Skip to main content
Log in

BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Adeel A, Ali M, Khan AN, Khalid T, Rehman F, Jararweh Y, Shuja J (2019) A multi-attack resilient lightweight iot authentication scheme. Transactions on Emerging Telecommunications Technologies, pp e3676

  2. Ahuja SP, Wheeler N (2020) Architecture of fog-enabled and cloud-enhanced internet of things applications. Int J Cloud Appl Comput (IJCAC) 10(1):1–10

    Google Scholar 

  3. Ali R, Pal AK (2018) An efficient three factor–based authentication scheme in multiserver environment using ecc. Int J Commun Syst 31(4):e3484

    Article  Google Scholar 

  4. Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Futur Gener Comput Syst 84:200–215

    Article  Google Scholar 

  5. Aman MN, Chua KC, Sikdar B (2017) Mutual authentication in iot systems using physical unclonable functions. IEEE Internet Things J 4(5):1327–1340

    Article  Google Scholar 

  6. Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on Computer and communications security, pp 62–73

  7. Berenjian S, Hajizadeh S, Atani RE (2019) An incentive security model to provide fairness for peer-to-peer networks. In: 2019 IEEE Conference on Application, Information and Network Security (AINS). IEEE, pp 71–76

  8. Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from 05–16

  9. Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys & Tutorials

  10. Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043

    Article  Google Scholar 

  11. Das AK, Wazid M, Yannam AR, Rodrigues JJ, Park Y (2019) Provably secure ecc-based device access control and key agreement protocol for iot environment. IEEE Access 7:55382–55397

    Article  Google Scholar 

  12. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29 (2):198–208

    Article  MathSciNet  Google Scholar 

  13. Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks 2017

  14. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot) A vision, architectural elements, and future directions. Fut Gen Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  15. Gupta R (2019) Resource provisioning and scheduling techniques of iot based applications in fog computing. Int J Fog Comput (IJFC) 2(2):57–70

    Article  Google Scholar 

  16. Hussain MM, Beg MS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (t-cps) Fog computing for vehicular networks. Int J Softw Sci Comput Intell (IJSSCI) 11(1):47–69

    Article  Google Scholar 

  17. Javaid U, Aman MN, Sikdar B (2018) Blockpro: Blockchain based data provenance and integrity for secure iot environments. In: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, pp 13–18

  18. Kadhim AJ, Seno SAH (2019) Energy-efficient multicast routing protocol based on sdn and fog computing for vehicular networks. Ad Hoc Netw 84:68–81

    Article  Google Scholar 

  19. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  Google Scholar 

  20. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference. Springer, pp 388–397

  21. Li D, Deng L, Gupta B, Wang H, Choi C (2019) A novel cnn based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447

    Article  Google Scholar 

  22. Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for iot and its applications. IEEE Trans Sustain Comput 2(4):359–370

    Article  Google Scholar 

  23. Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for iot environment. IEEE Internet Things J 6(6):9762–9773

    Article  Google Scholar 

  24. Maurya AK, Sastry VN (2017) Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things. Information 8(4):136

    Article  Google Scholar 

  25. Naghizadeh A, Berenjian S, Razeghi B, Shahanggar S, Pour NR (2015) Preserving receiver’s anonymity for circular structured p2p networks. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, pp 71–76

  26. Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: preserving mutual anonymity for circular p2p networks. Int J Commun Syst 29(3):602–619

    Article  Google Scholar 

  27. Nakamoto S et al (2008) Bitcoin: A peer-to-peer electronic cash system

  28. Pena-lópez I et al (2005) Itu internet report 2005: the internet of things

  29. Psannis KE, Stergiou C, Gupta B (2018) Advanced media-based smart big data on intelligent cloud systems. IEEE Trans Sustain Comput 4(1):77–87

    Article  Google Scholar 

  30. PUB F (1995) Secure hash standard. Public Law 100:235

    Google Scholar 

  31. Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ (2018) Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inf 15(1):457–468

    Article  Google Scholar 

  32. Sethia D, Gupta D, Saran H (2018) Nfc secure element-based mutual authentication and attestation for iot access. IEEE Trans Consum Electron 64(4):470–479

    Article  Google Scholar 

  33. Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing

  34. Stergiou C, Psannis KE, Gupta B, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & iot. Sustain Comput Inf Syst 19:174–184

    Google Scholar 

  35. Tewari A, Gupta B (2017) A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices. Int J Adv Intell Parad 9(2-3):111–121

    Google Scholar 

  36. Tewari A, Gupta B (2020) Security, privacy and trust of different layers in internet-of-things (iots) framework. Fut Gen Comput Syst 108:909–920

    Article  Google Scholar 

  37. Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic iot networks. IEEE Internet Things J 5(1):269–282

    Article  Google Scholar 

  38. Wazid M, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019) Ldakm-eiot: Lightweight device authentication and key management mechanism for edge-based iot deployment. Sensors 19(24):5539

    Article  Google Scholar 

  39. Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen C-M (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108

    Article  Google Scholar 

  40. Xie J, Tang H, Huang T, Yu FR, Xie R, Liu J, Liu Y (2019) A survey of blockchain technology applied to smart cities Research issues and challenges. IEEE Commun Surv Tutorial 21(3):2794–2830

    Article  Google Scholar 

  41. Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Comput Surv (CSUR) 52(3):1–34

    Article  Google Scholar 

  42. Zhou L, Li X, Yeh K-H, Su C, Chiu W (2019) Lightweight iot-based authentication scheme in cloud computing circumstance. Futur Gener Comput Syst 91:244–251

    Article  Google Scholar 

  43. Zhu Q, Loke SW, Trujillo-Rasua R, Jiang F, Xiang Y (2019) Applications of distributed ledger technologies to the internet of things A survey. ACM Comput Surv (CSUR) 52(6):1–34

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srinivasulu Reddy U..

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on P2P Computing for Beyond 5G Network and Internet-of-Everything

Guest Editors: Prakasam P, Ajayan John, Shohel Sayeed

Appendices

Appendix A

Highlights of proposed protocol

  • To propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology

  • Proposed protocol performs authentication between IoT Device to IoT Device without the involvement of RAC/GWN

  • Proposed protocol registration process is perform through private blockchain with the help of GWN

  • Proposed protocol authentication perform based on the location of the device, which is not proposed in the existing works

  • Proposed protocol performs better performance as well as provides additional features such as location based authentication of IoT Device, IoT Device revocation phase using blockchain and blockchain based registration of IoT Devices respectively

  • Proposed protocol security verification is performs through formal and informal analysis. Formal analysis is perform through Proverif tool, informal analysis is perform through various security assumptions, and also formal security verification is perform through the Random Oracle Model (RoM).

Appendix B

Formal verification of proposed protocol using Proverif tool

The formal security verification of proposed protocol simulated in this section. The Fig. 5 represents declaration of proposed protocol, Fig. 6 represents registration and authentication process, Fig. 7 represents registration and authentication process, Fig. 8 represents Di and Dj queries and Fig. 9 represents proposed protocol queries result.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vivekanandan, M., V. N., S. & U., S.R. BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 14, 403–419 (2021). https://doi.org/10.1007/s12083-020-00963-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00963-w

Keywords

Navigation