By: Soo Nee Kee1,2
1Universiti Malaya, Kuala Lumpur, Malaysia.
2International Center for AI and Cyber Security Research and Innovations, Asia University, Taiwan Email: nee.kee2001.nks@gmail.com
Abstract
The rapid growth of IoT ecosystems has led to significant achievements in technology and connectivity, but it also introduces various security vulnerabilities, especially authentication issues. Many IoT devices lack robust authentication mechanisms, making them vulnerable to unauthorized access and attacks. When attackers gain unauthorized access to private data, it may lead to privacy violations or privacy leakage. Thus, a blockchain based authentication framework is proposed to address authentication threats in IoT ecosystems. By implementing this approach, sensitive information can be protected, and user trust can be fostered in the IoT ecosystem.
Keywords: Blockchain, IoT devices, Smart Contracts, Asymmetric Cryptography, RSA, Cloud
Introduction
Internet of Things (IoT) devices are interconnected devices such as sensors and actuators that connect wirelessly to a network and share data. These devices can sense the environment, collect information and communicate with other devices to facilitate automation and real time monitoring. IoT devices can analyze data locally or transmit data to cloud for further processing, which enhances operational efficiency. Thus, it is crucial in creating a smart city. For example, wearable devices like smartwatches are widely used in the healthcare sector to gather patient information like blood oxygen level and heartbeat rate. Smartwatches can transmit real-time data to the doctors to allow continuous monitoring. In addition, it also will send alerts to emergency contacts to protect patient safety. However, many IoT devices are vulnerable to unauthorized access due to the lack of authentication mechanisms.
Blockchain is a decentralized ledger technology that stores data in a distributed manner. Data will be stored in blocks and each block is connected to the previous block via cryptographic chain, preventing tampering of data and ensuring transparency and traceability. [1] With the use of blockchain, unauthorized access and malicious change of data can be mitigated. Thus, blockchain is used in IoT to provide authentication protocols.
Techniques
Integration of blockchain with IoT can effectively address the authentication threats due to its traceability and transparency and immutability. This framework consists of two key components: one for managing and verifying digital identities on the blockchain, and the other for securely storing data in the cloud. Every IoT device has a unique digital identity (ID) that includes attributes, ownership and capabilities. All verified IDs are stored in blockchain while the smart contract is used to automate the authentication process. For instance, smart contract will validate the ID automatically based on its credentials stored on blockchain. [2]
To protect data transmission and data storage, asymmetric cryptography such as RSA is used. Data is encrypted using RSA and its public key and stored in the cloud. When retrieving data, smart contract verifies its authenticity and uses its private key to decode the data. Private keys must be kept confidential, but public keys can be shared freely. This enhances authentication mechanism and allows only authorised devices to commence connection. Private keys are kept confidential by storing them in Key Management Systems (KMS), whereas public keys can be placed on blockchain because they can be shared publicly.
Conclusion
In conclusion, the use of blockchain technology in IoT ecosystems can enhance system security effectively. Digital identities and privacy data can be protected using blockchain’s decentralised nature. Smart contracts automate the authentication process, allowing for seamless verification of device IDs while also boosting system efficiency. The adoption of RSA strengthens the system’s security by defending against unauthorised access and increasing user trust.
Reference
- “Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications – ScienceDirect.” Accessed: Oct. 04, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1084804524000614
- V. Aanandaram and P. Deepalakshmi, “Blockchain-based Digital Identity for Secure Authentication of IoT Devices In 5G Networks,” in 2024 Third International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS), Mar. 2024, pp. 1–6. doi: 10.1109/INCOS59338.2024.10527739.
- Gupta, B. B., & Nedjah, N. (Eds.). (2020). Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies. CRC Press.
- Gupta, B. B., & Srinivasagopalan, S. (Eds.). (2020). Handbook of research on intrusion detection systems. IGI Global.
- Gupta, B. B., Chui, K. T., Gaurav, A., Arya, V., & Chaurasia, P. (2023). A novel hybrid convolutional neural network-and gated recurrent unit-based paradigm for IoT network traffic attack detection in smart cities. Sensors, 23(21), 8686.
Cite As
Kee S.N. (2024) IoT Device Authentication Protocols Using Blockchain Technology, Insights2Techinfo, pp.1