y, Shuja J (2019) A multi-attack resilient lightweight iot authentication scheme. Transactions on Emerging Telecommunications Technologies, pp e3676

Ahuja SP, Wheeler N (2020) Architecture of fog-enabled and cloud-enhanced internet of things applications. Int J Cloud Appl Comput (IJCAC) 10(1):1–10

Ali R, Pal AK (2018) An efficient three factor–based authentication scheme in multiserver environment using ecc. Int J Commun Syst 31(4):e3484

Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Futur Gener Comput Syst 84:200–215

Aman MN, Chua KC, Sikdar B (2017) Mutual authentication in iot systems using physical unclonable functions. IEEE Internet Things J 4(5):1327–1340

Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on Computer and communications security, pp 62–73

Berenjian S, Hajizadeh S, Atani RE (2019) An incentive security model to provide fairness for peer-to-peer networks. In: 2019 IEEE Conference on Application, Information and Network Security (AINS). IEEE, pp 71–76

Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from 05–16

Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys & Tutorials

Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043

Das AK, Wazid M, Yannam AR, Rodrigues JJ, Park Y (2019) Provably secure ecc-based device access control and key agreement protocol for iot environment. IEEE Access 7:55382–55397

Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29 (2):198–208

Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks 2017

Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot) A vision, architectural elements, and future directions. Fut Gen Comput Syst 29(7):1645–1660

Gupta R (2019) Resource provisioning and scheduling techniques of iot based applications in fog computing. Int J Fog Comput (IJFC) 2(2):57–70

Hussain MM, Beg MS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (t-cps) Fog computing for vehicular networks. Int J Softw Sci Comput Intell (IJSSCI) 11(1):47–69

Javaid U, Aman MN, Sikdar B (2018) Blockpro: Blockchain based data provenance and integrity for secure iot environments. In: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, pp 13–18

Kadhim AJ, Seno SAH (2019) Energy-efficient multicast routing protocol based on sdn and fog computing for vehicular networks. Ad Hoc Netw 84:68–81

Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference. Springer, pp 388–397

Li D, Deng L, Gupta B, Wang H, Choi C (2019) A novel cnn based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447

Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for iot and its applications. IEEE Trans Sustain Comput 2(4):359–370

Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for iot environment. IEEE Internet Things J 6(6):9762–9773

Maurya AK, Sastry VN (2017) Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things. Information 8(4):136

Naghizadeh A, Berenjian S, Razeghi B, Shahanggar S, Pour NR (2015) Preserving receiver’s anonymity for circular structured p2p networks. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, pp 71–76

Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: preserving mutual anonymity for circular p2p networks. Int J Commun Syst 29(3):602–619

Nakamoto S et al (2008) Bitcoin: A peer-to-peer electronic cash system

Pena-lópez I et al (2005) Itu internet report 2005: the internet of things

Psannis KE, Stergiou C, Gupta B (2018) Advanced media-based smart big data on intelligent cloud systems. IEEE Trans Sustain Comput 4(1):77–87

PUB F (1995) Secure hash standard. Public Law 100:235

Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ (2018) Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inf 15(1):457–468

Sethia D, Gupta D, Saran H (2018) Nfc secure element-based mutual authentication and attestation for iot access. IEEE Trans Consum Electron 64(4):470–479

Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing

Stergiou C, Psannis KE, Gupta B, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & iot. Sustain Comput Inf Syst 19:174–184

Tewari A, Gupta B (2017) A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices. Int J Adv Intell Parad 9(2-3):111–121

Tewari A, Gupta B (2020) Security, privacy and trust of different layers in internet-of-things (iots) framework. Fut Gen Comput Syst 108:909–920

Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic iot networks. IEEE Internet Things J 5(1):269–282

Wazid M, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019) Ldakm-eiot: Lightweight device authentication and key management mechanism for edge-based iot deployment. Sensors 19(24):5539

Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen C-M (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108

Xie J, Tang H, Huang T, Yu FR, Xie R, Liu J, Liu Y (2019) A survey of blockchain technology applied to smart cities Research issues and challenges. IEEE Commun Surv Tutorial 21(3):2794–2830

Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Comput Surv (CSUR) 52(3):1–34

Zhou L, Li X, Yeh K-H, Su C, Chiu W (2019) Lightweight iot-based authentication scheme in cloud computing circumstance. Futur Gener Comput Syst 91:244–251

Zhu Q, Loke SW, Trujillo-Rasua R, Jiang F, Xiang Y (2019) Applications of distributed ledger technologies to the internet of things A survey. ACM Comput Surv (CSUR) 52(6):1–34