Abstract
Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.
Similar content being viewed by others
References
Adeel A, Ali M, Khan AN, Khalid T, Rehman F, Jararweh Y, Shuja J (2019) A multi-attack resilient lightweight iot authentication scheme. Transactions on Emerging Telecommunications Technologies, pp e3676
Ahuja SP, Wheeler N (2020) Architecture of fog-enabled and cloud-enhanced internet of things applications. Int J Cloud Appl Comput (IJCAC) 10(1):1–10
Ali R, Pal AK (2018) An efficient three factor–based authentication scheme in multiserver environment using ecc. Int J Commun Syst 31(4):e3484
Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Futur Gener Comput Syst 84:200–215
Aman MN, Chua KC, Sikdar B (2017) Mutual authentication in iot systems using physical unclonable functions. IEEE Internet Things J 4(5):1327–1340
Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on Computer and communications security, pp 62–73
Berenjian S, Hajizadeh S, Atani RE (2019) An incentive security model to provide fairness for peer-to-peer networks. In: 2019 IEEE Conference on Application, Information and Network Security (AINS). IEEE, pp 71–76
Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from 05–16
Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys & Tutorials
Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043
Das AK, Wazid M, Yannam AR, Rodrigues JJ, Park Y (2019) Provably secure ecc-based device access control and key agreement protocol for iot environment. IEEE Access 7:55382–55397
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29 (2):198–208
Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks 2017
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot) A vision, architectural elements, and future directions. Fut Gen Comput Syst 29(7):1645–1660
Gupta R (2019) Resource provisioning and scheduling techniques of iot based applications in fog computing. Int J Fog Comput (IJFC) 2(2):57–70
Hussain MM, Beg MS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (t-cps) Fog computing for vehicular networks. Int J Softw Sci Comput Intell (IJSSCI) 11(1):47–69
Javaid U, Aman MN, Sikdar B (2018) Blockpro: Blockchain based data provenance and integrity for secure iot environments. In: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, pp 13–18
Kadhim AJ, Seno SAH (2019) Energy-efficient multicast routing protocol based on sdn and fog computing for vehicular networks. Ad Hoc Netw 84:68–81
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference. Springer, pp 388–397
Li D, Deng L, Gupta B, Wang H, Choi C (2019) A novel cnn based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447
Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for iot and its applications. IEEE Trans Sustain Comput 2(4):359–370
Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for iot environment. IEEE Internet Things J 6(6):9762–9773
Maurya AK, Sastry VN (2017) Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things. Information 8(4):136
Naghizadeh A, Berenjian S, Razeghi B, Shahanggar S, Pour NR (2015) Preserving receiver’s anonymity for circular structured p2p networks. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, pp 71–76
Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: preserving mutual anonymity for circular p2p networks. Int J Commun Syst 29(3):602–619
Nakamoto S et al (2008) Bitcoin: A peer-to-peer electronic cash system
Pena-lópez I et al (2005) Itu internet report 2005: the internet of things
Psannis KE, Stergiou C, Gupta B (2018) Advanced media-based smart big data on intelligent cloud systems. IEEE Trans Sustain Comput 4(1):77–87
PUB F (1995) Secure hash standard. Public Law 100:235
Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ (2018) Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inf 15(1):457–468
Sethia D, Gupta D, Saran H (2018) Nfc secure element-based mutual authentication and attestation for iot access. IEEE Trans Consum Electron 64(4):470–479
Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing
Stergiou C, Psannis KE, Gupta B, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & iot. Sustain Comput Inf Syst 19:174–184
Tewari A, Gupta B (2017) A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices. Int J Adv Intell Parad 9(2-3):111–121
Tewari A, Gupta B (2020) Security, privacy and trust of different layers in internet-of-things (iots) framework. Fut Gen Comput Syst 108:909–920
Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic iot networks. IEEE Internet Things J 5(1):269–282
Wazid M, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019) Ldakm-eiot: Lightweight device authentication and key management mechanism for edge-based iot deployment. Sensors 19(24):5539
Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen C-M (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108
Xie J, Tang H, Huang T, Yu FR, Xie R, Liu J, Liu Y (2019) A survey of blockchain technology applied to smart cities Research issues and challenges. IEEE Commun Surv Tutorial 21(3):2794–2830
Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Comput Surv (CSUR) 52(3):1–34
Zhou L, Li X, Yeh K-H, Su C, Chiu W (2019) Lightweight iot-based authentication scheme in cloud computing circumstance. Futur Gener Comput Syst 91:244–251
Zhu Q, Loke SW, Trujillo-Rasua R, Jiang F, Xiang Y (2019) Applications of distributed ledger technologies to the internet of things A survey. ACM Comput Surv (CSUR) 52(6):1–34
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: Special Issue on P2P Computing for Beyond 5G Network and Internet-of-Everything
Guest Editors: Prakasam P, Ajayan John, Shohel Sayeed
Appendices
Appendix A
Highlights of proposed protocol
-
To propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology
-
Proposed protocol performs authentication between IoT Device to IoT Device without the involvement of RAC/GWN
-
Proposed protocol registration process is perform through private blockchain with the help of GWN
-
Proposed protocol authentication perform based on the location of the device, which is not proposed in the existing works
-
Proposed protocol performs better performance as well as provides additional features such as location based authentication of IoT Device, IoT Device revocation phase using blockchain and blockchain based registration of IoT Devices respectively
-
Proposed protocol security verification is performs through formal and informal analysis. Formal analysis is perform through Proverif tool, informal analysis is perform through various security assumptions, and also formal security verification is perform through the Random Oracle Model (RoM).
Appendix B
Formal verification of proposed protocol using Proverif tool
The formal security verification of proposed protocol simulated in this section. The Fig. 5 represents declaration of proposed protocol, Fig. 6 represents registration and authentication process, Fig. 7 represents registration and authentication process, Fig. 8 represents Di and Dj queries and Fig. 9 represents proposed protocol queries result.
Rights and permissions
About this article
Cite this article
Vivekanandan, M., V. N., S. & U., S.R. BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 14, 403–419 (2021). https://doi.org/10.1007/s12083-020-00963-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00963-w