Abstract
Internet of Things (IoT) is steadily evolving which allows a new paradigm of smart sensors and lightweight devices interacting with one another without human intervention, also known as machine-to-machine (M2M) communication. This allows solution for various fields such as Smart Home Automation. In this scenario, the satisfaction of security and data privacy requirements play a fundamental role. Blockchain technology with the help of cryptography offers a solution by facilitating transactions and the coordination of devices without the need of a central authority. This study aims to improve the current smart home by developing and implementing a blockchain-based authentication system with the use of the Blockchain data structure, protocols and cryptographic algorithms such as Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA-256), and Keyed-Hashing for Message Authentication (HMAC) on a microcontroller board equipped with hardware acceleration. Our performance analysis showed that hardware acceleration provided significant improvement in processing time with a speedup of 5.53 and 7.94 times for AES-128 and SHA-256, respectively, compared to a software implementation counterpart.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abdulmonem, M.H., EssamEddeen, J., Zakhari, M.H., Hanafi, S., Mostafa, H.: Hardware acceleration of dash mining using dynamic partial reconfiguration on the ZYNQ board. In: 2020 32nd International Conference on Microelectronics (ICM), pp. 1–4 (2020). https://doi.org/10.1109/ICM50269.2020.9331815
Aggarwal, V.K., Sharma, N., Kaushik, I., Bhushan, B.H.: Integration of blockchain and IoT (B-IoT): architecture, solutions, and future research direction. IOP Conf. Ser. Mater. Sci. Eng. 1022(1), 012103 (2021). https://doi.org/10.1088/1757-899X/1022/1/012103
Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies, 1st edn. O’Reilly Media Inc., Newton (2014)
Atiwa, S., Dawji, Y., Refaey, A., Magierowski, S.: Accelerated hardware implementation of blake2 cryptographic hash for blockchain. In: 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–6 (2020). https://doi.org/10.1109/CCECE47787.2020.9255709
Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architectures, standards and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012). https://doi.org/10.3837/tiis.2012.02.002
Commons, W.: Authenticated encryption scheme (encrypt-then-mac), April 2015
Gaurav, K., Goyal, P., Agrawal, V., Rao, S.L.: IoT transaction security. In: 2015 5th International Conference on the Internet of Things. VMware Software India Pvt. Ltd. (2015)
Group, B.: Digital assets on public blockchains, March 2016
Kak, A.: Lecture notes on computer and network security (the advanced encryption standard). Lecture notes, April 2016. https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf
Katagi, M., Moriai, S.: Lightweight cryptography for the Internet of Things (2012)
Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_19
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication. RFC Informational 2104, February 1997. https://tools.ietf.org/html/rfc2104
Kwak, S., Lee, J.: Implementation of blockchain based P2P energy trading platform. In: 2021 International Conference on Information Networking (ICOIN), pp. 5–7 (2021). https://doi.org/10.1109/ICOIN50884.2021.9333876
Mahony, A.O., Popovici, E.: A systematic review of blockchain hardware acceleration architectures. In: 2019 30th Irish Signals and Systems Conference (ISSC), pp. 1–6 (2019). https://doi.org/10.1109/ISSC.2019.8904936
Mohanty, S.P., Yanambaka, V.P., Kougianos, E., Puthal, D.: PUFchain: a hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IoE). IEEE Consum. Electron. Mag. 9(2), 8–16 (2020). https://doi.org/10.1109/MCE.2019.2953758
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2009). http://www.bitcoin.org/bitcoin.pdf
Niaz, M.S., Saake, G.: Merkle hash tree based techniques for data integrity of outsourced data. In: GvD, pp. 66–71 (2015)
Nordic Semiconductor ASA: nRF24L01+ Single Chip 2.4 GHz Transceiver (2008), preliminary Product Specification v1.0
Reitz, K.: Requests: HTTP for Humans (2016). http://docs.python-requests.org/en/master/
Saha, S.S., Gorog, C., Moser, A., Scaglione, A., Johnson, N.G.: Integrating hardware security into a blockchain-based transactive energy platform (2020)
Zhong, G., Javaid, H., Saadat, H., Xu, L., Hu, C., Brebner, G.: FastProxy: hardware and software acceleration of stratum mining proxy. In: 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 73–76 (2019). https://doi.org/10.1109/CVCBT.2019.00013
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Santos, J.M.V., Pascua, J.E.V., Tiglao, N.M.C. (2022). Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things. In: Jin, H., Liu, C., Pathan, AS.K., Fadlullah, Z.M., Choudhury, S. (eds) Cognitive Radio Oriented Wireless Networks and Wireless Internet. CROWNCOM WiCON 2021 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-030-98002-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-98002-3_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-98001-6
Online ISBN: 978-3-030-98002-3
eBook Packages: Computer ScienceComputer Science (R0)