Skip to main content

IoT Security Access Authentication Method Based on Blockchain

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2019)

Abstract

With the rapid development of Internet of Things (IoT), The IoT terminal are diversified, and the attack points available to attackers are also diversified, and most IoT terminal are more vulnerable to attacks because they are less secure. In order to achieve secure access of IoT terminal, ensure the legality of IoT terminal accessing the network, improve the security of terminal entering the network and reduce the security risks that IoT terminal may be exposed to when accessing the platform. This paper proposes a secure method to access to the IoT, which is to use the blockchain to store and verify the fingerprint information of the terminal, thereby improving the security of the IoT terminal accessing the cloud. And this paper also proposes a method to store the fingerprint blockchain of the terminal in the IoT terminal, and then verify the collected fingerprint information through the data in the blockchain to ensure the credibility of the fingerprint information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, pp. 839–858. IEEE (2016)

    Google Scholar 

  2. Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds.) Europe and MENA Cooperation Advances in Information and Communication Technologies. AISC, vol. 520, pp. 523–533. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46568-5_53

    Chapter  Google Scholar 

  3. Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: A new blockchain-based access control framework for the internet of things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)

    Article  Google Scholar 

  4. Di Francesco Maesa, D., Mori, P., Ricci, L.: Blockchain based access control. In: Chen, L.Y., Reiser, H.P. (eds.) DAIS 2017. LNCS, vol. 10320, pp. 206–220. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59665-5_15

    Chapter  Google Scholar 

  5. Le, T., Mutka, M.W: CapChain: a privacy preserving access control framework based on blockchain for pervasive environments. In: 2018 IEEE International Conference on Smart Computing (2018)

    Google Scholar 

  6. Pinno, O.J.A., Gregio, A.R.A., De Bona, L.C.E.: ControlChain: blockchain as a central enabler for access control authorizations in the IoT. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, pp. 1–6. IEEE (2017)

    Google Scholar 

  7. Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized BlockChain for IoT. In: 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, pp. 173–178. IEEE (2017)

    Google Scholar 

  8. Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)

    Article  Google Scholar 

  9. Lunardi, R.C., Michelin, R.A., Neu, C.V., Zorzo, A.F.: Distributed access control on IoT ledger-based architecture. In: 2018 IEEE/IFIP Network Operations and Management Symposium, NOMS 2018, Taipei, pp. 1–7. IEEE (2018)

    Google Scholar 

  10. Ourad, A.Z., Belgacem, B., Salah, K.: Using blockchain for IOT access control and authentication management. In: Georgakopoulos, D., Zhang, L.-J. (eds.) ICIOT 2018. LNCS, vol. 10972, pp. 150–164. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94370-1_11

    Chapter  Google Scholar 

  11. Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., Wan, J.: Smart contract-based access control for the internet of things. IEEE Internet Things J. 6(2), 1594–1605 (2019)

    Article  Google Scholar 

  12. Bao, Z., Shi, W., He, D., Chood, K.K.R.: A three-tier blockchain-based IoT security architecture (2018)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Key R&D Program of China (2017YFB0802703), National Natural Science Foundation of China grant (U1836205), Major Scientific and Technological Special Project of Guizhou Province (20183001), Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ014), Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ019) and Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ022).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cheng, Y., Lei, M., Chen, S., Fang, Z., Yang, S. (2019). IoT Security Access Authentication Method Based on Blockchain. In: Gui, G., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 302. Springer, Cham. https://doi.org/10.1007/978-3-030-36405-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36405-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36404-5

  • Online ISBN: 978-3-030-36405-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics