TY - GEN
T1 - A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes
AU - Almadhoun, Randa
AU - Kadadha, Maha
AU - Alhemeiri, Maya
AU - Alshehhi, Maryam
AU - Salah, Khaled
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2019/1/14
Y1 - 2019/1/14
N2 - These days, IoT devices are deployed at a massive scale, with Cisco predicting 20 billion devices by the year 2020. As opposed to endpoint devices, IoT devices are resource-constrained devices, incapable of securing and defending themselves, and can be easily hacked and compromised. Fog computing can augment such capacity limitations by providing localized compute, storage, and networking for a group of IoT devices. As fog nodes are deployed in close proximity to IoT devices, fog computing can be more effective than cloud computing. Furthermore, Blockchain has emerged as technology with capabilities to provide secure management, authentication and access to IoT devices and their data, in decentralized manner with high trust, integrity, and resiliency. In this paper, we propose a user authentication scheme using blockhain-enabled fog nodes in which fog nodes interface to Ethereum smart contracts to authenticate users to access IoT devices. The fog nodes are used to provide scalability to the system by relieving the IoT devices from carrying out heavy computation involving tasks related to authentication and communicating with the blockchain. We describe system components, architecture and design, and we discuss key aspects related to security analysis, functionality, testing and implementation of the smart contracts. The full code of the smart contracts for authentication registry, lists, rules and logic is also made publicly available at Github.
AB - These days, IoT devices are deployed at a massive scale, with Cisco predicting 20 billion devices by the year 2020. As opposed to endpoint devices, IoT devices are resource-constrained devices, incapable of securing and defending themselves, and can be easily hacked and compromised. Fog computing can augment such capacity limitations by providing localized compute, storage, and networking for a group of IoT devices. As fog nodes are deployed in close proximity to IoT devices, fog computing can be more effective than cloud computing. Furthermore, Blockchain has emerged as technology with capabilities to provide secure management, authentication and access to IoT devices and their data, in decentralized manner with high trust, integrity, and resiliency. In this paper, we propose a user authentication scheme using blockhain-enabled fog nodes in which fog nodes interface to Ethereum smart contracts to authenticate users to access IoT devices. The fog nodes are used to provide scalability to the system by relieving the IoT devices from carrying out heavy computation involving tasks related to authentication and communicating with the blockchain. We describe system components, architecture and design, and we discuss key aspects related to security analysis, functionality, testing and implementation of the smart contracts. The full code of the smart contracts for authentication registry, lists, rules and logic is also made publicly available at Github.
KW - Authentication
KW - Blockchain
KW - Edge Computing
KW - Fog Computing
KW - IoT
KW - IoT Security
UR - http://www.scopus.com/inward/record.url?scp=85061929935&partnerID=8YFLogxK
U2 - 10.1109/AICCSA.2018.8612856
DO - 10.1109/AICCSA.2018.8612856
M3 - Conference contribution
AN - SCOPUS:85061929935
T3 - Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA
BT - 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications, AICCSA 2018
PB - IEEE Computer Society
T2 - 15th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2018
Y2 - 28 October 2018 through 1 November 2018
ER -