Skip to main content
Log in

P2P networking based internet of things (IoT) sensor node authentication by Blockchain

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer networking. Due to limited physical size, IoT sensor nodes must have light-weight authentication protocol. The Internet of Things (IoT) is a collection of various technical elements. It is expected that interworking between heterogeneous terminals, networks, and applications. They will accelerate through the liberalization of the IoT platform. As a result, many technical and administrative security threats will arise in the IoT environment. Sensor node protocols must be light-weight and secure. As IoT devices are used for various purposes, for some devices that require performance, the OS with a high-performance chipset that works, most passwords protocol. However, to turn on / off the lights IoT devices that perform simple tasks such as based on a low-performance chipset with no OS running. If it does not support encryption protocol or certificate, then it is vulnerable, and it does not have enough performance to handle. Therefore, in this paper, Block-chain-based IoT device is proposed to get a more secure authentication scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. Mint is a Linux distribution based on Debian and Ubuntu which is easy to use.

References

  1. Huber R, Sommer P, Wattenhofer R (2011) Demo abstract: debugging wireless sensor network simulations with YETI and COOJA. Proceedings of the 10th ACM/IEEE international conference on information processing in sensor networks, pp. 141–142

  2. Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155

    Article  Google Scholar 

  3. Shi W, Kumar N (2015) Peng GongNaveen Chilamkurti, Hangbae Chang, on the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw Appl 8(5):881–885

    Article  Google Scholar 

  4. Li C-T, Lee C-C, Weng C-Y, Chen C-M (2018) Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw Appl 11(1):198–208

    Article  Google Scholar 

  5. Yu Z, Wen J (2017) The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10(4):983–994

    Article  Google Scholar 

  6. Adavoudi-Jolfaei AH, Ashouri-Talouki M, Aghili SF (2017) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 1–17

  7. Adida B (2008) Sessionlock: securing web sessions against eavesdropping. In Proceedings of the 17th international conference on world wide web, pp. 517–524

  8. Ullah A, Sehr I, Akbar M, Ning H (2018) FoG assisted secure De-duplicated data dissemination in smart healthcare IoT. 2018 IEEE international conference on smart internet of things, pp. 166–171

  9. Gupta BB, Joshi RC, Misra M (2009) An efficient analytical solution to thwart DDoS attacks in public domain. In Proceedings of the international conference on advances in computing, communication and control, pp. 503–509

  10. Kassim MRM, Harun AN, Yusoff IM, Mat I, Kuen CP, Rahmad N (2017) "Applications of wireless sensor networks in shiitake mushroom cultivation. 2017 Eleventh international conference on sensing technology, pp. 1–6

  11. Phaladisailoed T, Numnonda T (2018) Machine learning models comparison for bitcoin Price prediction. 2018 10th international conference on information technology and electrical engineering, pp. 506–511

  12. Cai C, Zheng Y, Wang C (2018) Leveraging crowdsensed data streams to discover and sell knowledge: a secure and efficient realization. 2018 IEEE 38th international conference on distributed computing systems, pp. 589–599

  13. Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work Blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 3–16

  14. Oh B, Park H (2007) An E-commerce model using peer-to-peer technology and personal blog. The 9th international conference on advanced communication technology, pp. 739–741

  15. Park B-j, Lee T-j, Kwak J (2017) Blockchain-based IoT device authentication scheme. J Korea Inst Inf Secur Cryptol 27(2):343–351

    Google Scholar 

  16. Letsoalo E, Ojo S (2016) Survey of media access control address spoofing attacks detection and prevention techniques in wireless networks. IST-Africa Week Conference

  17. Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655–663

    Article  Google Scholar 

  18. Zhang XM, He GJ, Zhang ZM, Peng Y, Long TF (2017) Spectral-spatial multi-feature classification of remote sensing big data based on a random forest classifier for land cover mapping. Clust Comput 20(3):2311–2321

    Article  Google Scholar 

  19. Kim S, Kim M, Kim KJ, Choi B, Chung J (2017) A scheme of AR-based personalized interactive broadcasting service in terrestrial digital broadcasting system. Clust Comput 20(3):2349–2354

    Article  Google Scholar 

  20. Vega-Rodríguez MA, Santander-Jiménez S (2017) Parallelism-based approaches in computational biology: a view from diverse case studies. Clust Comput 20(3):1865–1867

    Article  Google Scholar 

  21. da Conceição RM, Lobato RS, Manacero A, Spolon R, Cavenaghi MA (2017) μTESLA protocol in vehicular networks. 12th Iberian conference on information systems and technologies, pp. 1–6

  22. Blackshear S, Verma RM (2010) R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks. In Proceedings of the 2010 ACM symposium on applied computing, pp. 1985–1992

  23. Barnat J, Brim L, Stříbrná J (2009) Distributed LTL model-checking in SPIN. In Proceedings of the 8th international SPIN workshop on model checking of software, pp. 200–216

    Chapter  Google Scholar 

  24. Jang B, Lee K (2006) SNEP implementation on SPINS secure protocol. 2006 Conference of The Institute of Electronics Engineers of Korea, pp. 471–472

  25. Ren J, Li Y, Li T (2009) Routing-based source-location privacy in wireless sensor networks", ICC '09. IEEE international conference on, pp. 1–5

  26. Kiayias A, Panagiotakos G 2015 Speed-Security Tradeoffs in Blockchain Protocols

Download references

Acknowledgements

This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (NRF-2017R1A2B1003394).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunghyuck Hong.

Additional information

This article is part of the Topical Collection: Special on P2P Computing for Intelligence of Things

Guest Editors: Sunmoon Jo, Jieun Lee, Jungsoo Han, and Supratip Ghose

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, S. P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw. Appl. 13, 579–589 (2020). https://doi.org/10.1007/s12083-019-00739-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00739-x

Keywords

Navigation