Abstract
The rising number of Internet of Things devices across public networks bring speed, accuracy, and responsibility. The complexity of Internet of Things communications and different resource capacities make end-to-end security hard to achieve. Despite The authentication of the identities of individual nodes is a critical component in making the Internet of Things safe to use. A blockchain-based identification strategy has been proposed for heterogeneous IoT nodes. To begin, the primary goal of this blockchain model is to improve the level of compatibility between the blockchain and the Internet of Things ecosystem. After that, the purpose of the method for selecting the proxy node is to construct a connection among the typical IoT node and the blockchain. This bridge is constructed by determining the confidence value among each pair of nodes. In findings, the node authentication technique of the concept and the proxy node selection process build a safe channel for communication between nodes. This is built on the modified blockchain. Considerations like the storage overhead and cost of communication imposed by the provided integrated authentication technique are utilized to determine the total efficacy of the approach.







Similar content being viewed by others
Data Availability
Not applicable.
References
Sadrishojaei, M., et al. (2022). An energy-aware clustering method in the IoT using a swarm-based algorithm. Wireless Networks, 28(1), 125–136.
Hosseinzadeh, M., et al. (2022). A hybrid delay aware clustered routing approach using aquila optimizer and firefly algorithm in internet of things. Mathematics, 10(22), 4331.
Sadrishojaei, M., et al. (2021). A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. Cluster Computing. https://doi.org/10.1007/s10586-021-03394-1
Farooq, U., et al. (2022). Machine learning and the Internet of Things security: Solutions and open challenges. Journal of Parallel and Distributed Computing, 162, 89–104.
Sadrishojaei, M., et al. (2023). An energy-aware scheme for solving the routing problem in the internet of things based on jaya and flower pollination algorithms. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-023-04650-5
Sadrishojaei, M., et al. (2022). An energy-aware IoT routing approach based on a swarm optimization algorithm and a clustering technique. Wireless Personal Communications, 127, 1–17.
Singhai, R., & Sushil, R. (2023). An investigation of various security and privacy issues in Internet of Things. Materials Today: Proceedings, 80, 3393–3397.
Pouresmaieli, M., Ataei, M., & Taran, A. (2023). Future mining based on internet of things (IoT) and sustainability challenges. International Journal of Sustainable Development & World Ecology, 30(2), 211–228.
Lansky, J., Sadrishojaei, M., Rahmani, A. M., Malik, M. H., Kazemian, F., Hosseinzadeh, M. (2022). Development of a lightweight centralized authentication mechanism for the internet of things driven by fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166
Mezrag, F., Bitam, S., & Mellouk, A. (2022). An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks. Journal of Network and Computer Applications, 200, 103282.
Aljadani, N., & Gazdar, T. (2022). A novel security architecture for WSN-based applications in smart grid. Smart Cities, 5(2), 633–649.
Dutta, P., et al. (2023). The individual and integrated impact of blockchain and IoT on sustainable supply chains: A systematic review. Supply chain forum: An international journal. Taylor & Francis.
Sadrishojaei, M., et al. (2021). Clustered routing method in the Internet of Things using a moth-flame optimization algorithm. International Journal of Communication Systems, 34(16), e4964.
Golightly, L., et al. (2023). Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN. Cyber Security and Applications, 1, 100015.
Rahmani, A. M., et al. (2021). E-learning development based on Internet of Things and blockchain technology during COVID-19 pandemic. Mathematics, 9(24), 3151.
Issa, W., et al. (2023). Blockchain-based federated learning for securing internet of things: A comprehensive survey. ACM Computing Surveys, 55(9), 1–43.
Selvarajan, S., et al. (2023). An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing, 12(1), 38.
Khashan, O. A., & Khafajah, N. M. (2023). Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. Journal of King Saud University-Computer and Information Sciences, 35(2), 726–739.
Liu, Y., et al. (2023). A survey on blockchain-based trust management for Internet of Things. IEEE Internet of Things Journal, 10, 5898–5922.
Akbarzadeh, A., et al. (2019). A lightweight hierarchical authentication scheme for internet of things. Journal of Ambient Intelligence and Humanized Computing, 10, 2607–2619.
Alamr, A. A., et al. (2018). A secure ECC-based RFID mutual authentication protocol for internet of things. The Journal of supercomputing, 74, 4281–4294.
Erroutbi, A., El Hanjri, A. & Sekkaki A. (2019). Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes. In 2019 IEEE international smart cities conference (ISC2). IEEE.
Rostampour, S., et al. (2018). A scalable and lightweight grouping proof protocol for internet of things applications. The Journal of Supercomputing, 74, 71–86.
Jang, S., et al. (2016). An efficient device authentication protocol without certification authority for Internet of Things. Wireless Personal Communications, 91(4), 1681–1695.
Hammi, M. T., et al. (2018). Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126–142.
Chen, Y., et al. (2017). A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2017/5290579
Cui, Z., et al. (2020). A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, 13(2), 241–251.
Sadrishojaei, M., Navimipour, N. J., Reshadi, M., Hosseinzadeh, M. (2021). A new preventive routing method based on clustering and location prediction in the mobile internet of things. IEEE Internet of Things Journal, 8(13), 10652–10664. https://doi.org/10.1109/JIOT.2021.3049631
Jiang, R., et al. (2013). EAP-based group authentication and key agreement protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601.
Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210–223.
Bhubaneswari, S., & Ananth, N. (2018). Enhanced mutual authentication scheme for cloud of things. Int J Pure Appl Math, 119(15), 1571–1583.
Liao, Y.-P., & Hsiao, C.-M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad hoc networks, 18, 133–146.
Bounceur, A., et al., (2018). CupCarbon: A new platform for the design, simulation and 2D/3D visualization of radio propagation and interferences in IoT networks. In 2018 15th IEEE annual consumer communications & networking conference (CCNC). IEEE.
Bounceur, A., et al., (2018). Cupcarbon-lab: An iot emulator. In 2018 15th IEEE annual consumer communications & networking conference (CCNC). IEEE.
Bounceur, A. (2016). CupCarbon: A new platform for designing and simulating smart-city and IoT wireless sensor networks (SCI-WSN). In Proceedings of the international conference on internet of things and cloud computing.
Funding
This research is not supported.
Author information
Authors and Affiliations
Contributions
All the authors contributed equally to the writing of this article, and all the writers reviewed and approved the final document.
Corresponding author
Ethics declarations
Conflict of interest
The authors have not disclosed any competing interests.None.
Ethical Approval
The manuscript truly represents the authors’ own analysis and research, and it is not under consideration for publication elsewhere at this time.
Informed Consent
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sadrishojaei, M., Kazemian, F. Development of an Enhanced Blockchain Mechanism for Internet of Things Authentication. Wireless Pers Commun 132, 2543–2561 (2023). https://doi.org/10.1007/s11277-023-10731-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10731-7