Online citations, reference lists, and bibliographies.

DecAuth: Decentralized Authentication Scheme For IoT Device Using Ethereum Blockchain

Bhabendu Kumar Mohanta, Anisha Sahoo, Shibasis Patel, Soumyashree S. Panda, Debasish Jena, Debasis Gountia
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Internet of Things (IoT) has lots of attention in the last decade. The connected IoT devices are more than the total world population. Due to its low cost, easy to deploy, and simple to implement, application areas are large like smart city, smart home, smart transportation, environment monitoring, agriculture and many more. There exists some security and privacy challenges in IoT system. The device identification is one of the challenges in any IoT application. Authentication is one of the processes to identify the device. Though some work has been done on this problem, most of these are using a centralized system. In this paper, we have proposed a distributed authentication system using the Blockchain technology The implementation of the proposed authentication is done on Ethereum platform for its better results in order to justify it as a superior scheme.
This paper references
10.1109/COMST.2018.2852480
Network Layer Aspects of Permissionless Blockchains
T. Neudecker (2019)
10.1016/j.comnet.2014.11.008
Security, privacy and trust in Internet of Things: The road ahead
S. Sicari (2015)
10.1016/j.ins.2019.01.073
A lightweight machine learning-based authentication framework for smart IoT devices
P. Punithavathi (2019)
10.1016/j.comnet.2012.12.018
On the features and challenges of security and privacy in distributed internet of things
R. Roman (2013)
10.1109/JIOT.2018.2847705
Smart Contract-Based Access Control for the Internet of Things
Yuanyu Zhang (2019)
10.1016/j.future.2017.11.022
IoT security: Review, blockchain solutions, and open challenges
M. Khan (2018)
10.1016/j.jnca.2018.10.019
Blockchain's adoption in IoT: The challenges, and a way forward
Imran Makhdoom (2019)
10.1504/IJAIP.2017.10003568
A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices
Aakanksha Tewari (2017)
10.1109/MC.2018.2381119
Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
J. Chauhan (2018)
10.1007/978-3-319-94370-1_11
Using Blockchain for IOT Access Control and Authentication Management
Abdallah Zoubir Ourad (2018)
10.1109/COMST.2018.2863956
Security Services Using Blockchains: A State of the Art Survey
Tara Salman (2019)
10.1109/JIOT.2018.2846299
Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
Prosanta Gope (2019)
10.1109/JIOT.2018.2860592
Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices
Fangmin Sun (2019)
10.1016/j.future.2013.01.010
Internet of Things (IoT): A vision, architectural elements, and future directions
J. Gubbi (2013)
10.1016/j.future.2017.09.042
A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity
Zhiwei Wang (2018)
10.1109/ACCESS.2019.2907599
An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains
Pin Lv (2019)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar