Abstract
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.
- [1] . 2019. An iot unified access platform for heterogeneity sensing devices based on edge computing. IEEE access 7 (2019), 44199–44211.Google ScholarCross Ref
- [2] . 2002. Efficient object identification with passive RFID tags. In The International Conference on Pervasive Computing. Springer, Berlin, Heidelberg. 98–113.Google Scholar
- [3] . 2019. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19, 2 (2019), 326.Google ScholarCross Ref
- [4] . 2017. Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops). IEEE, 618–623.Google ScholarCross Ref
- [5] . 2018. Sensitive information tracking in commodity IoT. In Proceedings of the 27th {USENIX} Security Symposium ({USENIX} Security 18). 1687–1704.Google Scholar
- [6] . 2021. IoT based biometric seat reservation and transport management system for university bus. In Proceedings of the 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). IEEE, 649–653.Google Scholar
- [7] . 2018. Analysis of cryptographic algorithms on iot hardware platforms. In Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet). IEEE, 1–5.Google Scholar
- [8] . 2020. Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics 9, 1 (2020), 144.Google ScholarCross Ref
- [9] . 2020. Lightweight multi-factor mutual authentication protocol for IoT devices. International Journal of Information Security 19, 6 (2020), 679–694.Google ScholarDigital Library
- [10] . 2014. A survey on trust management for the Internet of Things. Journal of Network and Computer Applications 42 (2014), 120–134. Google ScholarCross Ref
- [11] . 2012. Introducing the QEST broker: Scaling the IoT by bridging MQTT and REST. In Proceedings of the 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC). IEEE, 36–41.Google Scholar
- [12] . 2021. An energy-efficient centralized dynamic time scheduling for internet of healthcare things. Measurement 186 (2021), 110230. Google ScholarCross Ref
- [13] . 2021. A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things 16 (2021), 100264. Google ScholarCross Ref
- [14] . 2021. Deep Learning-Based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10, 11 (2021), 1257.Google ScholarCross Ref
- [15] . 2021. DETONAR: Detection of routing attacks in RPL-based IoT. In IEEE Transactions on Network and Service Management 18, 2 (2021), 1178--1190.
DOI: Google ScholarCross Ref - [16] . 2021. SniffMislead: Non-Intrusive privacy protection against wireless packet sniffers in smart homes. In Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses. 33–47.Google ScholarDigital Library
- [17] . 2021. Survey on data deduplication in cloud storage environments. Journal of Information Processing Systems 173 (2021), 658–673.Google Scholar
- [18] . 2021. Embedding blockchain technology into IoT for security: A survey. In IEEE Internet of Things Journal 8, 13 (2021), 10452--10473.
DOI: Google ScholarCross Ref - [19] . 2022. A Light-weight and attack-proof bidirectional blockchain paradigm for internet of things. IEEE Internet of Things Journal 9, 6 (2022), 4371--4384.
DOI: Google ScholarCross Ref - [20] . 2021. Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA). Information Security Journal: A Global Perspective (2021), 1–19.Google Scholar
- [21] . 2022. An identity privacy scheme for blockchain-based on edge computing. Concurrency and Computation: Practice and Experience 34, 1 (2022), e6545.Google Scholar
- [22] . 2021. Privacy preservation in resource-constrained IoT devices using blockchain—A survey. Electronics 10, 14 (2021), 1732.Google ScholarCross Ref
- [23] . 2023. Cloud mining pool aided blockchain-enabled internet of things: An evolutionary game approach. In IEEE Transactions on Cloud Computing 11, 1 (2023), 692--703.
DOI: Google ScholarCross Ref - [24] . 2021. Secure and lightweight communication in heterogeneous IoT environments. Internet of Things 14 (2021), 100093. Google ScholarCross Ref
- [25] . 1997. Finding optimal solutions to Rubik's Cube using pattern databases. In Proceedings of the AAAI/IAAI. 700–705.Google Scholar
- [26] . 2021. Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access 9 (2021), 13938–13959.
DOI: Google ScholarCross Ref - [27] . 2008. Network simulations with the ns-3 simulator. SIGCOMM Demonstration 14, 14 (2008), 527.Google Scholar
- [28] . 2010. Cooja TimeLine: A power visualizer for sensor network simulation. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. 385–386.Google Scholar
- [29] . 2020. On the security risks of the blockchain. Journal of Computer Information Systems 60, 6 (2020), 495–506.Google ScholarCross Ref
- [30] . 2020. IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet of Things Journal 8, 7 (2020), 5164–5171.Google Scholar
- [31] . 2022. Digital twin intelligent system for industrial ioT-based big data management and analysis in cloud. Virtual Reality & Intelligent Hardware 4, 4 (2022), 279--291. Google ScholarCross Ref
- [32] . 2021. Integrated satellite-terrestrial networks toward 6G: Architectures, applications, and challenges. IEEE Internet of Things Journal 9, 1 (2021), 437–461.Google Scholar
- [33] . 2020. Virtualized fog network with load balancing for IoT based Fog-to-Cloud. JOIV: International Journal on Informatics Visualization 4, 3 (2020), 123–126.Google Scholar
- [34] . 2021. A secure vehicle theft detection framework using Blockchain and smart contract. Peer-to-Peer Networking and Applications 14, 2 (2021), 672–686.Google Scholar
- [35] . 2021. Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT). Future Internet 13, 11 (2021), 291.Google Scholar
- [36] . 2021. DT-DPoS: A delegated proof of stake consensus algorithm with dynamic trust. Procedia Computer Science 187 (2021), 371–376. Google ScholarCross Ref
- [37] . 2021. A comparative analysis of consensus protocols for dealing power theft issues in Pakistan. Journal of Information and Optimization Sciences 42, 7 (2021), 1523–1540.Google Scholar
- [38] . 2022. Consensus algorithms for blockchains. In Introducing Blockchain Applications. A Press, Berkeley, CA, 149–161.Google Scholar
- [39] . 2018. Fog computing conceptual model, special publication (NIST SP). National Institute of Standards and Technology, Gaithersburg, MD, [online], Special Publication Issue (NIST SP) - 500-325, Report Number 500-325, Published March 14, 2018. . (Accessed March 31, 2023).Google ScholarCross Ref
- [40] . 2021. A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Generation Computer Systems 125 (2021), 433--445. Google ScholarDigital Library
- [41] . 2021. Blockchain-enabled secure communication mechanism for IoT-driven personal health records. Transactions on Emerging Telecommunications Technologies (2021), e4421.Google Scholar
- [42] . 2022. SAKE*: A symmetric authenticated key exchange protocol with perfect forward secrecy for industrial internet of things. In IEEE Transactions on Industrial Informatics 18, 9 (2022), 6424--6434.
DOI: Google ScholarCross Ref - [43] . 2020. Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system. Journal of Medical Engineering & Technology 44, 1 (2020), 12–19.Google ScholarCross Ref
- [44] . 2020. A PUF-based and cloud-assisted lightweight authentication for multi-hop body area networks. Tsinghua Science and Technology 26, 1 (2020), 36–47.Google Scholar
- [45] . 2021. Lightweight blockchain consensus mechanism and storage optimization for resource-constrained IoT devices. Information Processing & Management 58, 4 (2021), 102602.Google ScholarDigital Library
- [46] . 2021. A lightweight blockchain-based IoT identity management approach. Future Internet 13, 2 (2021), 24.Google ScholarCross Ref
- [47] . 2021. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster Computing 24, 4 (2021), 3065–3084.Google ScholarDigital Library
- [48] . 2021. Chaotic lightweight cryptosystem for image encryption. Advances in Multimedia, Hindawi, 1687--5680.
DOI: Google ScholarDigital Library - [49] . 2021. A review on lightweight cryptography for Internet-of-Things based applications. Journal of Ambient Intelligence and Humanized Computing 12, 9 (2021), 8835–8857.Google ScholarCross Ref
- [50] . 2019. Lightweight collaborative authentication with key protection for smart electronic health record systems. IEEE Sensors Journal 20, 4 (2019), 2181–2196.Google Scholar
- [51] . 2019. Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments. IEEE Access 7 (2019), 67107--67122.
DOI: Google ScholarCross Ref - [52] . 2019. Lightweight session key establishment for android platform using ECC. In Advances in Computer, Communication and Control. Springer, Singapore. 347–359.Google Scholar
- [53] . 2020. Medical data security for healthcare applications using hybrid lightweight encryption and swarm optimization algorithm. Wireless Personal Communications 114, 3 (2020).Google Scholar
- [54] . 2021. A COVID-19 detection algorithm using deep features and discrete social learning particle swarm optimization for edge computing devices. ACM Transactions on Internet Technology (TOIT) 22, 3 (2021), 1–17.Google Scholar
- [55] . 2018. A bio-inspired self-learning coevolutionary dynamic multiobjective optimization algorithm for internet of things services. IEEE Transactions on Evolutionary Computation 23, 4 (2018), 675–688.Google Scholar
- [56] . 2021. Novel image encryption algorithm based on new 3-d chaos map. Multimedia Tools and Applications (2021), 1–23.Google Scholar
- [57] . 2021. LICCA: A lightweight image cipher using 3-D cellular automata. Nonlinear Dynamics 106, 3 (2021), 2679–2702.Google ScholarCross Ref
- [58] 2021. Chaos based image encryption using 3-Dimension logistic map. Materials Today: Proceedings (2021).Google Scholar
- [59] 2021. A communication scheme based on fractional order chaotic laser for the internet of things. Internet of Things (2021), 100425.Google Scholar
- [60] 2021. A transport monitoring system for cultural relics protection based on blockchain and internet of things. Journal of Cultural Heritage 50 (2021), 106–114. Google ScholarCross Ref
- [61] 2020. Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing 18, 6 (2020), 2787–2800.Google Scholar
- [62] 2019. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing 18, 3 (2019), 1214–1226.Google ScholarCross Ref
- [63] . 2022. Revocable attribute-based encryption with data integrity in clouds. In IEEE Transactions on Dependable and Secure Computing 19, 5 (2022), 2864--2872.
DOI: Google ScholarCross Ref - [64] 2021. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing 19, 5 (2021), 2907–2919.Google ScholarCross Ref
- [65] . 1987. Guide to GPS positioning. In Canadian GPS Assoc.Google Scholar
- [66] . 2021. Cubed: The Puzzle of Us All by Ernő Rubik.Google Scholar
- [67] . 2019. Solving rubik's cube with a robot hand.Google Scholar
- [68] . 2019. Solving the Rubik's cube with deep reinforcement learning and search. Nature Machine Intelligence 1, 8 (2019), 356–363.Google ScholarCross Ref
- [69] . 2011. Brute force attacks. In The Block Cipher Companion. Springer, Berlin, Heidelberg. 95–108.Google Scholar
- [70] . 2021. A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things 16 (2021), 100264. Google ScholarCross Ref
- [71] . 2022. Smart home privacy protection methods against a passive wireless snooping side-channel attack. Sensors 22, 21 (2022), 8564. Google ScholarCross Ref
- [72] . 2021. Lightweight De-authentication DoS attack detection methodology for 802.11 networks using sniffer. In Proceedings of 2nd International Conference on Computing, Communications, and Cyber-Security. Springer, Singapore, 67–80.Google Scholar
- [73] . 2021. A survey on the security in cyber physical systems with multi-factor authentication. In Proceedings of the 2021 23rd International Conference on Advanced Communication Technology (ICACT). IEEE, 1–8.Google Scholar
- [74] . 2022. Cryptanalysis of authentication protocol for WSN in IoT based electric vehicle environment. Materials Today: Proceedings (2022).Google Scholar
- [75] . 2022. A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography. Ad Hoc Networks (2022), 102768.Google Scholar
- [76] . 2021. Monitoring system of heart rate, temperature and infusion in patients based on microcontroller (Arduino Uno). In Journal of Physics: Conference Series. IOP Publishing 1845, 1 (2021), 012069.Google Scholar
- [77] . 2021. Intelligent door lock system based on raspberry Pi. In Proceedings of the 2021 2nd International Conference on Artificial Intelligence and Information Systems. 1–7.Google ScholarDigital Library
- [78] . 2022. Deep embedded hybrid CNN-LSTM network for lane detection on NVIDIA Jetson Xavier NX. Knowledge-Based Systems (2022), 107941.Google Scholar
- [79] . 2021. EPPDA: An efficient and privacy-preserving data aggregation scheme with authentication and authorization for IoT-based healthcare applications. Wireless Communications and Mobile Computing (2021).Google Scholar
- [80] . 2021. Detecting SQL injection Web attacks using ensemble learners and data sampling. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 27–34.Google Scholar
- [81] . 2022. Semantic query-featured ensemble learning model for SQL-injection attack detection in IoT-Ecosystems. In IEEE Transactions on Reliability 71, 2 (2022), 1057--1074.
DOI: Google ScholarCross Ref - [82] . 2021. Deep learning on information retrieval using agent flow email reply system for IoT enterprise customer service. Journal of Ambient Intelligence and Humanized Computing (2021), 1–14.Google Scholar
- [83] . 2022. Federated learning-based anomaly detection for IoT security attacks. In IEEE Internet of Things Journal 9, 4 (2022), 2545--2554.
DOI: Google ScholarCross Ref - [84] . 2021. Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications 61 (2021), 102939.Google ScholarDigital Library
- [85] . 2021. SmartDetour: Defending blackhole and content poisoning attacks in IoT NDN networks. IEEE Internet of Things Journal 8, 15 (2021), 12119--12136.
DOI: Google ScholarCross Ref - [86] . 2021. A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Transactions on Emerging Telecommunications Technologies 32, 6 (2021), e4112.Google Scholar
- [87] . 2022. A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. Computers and Electrical Engineering 99 (2022). Google ScholarDigital Library
Index Terms
- A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security
Recommendations
Blockchain-Driven Hybrid Model for IoT Authentication
Internet of Things, Smart Spaces, and Next Generation Networks and SystemsAbstractThe Internet of Things has the potential to play a significant part in the ongoing Industrial Revolution. Machines, devices, and sensors are able to connect and communicate with each other via networks. These Internet of Things devices generate an ...
IoT security: challenges and solutions for mining
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingThe Internet of Things (IoT) paradigm with its vast range of heterogeneous connecting technologies heralds a new era for internet research, especially given that this explosion in connectivity for devices or `things' is not without risk. Scholars ...
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
AbstractWith the rapid increase in the number of Internet of Things (IoT) devices in recent years, massive amounts of sensitive IoT data are being generated and transmitted over the Internet. Despite its growing adoption in various fields, IoT ...
Comments