Blockchain-based user authentication with anonymity for internet of things applications

ISSN: 22783075
0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Security threats that target identities (IDs) have increased considerably in recent years. Various network attacks attempt to discover IDs that can be used in future attacks to obtain private information. In this paper, we propose a blockchain-based user authentication approach that can be used by various end-users for internet of things (IoT) applications. The proposed approach uses single-use authentication parameters and does not require any private information. It is based on the child-key mechanism of the hierarchical deterministic (HD) wallet. The HD wallet is accepted as a standard of Bitcoin and is in turn based on the elliptic curve digital signature algorithm. The authentication parameters of the proposed approach were created using the HD wallet mechanism. The transaction of the authentication key stored in the distributed ledgers of the blockchain could be shared by various IoT servers for subscription to different services, and the user account of the blockchain could be connected to the IoT servers for payments without a membership procedure. We used only hash values for an authentication request to protect against network attacks. The proposed approach could decrease the system load by using a lightweight feature with few parameters and simplify the approach without the need for additional procedures by IoT servers. We verified that the security requirements of the proposed approach were satisfied, by analyzing the transmitted parameters. Furthermore, we evaluated the security vulnerabilities from various threats and analyzed attack scenarios. Thus, we propose that the authentication servers verify an original EC domain parameter hash value and the hash reuse to protect against fake attacks by network sniffing and spoofing. We have also summarized the originality and the characteristics of the proposed research by comparing it with closely related studies and concluded with a future research guide.

Cite

CITATION STYLE

APA

Lee, Y. J., Lee, K. M., & Lee, S. H. (2019). Blockchain-based user authentication with anonymity for internet of things applications. International Journal of Innovative Technology and Exploring Engineering, 8(3), 304–310.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free