Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Joint Authors

Javaid, Uzair
Jameel, Furqan
Javaid, Umair
Raza Khan, Muhammad Toaha
Jäntti, Riku

Source

Mobile Information Systems

Issue

Vol. 2020, Issue 2020 (31 Dec. 2020), pp.1-13, 13 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2020-10-28

Country of Publication

Egypt

No. of Pages

13

Main Subjects

Telecommunications Engineering

Abstract EN

Recent technological developments in wireless and sensor networks have led to a paradigm shift in interacting with everyday objects, which nurtured the concept of Internet of Things (IoT).

However, low-powered nature of IoT devices generally becomes a hindrance that makes them vulnerable to a wide array of attacks.

Among these, the emergence of rogue devices is quickly becoming a major security concern.

Rogue devices are malicious in nature which typically execute different kinds of cyberattacks by exploiting the weaknesses of access control schemes in IoT environments.

Therefore, access control is one of the crucial aspects of an IoT ecosystem that defines an entry point for a device or a user in the network.

This paper investigates this issue and presents an access control scheme by integrating an IoT network with blockchain technology, thereby arguing to replace the traditional centralized IoT-server architecture with a decentralized one.

The blockchain is used with smart contracts to establish a secure platform for device registration.

Due to this reason, the IoT devices are first required to register themselves and access the network via contracts thereafter.

Moreover, the contracts host a device registry, the access control list, to grant or deny access to devices.

This allows the proposed scheme to authorize registered devices only and block unregistered ones, which facilitates the mitigation of rogue devices.

To demonstrate the feasibility and improvements of the proposed scheme, security analysis along with in-depth performance evaluation are conducted, where the obtained results indicate its applicability.

A case study is also formulated with a comparative analysis that confirms the superior performance of the proposed scheme for low-powered IoT systems.

American Psychological Association (APA)

Javaid, Uzair& Jameel, Furqan& Javaid, Umair& Raza Khan, Muhammad Toaha& Jäntti, Riku. 2020. Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. Mobile Information Systems،Vol. 2020, no. 2020, pp.1-13.
https://search.emarefa.net/detail/BIM-1192512

Modern Language Association (MLA)

Jäntti, Riku…[et al.]. Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. Mobile Information Systems No. 2020 (2020), pp.1-13.
https://search.emarefa.net/detail/BIM-1192512

American Medical Association (AMA)

Javaid, Uzair& Jameel, Furqan& Javaid, Umair& Raza Khan, Muhammad Toaha& Jäntti, Riku. Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. Mobile Information Systems. 2020. Vol. 2020, no. 2020, pp.1-13.
https://search.emarefa.net/detail/BIM-1192512

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1192512