Loading [a11y]/accessibility-menu.js
BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things | IEEE Conference Publication | IEEE Xplore

BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things


Abstract:

Traditional security solutions that rely on public key infrastructure present scalability and transparency challenges when deployed in Internet of Things (IoT). In this p...Show More

Abstract:

Traditional security solutions that rely on public key infrastructure present scalability and transparency challenges when deployed in Internet of Things (IoT). In this paper, we develop a blockchain based authentication mechanism for IoT that can be integrated into the traditional transport layer security protocols such as Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Our proposed mechanism is an alternative to the traditional Certificate Authority (CA)-based Public Key Infrastructure (PKI) that relies on x.509 certificates. Specifically, the proposed solution enables the modified TLS/DTLS a viable option for resource constrained IoT devices where minimizing memory utilization is critical. Experiments show that blockchain based authentication can reduce dynamic memory usage by up to 20%, while only minimally increasing application image size and time of execution of the TLS/DTLS handshake.
Date of Conference: 14-16 December 2020
Date Added to IEEE Xplore: 02 February 2021
ISBN Information:
Conference Location: Paris, France
References is not available for this document.

I. Introduction

As Internet of Things technology continues to grow, current trends demonstrate a shift away from centralized and cloud architectures to edge architectures. This shift is driven by the fact that edge architectures are needed to enable more flexible, responsive and intelligent IoT systems. The addition of numerous edge devices to Internet interactions introduces challenges in securing the communication between IoT systems. For secure communication in a typical IoT architecture, the following security goals must be achieved [1] :

Each participant involved in passing data, including the sensing and/or actuating devices, user devices, and edge gateways and servers must be authenticated.

During any communication session, data must be protected from any alterations and data integrity validated.

Encryption and decryption techniques must be employed to ensure data confidentiality while the data is in transport between any two entities.

Select All
1.
D. Minoli and J. Kouns, "IoT Security ( IoTSec ) Considerations Requirements and Architectures", pp. 1006-1007, 2017.
2.
M. A. Khan and K. Salah, "IoT security: Review blockchain solutions and open challenges", Future Generation Computer Systems, vol. 82, pp. 395-411, 2018, [online] Available: https://doi.org/10.1016/j.future.2017.11.022.
3.
Z. Wang, J. Lin, Q. Cai, Q. Wang, J. Jing and D. Zha, "Blockchain-based Certificate Transparency and Revocation Transparency", Financial Cryptography and Data Security, no. 2014, 2018.
4.
M. Hamada Ibrahim, "Octopus: An Edge-Fog Mutual Authentication Scheme", International Journal of Network Security, vol. 18, no. 6, pp. 1089-1101, 2016.
5.
I. Stojmenovic and S. Wen, "The Fog Computing Paradigm: Scenarios and Security Issues", Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, vol. 2, pp. 1-8, 2014.
6.
B. Mukherjee, R. L. Neupane and P. Calyam, "End-to-End IoT Security Middleware for Cloud-Fog Communication", Proceedings - 4th IEEE International Conference on Cyber Security and Cloud Computing CSCloud 2017 and 3rd IEEE International Conference of Scalable and Smart Cloud SSC 2017, pp. 151-156, 2017.
7.
A. Diro, H. Reda, N. Chilamkurti, A. Mahmood, N. Zaman and Y. Nam, "Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication", IEEE Access, vol. 8, pp. 60 539-60 551, 2020.
8.
A. Reyna, C. Martín, J. Chen, E. Soler and M. Díaz, "On blockchain and its integration with IoT. Challenges and opportunities", Future Generation Computer Systems, vol. 88, no. 2018, pp. 173-190, 2018.
9.
B. K. Mohanta, D. Jena, U. Satapathy and S. Patnaik, "Survey on iot security: Challenges and solution using machine learning artificial intelligence and blockchain technology", Internet of Things, vol. 11, pp. 100227, 2020.
10.
R. Ribitzky, "Pragmatic Interdisciplinary Perspectives on Blockchain and Distributed Ledger Technology: Paving the Future for Healthcare", Blockchain in Healthcare Today, vol. 1, no. 0, pp. 1-15, 2018.
11.
Q. Xia, E. B. Sifah, A. Smahi, S. Amofa and X. Zhang, "BBDS: Blockchain-based data sharing for electronic medical records in cloud environments", Information (Switzerland), vol. 8, no. 2, 2017.
12.
M. A. Uddin, A. Stranieri, I. Gondal and V. Balasubramanian, "Continuous Patient Monitoring with a Patient Centric Agent: A Block Architecture", IEEE Access, vol. 6, no. June, pp. 32 700-32 726, 2018.
13.
X. Liang, J. Zhao, S. Shetty, J. Liu and D. Li, "Integrating blockchain for data sharing and collaboration in mobile healthcare applications", 2017 IEEE 28th Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp. 1-5, 2017.
14.
T. Dey, S. Jaiswal, S. Sunderkrishnan and N. Katre, "HealthSense: A medical use case of Internet of Things and blockchain", Proceedings of the International Conference on Intelligent Sustainable Systems ICISS 2017, no. Iciss, pp. 486-491, 2018.
15.
C. Fromknecht, D. Velicanu and S. Yakoubov, "A decentralized public key infrastructure with identity retention", IACR Cryptology ePrint Archive., pp. 1-19, 2014.
16.
S. Chen, H. Wang and L.-J. Zhang, "Blockchain ICBC 2018", Proceedings Blockchain-ICBC, vol. 10974, no. July, pp. 0-15, 2018, [online] Available: http://www.springer.com/series/7410{}0A.
17.
P. Wouters, Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS), 2014, [online] Available: https://tools.ietf.org/html/rfc7250.
18.
Hyperledger Sawtooth, [online] Available: https://www.hyperledger.org/projects/sawtooth{}0A.
19.
Valgrind, [online] Available: http://www.valgrind.org/.
20.
M. Wolff, "Massif visualizer", insert, 2011, [online] Available: https://github.com/KDE/massif-visualizer.

Contact IEEE to Subscribe

References

References is not available for this document.