Cargando…

Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain

Digital transformation has increased its proportion in the last few years and the Internet-on-Things (IoT) domain is not an exception, with more and more devices or sensors being connected to the Internet and transmitting different types of data. Usually, being part of more complex IT systems, it mu...

Descripción completa

Detalles Bibliográficos
Autores principales: Nita, Stefania Loredana, Mihailescu, Marius Iulian
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9921873/
https://www.ncbi.nlm.nih.gov/pubmed/36772410
http://dx.doi.org/10.3390/s23031371
_version_ 1784887416293687296
author Nita, Stefania Loredana
Mihailescu, Marius Iulian
author_facet Nita, Stefania Loredana
Mihailescu, Marius Iulian
author_sort Nita, Stefania Loredana
collection PubMed
description Digital transformation has increased its proportion in the last few years and the Internet-on-Things (IoT) domain is not an exception, with more and more devices or sensors being connected to the Internet and transmitting different types of data. Usually, being part of more complex IT systems, it must be ensured that the IoT devices transmitting the data are authenticated components of the system before sending the data to a storage server. However, usually, IoT devices have limited computing power, therefore all of the work that they are doing should not be too expensive in terms of computations. This is the case for the authentication mechanism, too. Having this context, in this paper, we propose an authentication mechanism for IoT devices based on elliptic curves, which are known as having a low computational cost compared to other techniques used in cryptography that provide the same level of security. The proposed system includes a blockchain network that will verify the identity of the device which tries to connect within the system to send the data to the storage server, a process that will be made together with the storage server. Once the identity is valid, the blockchain records the transaction and the storage server initiates the data transmission process. Besides including a lightweight authentication mechanism, the proposed method has several other important properties due to it using the blockchain network. Compared to the related work that we analyzed, we show that the proposed authentication mechanism is secure against common attacks designed for IoT devices. The performance analysis shows that the authentication query made by the IoT device takes place in less than a second on both a MSP430F1611 microcontroller and a MICAz sensor.
format Online
Article
Text
id pubmed-9921873
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-99218732023-02-12 Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain Nita, Stefania Loredana Mihailescu, Marius Iulian Sensors (Basel) Article Digital transformation has increased its proportion in the last few years and the Internet-on-Things (IoT) domain is not an exception, with more and more devices or sensors being connected to the Internet and transmitting different types of data. Usually, being part of more complex IT systems, it must be ensured that the IoT devices transmitting the data are authenticated components of the system before sending the data to a storage server. However, usually, IoT devices have limited computing power, therefore all of the work that they are doing should not be too expensive in terms of computations. This is the case for the authentication mechanism, too. Having this context, in this paper, we propose an authentication mechanism for IoT devices based on elliptic curves, which are known as having a low computational cost compared to other techniques used in cryptography that provide the same level of security. The proposed system includes a blockchain network that will verify the identity of the device which tries to connect within the system to send the data to the storage server, a process that will be made together with the storage server. Once the identity is valid, the blockchain records the transaction and the storage server initiates the data transmission process. Besides including a lightweight authentication mechanism, the proposed method has several other important properties due to it using the blockchain network. Compared to the related work that we analyzed, we show that the proposed authentication mechanism is secure against common attacks designed for IoT devices. The performance analysis shows that the authentication query made by the IoT device takes place in less than a second on both a MSP430F1611 microcontroller and a MICAz sensor. MDPI 2023-01-26 /pmc/articles/PMC9921873/ /pubmed/36772410 http://dx.doi.org/10.3390/s23031371 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Nita, Stefania Loredana
Mihailescu, Marius Iulian
Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
title Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
title_full Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
title_fullStr Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
title_full_unstemmed Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
title_short Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain
title_sort elliptic curve-based query authentication protocol for iot devices aided by blockchain
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9921873/
https://www.ncbi.nlm.nih.gov/pubmed/36772410
http://dx.doi.org/10.3390/s23031371
work_keys_str_mv AT nitastefanialoredana ellipticcurvebasedqueryauthenticationprotocolforiotdevicesaidedbyblockchain
AT mihailescumariusiulian ellipticcurvebasedqueryauthenticationprotocolforiotdevicesaidedbyblockchain