Visible to the public Blockchain-Based Scheme for Authentication and Capability-Based Access Control in IoT Environment

TitleBlockchain-Based Scheme for Authentication and Capability-Based Access Control in IoT Environment
Publication TypeConference Paper
Year of Publication2020
AuthorsN, Sivaselvan, Bhat K, Vivekananda, Rajarajan, Muttukrishnan
Conference Name2020 11th IEEE Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON)
KeywordsAccess Control, authentication, blockchain, Capability, Human Behavior, human factors, Internet of Things, interoperability, IoT, Metrics, pubcrawl, Scalability, smart contracts, Tamper resistance
AbstractAuthentication and access control techniques are fundamental security elements to restrict access to critical resources in IoT environment. In the current state-of-the-art approaches in the literature, the architectures do not address the security features of authentication and access control together. Besides, they don't completely fulfill the key Internet-of-Things (IoT) features such as usability, scalability, interoperability and security. In this paper, we introduce a novel blockchain-based architecture for authentication and capability-based access control for IoT environment. A capability is a token which contains the access rights authorized to the device holding it. The architecture uses blockchain technology to carry out all the operations in the scheme. It does not embed blockchain technology into the resource-constrained IoT devices for the purpose of authentication and access control of the devices. However, the IoT devices and blockchain are connected by means of interfaces through which the essential communications are established. The authenticity of such interfaces are verified before any communication is made. Consequently, the architecture satisfies usability, scalability, interoperability and security features. We carried out security evaluation for the scheme. It exhibits strong resistance to threats like spoofing, tampering, repudiation, information disclosure, and Denial-of-Service (DoS). We also developed a proof of concept implementation where cost and storage overhead of blockchain transactions are studied.
DOI10.1109/UEMCON51285.2020.9298116
Citation Keyn_blockchain-based_2020