Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

المؤلفون المشاركون

Javaid, Uzair
Jameel, Furqan
Javaid, Umair
Raza Khan, Muhammad Toaha
Jäntti, Riku

المصدر

Mobile Information Systems

العدد

المجلد 2020، العدد 2020 (31 ديسمبر/كانون الأول 2020)، ص ص. 1-13، 13ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2020-10-28

دولة النشر

مصر

عدد الصفحات

13

التخصصات الرئيسية

هندسة الاتصالات

الملخص EN

Recent technological developments in wireless and sensor networks have led to a paradigm shift in interacting with everyday objects, which nurtured the concept of Internet of Things (IoT).

However, low-powered nature of IoT devices generally becomes a hindrance that makes them vulnerable to a wide array of attacks.

Among these, the emergence of rogue devices is quickly becoming a major security concern.

Rogue devices are malicious in nature which typically execute different kinds of cyberattacks by exploiting the weaknesses of access control schemes in IoT environments.

Therefore, access control is one of the crucial aspects of an IoT ecosystem that defines an entry point for a device or a user in the network.

This paper investigates this issue and presents an access control scheme by integrating an IoT network with blockchain technology, thereby arguing to replace the traditional centralized IoT-server architecture with a decentralized one.

The blockchain is used with smart contracts to establish a secure platform for device registration.

Due to this reason, the IoT devices are first required to register themselves and access the network via contracts thereafter.

Moreover, the contracts host a device registry, the access control list, to grant or deny access to devices.

This allows the proposed scheme to authorize registered devices only and block unregistered ones, which facilitates the mitigation of rogue devices.

To demonstrate the feasibility and improvements of the proposed scheme, security analysis along with in-depth performance evaluation are conducted, where the obtained results indicate its applicability.

A case study is also formulated with a comparative analysis that confirms the superior performance of the proposed scheme for low-powered IoT systems.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Javaid, Uzair& Jameel, Furqan& Javaid, Umair& Raza Khan, Muhammad Toaha& Jäntti, Riku. 2020. Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. Mobile Information Systems،Vol. 2020, no. 2020, pp.1-13.
https://search.emarefa.net/detail/BIM-1192512

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Javaid, Uzair…[et al.]. Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. Mobile Information Systems No. 2020 (2020), pp.1-13.
https://search.emarefa.net/detail/BIM-1192512

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Javaid, Uzair& Jameel, Furqan& Javaid, Umair& Raza Khan, Muhammad Toaha& Jäntti, Riku. Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. Mobile Information Systems. 2020. Vol. 2020, no. 2020, pp.1-13.
https://search.emarefa.net/detail/BIM-1192512

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1192512