Skip to main content

Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things

  • Conference paper
  • First Online:
Cognitive Radio Oriented Wireless Networks and Wireless Internet (CROWNCOM 2021, WiCON 2021)

Abstract

Internet of Things (IoT) is steadily evolving which allows a new paradigm of smart sensors and lightweight devices interacting with one another without human intervention, also known as machine-to-machine (M2M) communication. This allows solution for various fields such as Smart Home Automation. In this scenario, the satisfaction of security and data privacy requirements play a fundamental role. Blockchain technology with the help of cryptography offers a solution by facilitating transactions and the coordination of devices without the need of a central authority. This study aims to improve the current smart home by developing and implementing a blockchain-based authentication system with the use of the Blockchain data structure, protocols and cryptographic algorithms such as Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA-256), and Keyed-Hashing for Message Authentication (HMAC) on a microcontroller board equipped with hardware acceleration. Our performance analysis showed that hardware acceleration provided significant improvement in processing time with a speedup of 5.53 and 7.94 times for AES-128 and SHA-256, respectively, compared to a software implementation counterpart.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abdulmonem, M.H., EssamEddeen, J., Zakhari, M.H., Hanafi, S., Mostafa, H.: Hardware acceleration of dash mining using dynamic partial reconfiguration on the ZYNQ board. In: 2020 32nd International Conference on Microelectronics (ICM), pp. 1–4 (2020). https://doi.org/10.1109/ICM50269.2020.9331815

  2. Aggarwal, V.K., Sharma, N., Kaushik, I., Bhushan, B.H.: Integration of blockchain and IoT (B-IoT): architecture, solutions, and future research direction. IOP Conf. Ser. Mater. Sci. Eng. 1022(1), 012103 (2021). https://doi.org/10.1088/1757-899X/1022/1/012103

    Article  Google Scholar 

  3. Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies, 1st edn. O’Reilly Media Inc., Newton (2014)

    Google Scholar 

  4. Atiwa, S., Dawji, Y., Refaey, A., Magierowski, S.: Accelerated hardware implementation of blake2 cryptographic hash for blockchain. In: 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–6 (2020). https://doi.org/10.1109/CCECE47787.2020.9255709

  5. Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architectures, standards and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012). https://doi.org/10.3837/tiis.2012.02.002

    Article  Google Scholar 

  6. Commons, W.: Authenticated encryption scheme (encrypt-then-mac), April 2015

    Google Scholar 

  7. Gaurav, K., Goyal, P., Agrawal, V., Rao, S.L.: IoT transaction security. In: 2015 5th International Conference on the Internet of Things. VMware Software India Pvt. Ltd. (2015)

    Google Scholar 

  8. Group, B.: Digital assets on public blockchains, March 2016

    Google Scholar 

  9. Kak, A.: Lecture notes on computer and network security (the advanced encryption standard). Lecture notes, April 2016. https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf

  10. Katagi, M., Moriai, S.: Lightweight cryptography for the Internet of Things (2012)

    Google Scholar 

  11. Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_19

    Chapter  Google Scholar 

  12. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication. RFC Informational 2104, February 1997. https://tools.ietf.org/html/rfc2104

  13. Kwak, S., Lee, J.: Implementation of blockchain based P2P energy trading platform. In: 2021 International Conference on Information Networking (ICOIN), pp. 5–7 (2021). https://doi.org/10.1109/ICOIN50884.2021.9333876

  14. Mahony, A.O., Popovici, E.: A systematic review of blockchain hardware acceleration architectures. In: 2019 30th Irish Signals and Systems Conference (ISSC), pp. 1–6 (2019). https://doi.org/10.1109/ISSC.2019.8904936

  15. Mohanty, S.P., Yanambaka, V.P., Kougianos, E., Puthal, D.: PUFchain: a hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IoE). IEEE Consum. Electron. Mag. 9(2), 8–16 (2020). https://doi.org/10.1109/MCE.2019.2953758

    Article  Google Scholar 

  16. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2009). http://www.bitcoin.org/bitcoin.pdf

  17. Niaz, M.S., Saake, G.: Merkle hash tree based techniques for data integrity of outsourced data. In: GvD, pp. 66–71 (2015)

    Google Scholar 

  18. Nordic Semiconductor ASA: nRF24L01+ Single Chip 2.4 GHz Transceiver (2008), preliminary Product Specification v1.0

    Google Scholar 

  19. Reitz, K.: Requests: HTTP for Humans (2016). http://docs.python-requests.org/en/master/

  20. Saha, S.S., Gorog, C., Moser, A., Scaglione, A., Johnson, N.G.: Integrating hardware security into a blockchain-based transactive energy platform (2020)

    Google Scholar 

  21. Zhong, G., Javaid, H., Saadat, H., Xu, L., Hu, C., Brebner, G.: FastProxy: hardware and software acceleration of stratum mining proxy. In: 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 73–76 (2019). https://doi.org/10.1109/CVCBT.2019.00013

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nestor Michael C. Tiglao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Santos, J.M.V., Pascua, J.E.V., Tiglao, N.M.C. (2022). Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things. In: Jin, H., Liu, C., Pathan, AS.K., Fadlullah, Z.M., Choudhury, S. (eds) Cognitive Radio Oriented Wireless Networks and Wireless Internet. CROWNCOM WiCON 2021 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-030-98002-3_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98002-3_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98001-6

  • Online ISBN: 978-3-030-98002-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics