Skip to main content

Advertisement

Log in

User authentication of industrial internet of things (IIoT) through Blockchain

  • Track 2: Medical Applications of Multimedia
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Industrial IoT is starting an enormous advancement occasion in the industrial epoch. Data security as well as privacy becomes a challenge in almost every field in the real life for the duration of monitoring and collection of data in Industrial Internet of Things (IIoT) applications. The security and privacy of data in IIoT depends on the user’s reliability that can be obtained by using the user authentication scheme otherwise unable to secure the IIoT applications data. Many authors have proposed the user authentication schemes in industrial internet of things who suffer from some hindrances such as data security, throughput, single point of failure, storage problem and latency (due to which increases the eavesdropping attacks chances). Therefore, to eliminate the above security issues, this paper proposes a new hybrid authentication approach instead of that also increases the throughput of IIoT applications, reduces the latency as well as enhances the accuracy of IIoT users. To create smart contracts of user authentication approaches by using the PKI and ECC algorithms, whereas it helps to achieve the privacy preservation. Instead of that, ECC that constructs the trustworthy user authentication blockchain scheme which enhance the privacy further as well as helps to maintain the number of keys along, every time keys are updated continuously. Moreover, we implement the proposed approach on the Ethereum blockchain and put all the data through smart contract on the decentralized IPFS cloud server which is transparent, secure, traceable, and storage utilization. Only authenticated users can interface with IIoT applications, even if someone tries to corrupt them, and then revoke the digital certificate from the user. It will be known from the performance of this paper that the proposed approach not only provides the privacy of the users but also obtains the high authentication accuracy, throughput and reduces the latency in comparison of existing approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Algorithm 1
Algorithm 2
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Ahsan T, Khan FZ, Iqbal Z, Ahmed M, Alroobaea R, Baqasah AM, Ali I, Raza MA (2022) “IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System, Green Internet of Things in 5G and Beyond, https://doi.org/10.1155/2022/8570064

  2. Bai L, Hu M, Liu M, Wang J (2019) “BPIIoT: a light-weighted Blockchain-based platform for industrial IoT, “IEEE Access, https://doi.org/10.1109/ACCESS.2019.2914223,15

  3. Bhuyan HK, Kamila NK (2014) “Privacy preserving sub-feature selection based on fuzzy Probabilities, “Cluster Comput, Springer, https://doi.org/10.1007/s10586-014-0393-9, page no. 1383–1399

  4. Bhuyan HK, Pani SK (2021). Crime predictive model using big data analytics. Intelligent Data Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques and Applications, pp 57–78. https://doi.org/10.1002/9781119711629.ch3

  5. Bhuyan HK, Kamila NK, Pani SK (2021) “Individual privacy in data mining using fuzzy Optimization, “Eng Optimiz Taylor Francis, https://doi.org/10.1080/0305215X.2021.1922897

  6. Cai X, Geng S, Zhang J, Wu D, Cui Z, Zhang W, Chen J (2021) A Sharding Scheme based Many-objective Optimization Algorithm for Enhancing Security in Blockchain-enabled Industrial Internet of Things, “IEEE Transactions on Industrial Informatics, https://doi.org/10.1109/TII.2021.3051607, Vol. 14, NO. 8

  7. Chao Qiu, F Yu R, Yao H, Jiang C, Xu F, Zhao C (2019) “Blockchain-Based Software-Defined Industrial Internet of Things: A Dueling Deep Q-Learning Approach, “IEEE Int Things J, https://doi.org/10.1109/JIOT.2018.2871394, vol. 6, no. 3

  8. Fan Q, Chen J, Deborah LJ, Luo M (2021) “A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain, “J Syst Architect Elsevier, https://doi.org/10.1016/j.sysarc.2021.102112

  9. Figueroa-Lorenzo S, Anorga J, Arrizabalaga S, “Methodological performance analysis applied to a novel IIoT access control system based on permissioned blockchain, “information processing and management 58 (2021) 102558, Elsevier, 9 March, 2021.

  10. Huang J, Kong L, Chen G, Wu M-Y, Xue L, Zeng P (2019) Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism, “IEEE Trans Indust Inf, https://doi.org/10.1109/TII.2019.2903342

  11. Iqbal S, Noor RMd, Malik AW, Rahman AU (2021) “Blockchain-enabled adaptive learning-based resource sharing framework for IIoT environment, “IEEE Int Things J, https://doi.org/10.1109/JIOT.2021.3071562

  12. Javaid U, Sikdar B (2020) ” A Checkpoint Enabled Scalable Blockchain Architecture for Industrial Internet of Things, “IEEE Trans Ind Inf, https://doi.org/10.1109/TII.2020.3032607, 20 November 2020.

  13. Jia B, Zhang X, Liu J, Yang Z, Huang K, Liang Y (2021) “Blockchain-enabled Federated Learning Data Protection Aggregation Scheme with Differential Privacy and Homomorphic Encryption in IIoT, “IEEE Transactions on Industrial Informatics, https://doi.org/10.1109/TII.2021.3085960

  14. Latif S, Idrees Z, Ahmad J, Zheng L, Zou Z (2020) A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things. J Indust Inf Integr 21(2021):100190, Elsevier. https://doi.org/10.1016/j.jii.2020.100190

    Article  Google Scholar 

  15. Maria A, Rajasekaran AS, Al-Turjman F, Altrjman C, Mostarda L (2022) “BAIV: An Efficient Blockchain-Based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs, “Blockchain Based Electron Healthcare Sol Secur, MDPI, https://doi.org/10.3390/electronics11030488, vol 11, issue 3

  16. Tao D, Ma P, Obaidat MS (2019) “Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks, “Int J Commun Syst, e4099, https://doi.org/10.1002/dac.4099

  17. Vishwakarma L, Das D (2021) SCAB-IoTA: Secure communication and authentication for IoT applications using blockchain. J Parallel Distribute Comput 154(2021):94–105, Elsevier, 10

    Article  Google Scholar 

  18. Wan J, Li J, Imran M, Li D, Amin FE (2019) “A Blockchain-based solution for enhancing security and privacy in smart factory, “IEEE Trans Indust Inf, https://doi.org/10.1109/TII.2019.2894573

  19. Wang J, Wu L, Choo K-KR, He D (2019) “Blockchain based anonymous authentication with key Management for Smart Grid Edge Computing Infrastructure, “IEEE Trans Industrial Inf, https://doi.org/10.1109/TII.2019.2936278

  20. Wang X, Garg S, Lin H, Piran MJ, Hu J, Hossain MS (2021) Enabling Secure Authentication in Industrial IoT with Transfer Learning empowered Blockchain. IEEE Trans Industrial Inf 17(11):7725–7735. https://doi.org/10.1109/TII.2021.3049405

    Article  Google Scholar 

  21. Wang J, Wei B, Zhang J, Yu X, Sharma PK (2021) An optimized transaction verification method for trustworthy blockchain-enabled IIoT. Ad Hoc Networks 119:102526, Elsevier. https://doi.org/10.1016/j.adhoc.2021.102526,7May,2021

    Article  Google Scholar 

  22. Wang C, Wang D, Xu G, He D (2022) “Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, “Information Sciences, https://doi.org/10.1007/s11432-020-2975-6, Vol. 65

  23. Xue Z, Pang S, Wang M, Qiao S, Lv Z (2022) “TVS: a trusted verification scheme for office documents based on blockchain, “Complex Intell Syst, Springer, https://doi.org/10.1007/s40747-021-00617-1

  24. Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) “Blockchain-Enhanced Data Sharing with Traceable and Direct Revocation in IIoT, “IEEE Trans Industrial Inf, https://doi.org/10.1109/TII.2021.3049141

  25. Zareen H, Awan S, Sajid MBE, Baig SM, Faisal M, Javaid N (2021) Blockchain and IPFS based Service Model for the Internet of Things. In: Conference on Complex, Intelligent, and Software Intensive Systems. Springer, Cham, pp 259–270.https://doi.org/10.1007/978-3-030-79725-6_25

  26. Zhao S, Li S, Yao Y (2019) “Blockchain enabled industrial internet of things technology, “IEEE Trans Comput Soc Syst, https://doi.org/10.1109/TCSS.2019.2924054

Download references

Funding

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetanjali Rathee.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Devi, A., Kumar, A., Rathee, G. et al. User authentication of industrial internet of things (IIoT) through Blockchain. Multimed Tools Appl 82, 19021–19039 (2023). https://doi.org/10.1007/s11042-022-14154-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14154-7

Keywords

Navigation