Skip to main content
Log in

Development of an Enhanced Blockchain Mechanism for Internet of Things Authentication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The rising number of Internet of Things devices across public networks bring speed, accuracy, and responsibility. The complexity of Internet of Things communications and different resource capacities make end-to-end security hard to achieve. Despite The authentication of the identities of individual nodes is a critical component in making the Internet of Things safe to use. A blockchain-based identification strategy has been proposed for heterogeneous IoT nodes. To begin, the primary goal of this blockchain model is to improve the level of compatibility between the blockchain and the Internet of Things ecosystem. After that, the purpose of the method for selecting the proxy node is to construct a connection among the typical IoT node and the blockchain. This bridge is constructed by determining the confidence value among each pair of nodes. In findings, the node authentication technique of the concept and the proxy node selection process build a safe channel for communication between nodes. This is built on the modified blockchain. Considerations like the storage overhead and cost of communication imposed by the provided integrated authentication technique are utilized to determine the total efficacy of the approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

Not applicable.

References

  1. Sadrishojaei, M., et al. (2022). An energy-aware clustering method in the IoT using a swarm-based algorithm. Wireless Networks, 28(1), 125–136.

    Article  Google Scholar 

  2. Hosseinzadeh, M., et al. (2022). A hybrid delay aware clustered routing approach using aquila optimizer and firefly algorithm in internet of things. Mathematics, 10(22), 4331.

    Article  Google Scholar 

  3. Sadrishojaei, M., et al. (2021). A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. Cluster Computing. https://doi.org/10.1007/s10586-021-03394-1

    Article  Google Scholar 

  4. Farooq, U., et al. (2022). Machine learning and the Internet of Things security: Solutions and open challenges. Journal of Parallel and Distributed Computing, 162, 89–104.

    Article  Google Scholar 

  5. Sadrishojaei, M., et al. (2023). An energy-aware scheme for solving the routing problem in the internet of things based on jaya and flower pollination algorithms. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-023-04650-5

    Article  Google Scholar 

  6. Sadrishojaei, M., et al. (2022). An energy-aware IoT routing approach based on a swarm optimization algorithm and a clustering technique. Wireless Personal Communications, 127, 1–17.

    Article  Google Scholar 

  7. Singhai, R., & Sushil, R. (2023). An investigation of various security and privacy issues in Internet of Things. Materials Today: Proceedings, 80, 3393–3397.

    Google Scholar 

  8. Pouresmaieli, M., Ataei, M., & Taran, A. (2023). Future mining based on internet of things (IoT) and sustainability challenges. International Journal of Sustainable Development & World Ecology, 30(2), 211–228.

    Article  Google Scholar 

  9. Lansky, J., Sadrishojaei, M., Rahmani, A. M., Malik, M. H., Kazemian, F., Hosseinzadeh, M. (2022). Development of a lightweight centralized authentication mechanism for the internet of things driven by fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166

    Article  Google Scholar 

  10. Mezrag, F., Bitam, S., & Mellouk, A. (2022). An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks. Journal of Network and Computer Applications, 200, 103282.

    Article  Google Scholar 

  11. Aljadani, N., & Gazdar, T. (2022). A novel security architecture for WSN-based applications in smart grid. Smart Cities, 5(2), 633–649.

    Article  Google Scholar 

  12. Dutta, P., et al. (2023). The individual and integrated impact of blockchain and IoT on sustainable supply chains: A systematic review. Supply chain forum: An international journal. Taylor & Francis.

    Google Scholar 

  13. Sadrishojaei, M., et al. (2021). Clustered routing method in the Internet of Things using a moth-flame optimization algorithm. International Journal of Communication Systems, 34(16), e4964.

    Article  Google Scholar 

  14. Golightly, L., et al. (2023). Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN. Cyber Security and Applications, 1, 100015.

    Article  Google Scholar 

  15. Rahmani, A. M., et al. (2021). E-learning development based on Internet of Things and blockchain technology during COVID-19 pandemic. Mathematics, 9(24), 3151.

    Article  Google Scholar 

  16. Issa, W., et al. (2023). Blockchain-based federated learning for securing internet of things: A comprehensive survey. ACM Computing Surveys, 55(9), 1–43.

    Article  Google Scholar 

  17. Selvarajan, S., et al. (2023). An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing, 12(1), 38.

    Article  Google Scholar 

  18. Khashan, O. A., & Khafajah, N. M. (2023). Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. Journal of King Saud University-Computer and Information Sciences, 35(2), 726–739.

    Article  Google Scholar 

  19. Liu, Y., et al. (2023). A survey on blockchain-based trust management for Internet of Things. IEEE Internet of Things Journal, 10, 5898–5922.

    Article  Google Scholar 

  20. Akbarzadeh, A., et al. (2019). A lightweight hierarchical authentication scheme for internet of things. Journal of Ambient Intelligence and Humanized Computing, 10, 2607–2619.

    Article  Google Scholar 

  21. Alamr, A. A., et al. (2018). A secure ECC-based RFID mutual authentication protocol for internet of things. The Journal of supercomputing, 74, 4281–4294.

    Article  Google Scholar 

  22. Erroutbi, A., El Hanjri, A. & Sekkaki A. (2019). Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes. In 2019 IEEE international smart cities conference (ISC2). IEEE.

  23. Rostampour, S., et al. (2018). A scalable and lightweight grouping proof protocol for internet of things applications. The Journal of Supercomputing, 74, 71–86.

    Article  Google Scholar 

  24. Jang, S., et al. (2016). An efficient device authentication protocol without certification authority for Internet of Things. Wireless Personal Communications, 91(4), 1681–1695.

    Article  Google Scholar 

  25. Hammi, M. T., et al. (2018). Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126–142.

    Article  Google Scholar 

  26. Chen, Y., et al. (2017). A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2017/5290579

    Article  Google Scholar 

  27. Cui, Z., et al. (2020). A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, 13(2), 241–251.

    Google Scholar 

  28. Sadrishojaei, M., Navimipour, N. J., Reshadi, M., Hosseinzadeh, M. (2021). A new preventive routing method based on clustering and location prediction in the mobile internet of things. IEEE Internet of Things Journal, 8(13), 10652–10664. https://doi.org/10.1109/JIOT.2021.3049631

    Article  Google Scholar 

  29. Jiang, R., et al. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601.

    Article  MathSciNet  Google Scholar 

  30. Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210–223.

    Article  Google Scholar 

  31. Bhubaneswari, S., & Ananth, N. (2018). Enhanced mutual authentication scheme for cloud of things. Int J Pure Appl Math, 119(15), 1571–1583.

    Google Scholar 

  32. Liao, Y.-P., & Hsiao, C.-M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad hoc networks, 18, 133–146.

    Article  Google Scholar 

  33. Bounceur, A., et al., (2018). CupCarbon: A new platform for the design, simulation and 2D/3D visualization of radio propagation and interferences in IoT networks. In 2018 15th IEEE annual consumer communications & networking conference (CCNC). IEEE.

  34. Bounceur, A., et al., (2018). Cupcarbon-lab: An iot emulator. In 2018 15th IEEE annual consumer communications & networking conference (CCNC). IEEE.

  35. Bounceur, A. (2016). CupCarbon: A new platform for designing and simulating smart-city and IoT wireless sensor networks (SCI-WSN). In Proceedings of the international conference on internet of things and cloud computing.

Download references

Funding

This research is not supported.

Author information

Authors and Affiliations

Authors

Contributions

All the authors contributed equally to the writing of this article, and all the writers reviewed and approved the final document.

Corresponding author

Correspondence to Mahyar Sadrishojaei.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.None.

Ethical Approval

The manuscript truly represents the authors’ own analysis and research, and it is not under consideration for publication elsewhere at this time.

Informed Consent

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sadrishojaei, M., Kazemian, F. Development of an Enhanced Blockchain Mechanism for Internet of Things Authentication. Wireless Pers Commun 132, 2543–2561 (2023). https://doi.org/10.1007/s11277-023-10731-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10731-7

Keywords