BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices
Abstract
:1. Introduction
- We design an IoT blockchain architecture to store device identity information in a distributed ledger.
- We propose a BCoT Gateway to facilitate the recording of authentication transactions in a blockchain network without modifying existing device hardware or applications.
- We propose a new device recognition model that is suitable for blockchain-based identity authentication, where a novel device traffic flow feature selection method is proposed.
- We develop a BCoT Sentry framework as a reference implementation of our proposed method.
2. Motivation and Related Work
2.1. IoT Network Security
2.2. Related Work
2.2.1. Blockchain and Smart Contract
2.2.2. Security Challenges in IoT
- Mnif et al. [30] propose a new method adapted to resource-constrained wireless sensor networks, where only legitimate users can access node resources, and unauthorized users are denied access.
- Markus et al. [31] propose a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices to minimize damage resulting from their compromise.
2.2.3. Convergence of Blockchain and IoT
- (1)
- Decentralization. Distributed nodes maintain data consistency on the blockchain network through a consensus algorithm without third parties.
- (2)
- Persistency. In blockchain, invalid transactions will not be identified by miners, so transactions that have been confirmed cannot be deleted.
- (3)
- Auditability. Each transaction can be easily verified and tracked for every packaged transaction on the blockchain and can point to the transaction packaged in the previous block.
3. The BCoT Sentry Methodology
3.1. BCoT Sentry Architecture
- (1)
- IoT Physic Network: An IoT physic network is a communication network composed of numerous tiny devices with limited capabilities. The IoT physic network can operate in an independent environment, or it can be connected to the Internet through a gateway.
- (2)
- Blockchain Network: In our framework, the blockchain network is a consortium chain. Nodes communicate with the blockchain through a reserved interface. Transaction logs and device records are maintained on the blockchain by each node and are decentralized and cannot be tampered with.
- (3)
- Cloud Applications: In a smart city scenario, IoT devices are typically utilized by cloud-based applications, such as smart transportation, smart home, and telemedicine. Our framework should also support the blockchain-based device authentication across the lower layer and upper layer of cloud applications.
- (4)
- BCoT Gateway: In our framework, the BCoT Gateway is essentially an IoT gateway [54] with blockchain node capability. BCoT Gateway can provide the functionalities of protocol conversion and device management:
- (5)
- Traffic Flow Analyzing: This module monitors the behavior of an individual IoT device and sends a device traffic flow feature to the Smart Contract via blockchain transaction.
- (6)
- Smart Contract and Interface: The device identity authentication mechanism described in this paper is realized by a single smart contract. The IoT device’s identity information and related operations are defined in smart contracts and triggered by blockchain transactions. The smart contract enforces the access permission policies through defined operations and ensures that only authorized entities could modify or access the device identity information.
3.2. Decentralized Identity Authentication Mechanism
3.3. Device Authentication Model
3.3.1. Device Fingerprint
3.3.2. Weight Assignment
- (1)
- Discrimination. Discrimination here refers to the degree of association between a feature and corresponding category.
- (2)
- Stability. Stability refers to the change of a feature in the same category. A device may be classified into the wrong category due to poor stability of its feature field. Therefore, the stability of each feature needs to be considered.
- (3)
- Sensitivity. Sensitivity is defined as a measure of how sensitive the feature is to change. Features with a lower frequency should be sensitive to changes; on the contrary, higher frequency features are relatively insensitive to changes.
- (4)
- Weight of Fingerprints. In summary, the weight corresponding to a type of device C is given by:
3.3.3. Arbitration
- (1)
- Register: To identify the type of a new device that is discovered in the network, the weighted distance between the devices is needed, and devices of the same type will have a minimum weighted distance. For a newly connected device and a certain type of device , the distance vector will be:
- (2)
- Fraud Detection: To verify and confirm the identity of registered IoT devices. Let be the fraud indicator, which is used to determine whether the identity of a registered device has been fraudulently used.
4. Implementation
4.1. Device Registration
4.2. Smart Contract Interface
4.3. Blockchain Network
4.4. Smart Contract
5. Evaluation
5.1. Dataset
5.2. Evaluation Setting
5.3. Result Analysis
5.4. Time Complexity
6. Conclusions and Future Works
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Lu, Y.; Da Xu, L. Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet Things J. 2018, 6, 2103–2115. [Google Scholar] [CrossRef]
- Ahmed, H.I.; Nasr, A.A.; Abdel-Mageid, S.; Aslan, H.K. A survey of IoT security threats and defenses. Int. J. Adv. Comput. Res. 2019, 9, 325–350. [Google Scholar] [CrossRef]
- Khelloufi, A.; Ning, H.; Dhelim, S.; Qiu, T.; Ma, J.; Huang, R.; Atzori, L. A Social Relationships Based Service Recommendation System For SIoT Devices. IEEE Internet Things J. 2020, 8, 1859–1870. [Google Scholar] [CrossRef]
- Nižetić, S.; Šolić, P.; González-de, D.L.D.I.; Patrono, L. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J. Clean. Prod. 2020, 274, 122877. [Google Scholar] [CrossRef] [PubMed]
- Li, X.; Wang, H.; Dai, H.N.; Wang, Y.; Zhao, Q. An analytical study on eavesdropping attacks in wireless nets of things. Mob. Inf. Syst. 2016, 2016, 4313475. [Google Scholar] [CrossRef] [Green Version]
- Sapienza, A.; Bessi, A.; Damodaran, S.; Shakarian, P.; Lerman, K.; Ferrara, E. Early warnings of cyber threats in online discussions. In Proceedings of the 2017 IEEE International Conference on Data Mining Workshops (ICDMW), New Orleans, LA, USA, 18–21 November 2017; pp. 667–674. [Google Scholar]
- Hammi, M.T.; Hammi, B.; Bellot, P.; Serhrouchni, A. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. 2018, 78, 126–142. [Google Scholar] [CrossRef]
- Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [Google Scholar] [CrossRef]
- Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Dai, H.N.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A survey. IEEE Internet Things J. 2019, 6, 8076–8094. [Google Scholar] [CrossRef] [Green Version]
- Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
- Farwell, J.P.; Rohozinski, R. Stuxnet and the future of cyber war. Survival 2011, 53, 23–40. [Google Scholar] [CrossRef]
- Maggi, F.; Quarta, D.; Pogliani, M.; Polino, M.; Zanchettin, A.M.; Zanero, S. Rogue Robots: Testing the Limits of an Industrial Robot’s Security; Trend Micro, Politecnico di Milano, Tech. Rep; Trend Micro: San Francisco, CA, USA, 2017. [Google Scholar]
- Quarta, D.; Pogliani, M.; Polino, M.; Maggi, F.; Zanchettin, A.M.; Zanero, S. An experimental security analysis of an industrial robot controller. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 268–286. [Google Scholar]
- Gope, P.; Das, A.K.; Kumar, N.; Cheng, Y. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2019, 15, 4957–4968. [Google Scholar] [CrossRef]
- Laufs, J.; Borrion, H.; Bradford, B. Security and the smart city: A systematic review. Sustain. Cities Soc. 2020, 55, 102023. [Google Scholar] [CrossRef]
- Mohit, P.; Amin, R.; Biswas, G. Design of authentication protocol for wireless sensor network-based smart vehicular system. Veh. Commun. 2017, 9, 64–71. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Technical Report, Manubot. 2019. Available online: https://git.dhimmel.com/bitcoin-whitepaper/ (accessed on 9 May 2021).
- Chohan, U.W. The double spending problem and cryptocurrencies. Available at SSRN 3090174. 2017. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3090174 (accessed on 9 May 2021).
- Lamport, L.; Shostak, R.; Pease, M. The Byzantine Generals Problem. In Concurrency: The Works of Leslie Lamport; Association for Computing Machinery: New York, NY, USA, 2019; pp. 203–226. [Google Scholar]
- Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, W.; Chen, X.; Weng, J.; Imran, M. An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 2020, 105, 475–491. [Google Scholar] [CrossRef] [Green Version]
- Luu, L.; Chu, D.H.; Olickel, H.; Saxena, P.; Hobor, A. Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 254–269. [Google Scholar]
- Herlihy, M. Atomic cross-chain swaps. In Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, Egham, UK, 23–27 July 2018; pp. 245–254. [Google Scholar]
- Kokoris-Kogias, E.; Jovanovic, P.; Gasser, L.; Gailly, N.; Syta, E.; Ford, B. Omniledger: A secure, scale-out, decentralized ledger via sharding. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 583–598. [Google Scholar]
- Karlsson, K.; Jiang, W.; Wicker, S.; Adams, D.; Ma, E.; van Renesse, R.; Weatherspoon, H. Vegvisir: A partition-tolerant blockchain for the internet-of-things. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2–6 July 2018; pp. 1150–1158. [Google Scholar]
- Xiao, L.; Wan, X.; Lu, X.; Zhang, Y.; Wu, D. IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 2018, 35, 41–49. [Google Scholar] [CrossRef]
- Conti, M.; Dehghantanha, A.; Franke, K.; Watson, S. Internet of Things security and forensics: Challenges and opportunities. Future Gener. Comput. Syst. 2018, 78, 544–546. [Google Scholar] [CrossRef] [Green Version]
- Mnif, A.; Cheikhrouhou, O.; Jemaa, M.B. An ID-based user authentication scheme for Wireless Sensor Networks using ECC. In Proceedings of the ICM 2011 Proceeding, Hammamet, Tunisia, 19–22 December 2011; pp. 1–9. [Google Scholar]
- Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, A.R.; Tarkoma, S. Iot sentinel: Automated device-type identification for security enforcement in iot. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; pp. 2177–2184. [Google Scholar]
- Peng, L.; Hu, A.; Zhang, J.; Jiang, Y.; Yu, J.; Yan, Y. Design of a hybrid RF fingerprint extraction and device classification scheme. IEEE Internet Things J. 2018, 6, 349–360. [Google Scholar] [CrossRef]
- Venkatraman, S.; Kumar, P.A.R. Improving Adhoc wireless sensor networks security using distributed automaton. Clust. Comput. 2019, 22, 14551–14557. [Google Scholar] [CrossRef]
- Stellios, I.; Kotzanikolaou, P.; Psarakis, M.; Alcaraz, C.; Lopez, J. A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 2018, 20, 3453–3495. [Google Scholar] [CrossRef]
- Yakubov, A.; Shbair, W.; Wallbom, A.; Sanda, D. A blockchain-based pki management framework. In Proceedings of the First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) Colocated with IEEE/IFIP NOMS 2018, Tapei, Tawain, 23–27 April 2018. [Google Scholar]
- Singla, A.; Bertino, E. Blockchain-Based PKI Solutions for IoT. In Proceedings of the 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA, USA, 18–20 October 2018; pp. 9–15. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Gervais, A.; Karame, G.O.; Wüst, K.; Glykantzis, V.; Ritzdorf, H.; Capkun, S. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 3–16. [Google Scholar]
- King, S.; Nadal, S. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-Publ. Pap. August 2012, 19, 1. [Google Scholar]
- Castro, M.; Liskov, B. Practical byzantine fault tolerance. OSDI 1999, 99, 173–186. [Google Scholar]
- Liu, Y.; Wang, K.; Lin, Y.; Xu, W. LightChain: A Lightweight Blockchain System for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2019, 15, 3571–3581. [Google Scholar] [CrossRef]
- Koshy, P.; Babu, S.; Manoj, B. Sliding window blockchain architecture for internet of things. IEEE Internet Things J. 2020, 7, 3338–3348. [Google Scholar] [CrossRef]
- Ellul, J.; Pace, G.J. Alkylvm: A virtual machine for smart contract blockchain connected internet of things. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–4. [Google Scholar]
- Gochhayat, S.P.; Bandara, E.; Shetty, S.; Foytik, P. Yugala: Blockchain Based Encrypted Cloud Storage for IoT Data. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 483–489. [Google Scholar]
- Axon, L.; Goldsmith, M. PB-PKI: A Privacy-aware Blockchain-based PKI. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications—Volume 4: SECRYPT, (ICETE 2017), INSTICC, SciTePress, Madrid, Spain, 24–26 July 2017; pp. 311–318. [Google Scholar] [CrossRef]
- Cruz, J.P.; Kaji, Y.; Yanai, N. RBAC-SC: Role-based access control using smart contract. IEEE Access 2018, 6, 12240–12251. [Google Scholar] [CrossRef]
- Bouras, M.A.; Xia, B.; Abuassba, A.O.; Ning, H.; Lu, Q. IoT-CCAC: A blockchain-based consortium capability access control approach for IoT. PeerJ Comput. Sci. 2021, 7, e455. [Google Scholar] [CrossRef] [PubMed]
- Cui, H.; Chen, Z.; Xi, Y.; Chen, H.; Hao, J. IoT data management and lineage traceability: A blockchain-based solution. In Proceedings of the 2019 IEEE/CIC International Conference on Communications Workshops in China (ICCC Workshops), Changchun, China, 11–13 August 2019; pp. 239–244. [Google Scholar]
- Bouras, M.A.; Lu, Q.; Dhelim, S.; Ning, H. A Lightweight Blockchain-Based IoT Identity Management Approach. Future Internet 2021, 13, 24. [Google Scholar] [CrossRef]
- Omar, A.S.; Basir, O. Capability-based non-fungible tokens approach for a decentralized AAA framework in IoT. In Blockchain Cybersecurity, Trust and Privacy; Springer: Berlin/Heidelberg, Germany, 2020; pp. 7–31. [Google Scholar]
- Guin, U.; Cui, P.; Skjellum, A. Ensuring proof-of-authenticity of iot edge devices using blockchain technology. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1042–1049. [Google Scholar]
- Alblooshi, M.; Salah, K.; Alhammadi, Y. Blockchain-based ownership management for medical IoT (MIoT) devices. In Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, 18–19 November 2018; pp. 151–156. [Google Scholar]
- Dorri, A.; Kanhere, S.S.; Jurdak, R. Towards an Optimized BlockChain for IoT. In Proceedings of the 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, USA, 18–21 April 2017; pp. 173–178. [Google Scholar]
- Zhu, Q.; Wang, R.; Chen, Q.; Liu, Y.; Qin, W. Iot gateway: Bridgingwireless sensor networks into internet of things. In Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, 11–13 December 2010; pp. 347–352. [Google Scholar]
- Reshef, D.N.; Reshef, Y.A.; Finucane, H.K.; Grossman, S.R.; McVean, G.; Turnbaugh, P.J.; Lander, E.S.; Mitzenmacher, M.; Sabeti, P.C. Detecting novel associations in large data sets. Science 2011, 334, 1518–1524. [Google Scholar] [CrossRef] [Green Version]
- Kumar, A.; Lim, T.J. Early detection of Mirai-like IoT bots in large-scale networks through sub-sampled packet traffic analysis. In Future of Information and Communication Conference; Springer: Berlin/Heidelberg, Germany, 2019; pp. 847–867. [Google Scholar]
- Scapy 2.4.5. Available online: https://scapy.readthedocs.io/en/latest/introduction.html (accessed on 30 March 2021).
- Web3.py 5.17.0. Available online: https://web3py.readthedocs.io/en/stable/ (accessed on 30 March 2021).
- Solidity 0.8.0. Available online: https://docs.soliditylang.org/en/v0.8.0/ (accessed on 30 March 2021).
Comparison Item | Single CA Model | Blockchain-Based Model |
---|---|---|
How to Build Trust? | Based on users subjective trust | Based on mathematics |
Trust Anchor | Public key of the CA | Cryptography method and Consensus mechanism |
Vulnerable to SPOF | Yes | Naturally immune |
Vulnerable to Replay Attack? | Additional applications need to be deployed | Each of transactions is verified by timestamp, nonce, transaction ID, etc. |
Type | Features | Representation |
---|---|---|
Link layer protocol (2) | ARP/LLC | packet number |
Network layer protocol (3) | IP/ICMP/EAPoL | packet number |
Transport layer protocol (2) | TCP/UDP | packet number |
Application layer protocol (9) | HTTP/HTTPS/DHCP /BOOTP/SSDP/DNS /MDNS/NTP/TELNET | packet number |
– | Packet length | number of packets in a pcap file |
Components | Description |
---|---|
Discrimination | The association between a feature and corresponding category |
Stability | The stability of a feature in the same category |
Sensitivity | The sensitivity of the feature to change |
Protocols | Discrimination | Stability |
---|---|---|
ARP | 0.8567 | 0.5540 |
LLC | 0.5555 | 0.8068 |
IP | 0.8741 | 0.3977 |
ICMP | 0.6492 | 0.8519 |
EAPoL | 0.8516 | 0.6648 |
TCP | 0.8869 | 0.5943 |
UDP | 0.8086 | 0.5039 |
HTTP | 0.8926 | 0.8501 |
HTTPS | 0.9285 | 0.8019 |
DHCP | 0.8432 | 0.5693 |
BOOTP | 0.8432 | 0.5693 |
DNS | 0.7929 | 0.6232 |
NTP | 0.7925 | 0.7318 |
TELNET | 0.0000 | 1 |
Packet length | 0.9292 | 0.7661 |
Type | Transaction Cost | Execution Cost |
---|---|---|
Create Contract | 1,487,038 | 1,080,766 |
Add Device Fingerprint | 291,998 | 262,726 |
Modify Device Fingerprint | 160,963 | 131,691 |
Delete Device Fingerprint | 33,301 | 11,261 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gong, L.; Alghazzawi, D.M.; Cheng, L. BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices. Information 2021, 12, 203. https://doi.org/10.3390/info12050203
Gong L, Alghazzawi DM, Cheng L. BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices. Information. 2021; 12(5):203. https://doi.org/10.3390/info12050203
Chicago/Turabian StyleGong, Liangqin, Daniyal M. Alghazzawi, and Li Cheng. 2021. "BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices" Information 12, no. 5: 203. https://doi.org/10.3390/info12050203
APA StyleGong, L., Alghazzawi, D. M., & Cheng, L. (2021). BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices. Information, 12(5), 203. https://doi.org/10.3390/info12050203