Abstract
Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer networking. Due to limited physical size, IoT sensor nodes must have light-weight authentication protocol. The Internet of Things (IoT) is a collection of various technical elements. It is expected that interworking between heterogeneous terminals, networks, and applications. They will accelerate through the liberalization of the IoT platform. As a result, many technical and administrative security threats will arise in the IoT environment. Sensor node protocols must be light-weight and secure. As IoT devices are used for various purposes, for some devices that require performance, the OS with a high-performance chipset that works, most passwords protocol. However, to turn on / off the lights IoT devices that perform simple tasks such as based on a low-performance chipset with no OS running. If it does not support encryption protocol or certificate, then it is vulnerable, and it does not have enough performance to handle. Therefore, in this paper, Block-chain-based IoT device is proposed to get a more secure authentication scheme.
Similar content being viewed by others
Notes
Mint is a Linux distribution based on Debian and Ubuntu which is easy to use.
References
Huber R, Sommer P, Wattenhofer R (2011) Demo abstract: debugging wireless sensor network simulations with YETI and COOJA. Proceedings of the 10th ACM/IEEE international conference on information processing in sensor networks, pp. 141–142
Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155
Shi W, Kumar N (2015) Peng GongNaveen Chilamkurti, Hangbae Chang, on the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw Appl 8(5):881–885
Li C-T, Lee C-C, Weng C-Y, Chen C-M (2018) Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw Appl 11(1):198–208
Yu Z, Wen J (2017) The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10(4):983–994
Adavoudi-Jolfaei AH, Ashouri-Talouki M, Aghili SF (2017) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw Appl 1–17
Adida B (2008) Sessionlock: securing web sessions against eavesdropping. In Proceedings of the 17th international conference on world wide web, pp. 517–524
Ullah A, Sehr I, Akbar M, Ning H (2018) FoG assisted secure De-duplicated data dissemination in smart healthcare IoT. 2018 IEEE international conference on smart internet of things, pp. 166–171
Gupta BB, Joshi RC, Misra M (2009) An efficient analytical solution to thwart DDoS attacks in public domain. In Proceedings of the international conference on advances in computing, communication and control, pp. 503–509
Kassim MRM, Harun AN, Yusoff IM, Mat I, Kuen CP, Rahmad N (2017) "Applications of wireless sensor networks in shiitake mushroom cultivation. 2017 Eleventh international conference on sensing technology, pp. 1–6
Phaladisailoed T, Numnonda T (2018) Machine learning models comparison for bitcoin Price prediction. 2018 10th international conference on information technology and electrical engineering, pp. 506–511
Cai C, Zheng Y, Wang C (2018) Leveraging crowdsensed data streams to discover and sell knowledge: a secure and efficient realization. 2018 IEEE 38th international conference on distributed computing systems, pp. 589–599
Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work Blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 3–16
Oh B, Park H (2007) An E-commerce model using peer-to-peer technology and personal blog. The 9th international conference on advanced communication technology, pp. 739–741
Park B-j, Lee T-j, Kwak J (2017) Blockchain-based IoT device authentication scheme. J Korea Inst Inf Secur Cryptol 27(2):343–351
Letsoalo E, Ojo S (2016) Survey of media access control address spoofing attacks detection and prevention techniques in wireless networks. IST-Africa Week Conference
Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655–663
Zhang XM, He GJ, Zhang ZM, Peng Y, Long TF (2017) Spectral-spatial multi-feature classification of remote sensing big data based on a random forest classifier for land cover mapping. Clust Comput 20(3):2311–2321
Kim S, Kim M, Kim KJ, Choi B, Chung J (2017) A scheme of AR-based personalized interactive broadcasting service in terrestrial digital broadcasting system. Clust Comput 20(3):2349–2354
Vega-Rodríguez MA, Santander-Jiménez S (2017) Parallelism-based approaches in computational biology: a view from diverse case studies. Clust Comput 20(3):1865–1867
da Conceição RM, Lobato RS, Manacero A, Spolon R, Cavenaghi MA (2017) μTESLA protocol in vehicular networks. 12th Iberian conference on information systems and technologies, pp. 1–6
Blackshear S, Verma RM (2010) R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks. In Proceedings of the 2010 ACM symposium on applied computing, pp. 1985–1992
Barnat J, Brim L, Stříbrná J (2009) Distributed LTL model-checking in SPIN. In Proceedings of the 8th international SPIN workshop on model checking of software, pp. 200–216
Jang B, Lee K (2006) SNEP implementation on SPINS secure protocol. 2006 Conference of The Institute of Electronics Engineers of Korea, pp. 471–472
Ren J, Li Y, Li T (2009) Routing-based source-location privacy in wireless sensor networks", ICC '09. IEEE international conference on, pp. 1–5
Kiayias A, Panagiotakos G 2015 Speed-Security Tradeoffs in Blockchain Protocols
Acknowledgements
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (NRF-2017R1A2B1003394).
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection: Special on P2P Computing for Intelligence of Things
Guest Editors: Sunmoon Jo, Jieun Lee, Jungsoo Han, and Supratip Ghose
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hong, S. P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw. Appl. 13, 579–589 (2020). https://doi.org/10.1007/s12083-019-00739-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00739-x