LES DERNIÈRES INFORMATIONS
Message d'état
PURL test ID: finland
A Decentralized Trust Establishment Protocol for Smart IoT Systems
Titre | A Decentralized Trust Establishment Protocol for Smart IoT Systems |
Publication Type | Journal Article |
Year of Publication | 2022 |
Authors | Majdoubi, DE, Bakkali, HE, Bensaih, M, Sadki, S |
Journal | Internet of Things (Netherlands) |
Volume | 20 |
Abstract | The Internet of Things (IoT) is a widely deployed technology to provide innovative services in many several fields such as industry, logistics, healthcare, and energy management. The integration of artificial intelligence, machine learning, edge/cloud computing, 5G networks, big data analytics, and other emerging technologies in IoT systems is leading to the emergence of Smart Systems that support devices to make autonomous decisions in order to improve and facilitate people's lives. These smart IoT devices produce a huge amount of sensitive data. Thus, establishing Trust between these devices is vital to ensure the security of the sensed data and for the normal functionality of smart systems. To address these challenges, several Trust establishment protocols have been proposed, but they have some limitations such as centralization, the need for human intervention, and the lack of adaptability to smart devices with computation and storage constraints. In this paper, a decentralized trust establishment protocol is proposed for smart IoT devices and is applicable for different scenarios. The protocol provides decentralized identity management, mutual authentication, access control, and secure communication by combining Blockchain technology with PV-SAS-MCA message cross-authentication protocol based on Short Authenticated Strings (SAS). To the best of our knowledge, this research is the first to propose a new approach that uses Blockchain as an extra distributed and authenticated channel to exchange Short Authenticated Strings without physical interaction. This helps to allow entities in the Smart IoT environment not only to identify each other but also to exchange their public keys in a secure manner. Moreover, the proposed protocol uses Elliptic Curve Cryptography (ECC) to secure communications with significantly smaller key sizes and lower computation overhead. Experimental results reveal that the time required to complete the authentication process is less than 90 ms which is a superior performance when compared to state-of-the-art decentralized authentication mechanisms. © 2022 Elsevier B.V.
|
URL | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85141956819&doi=10.1016%2fj.iot.2022.100634&partnerID=40&md5=09f4ee511269a6c179ffb6176350529b |
DOI | 10.1016/j.iot.2022.100634 |
Contactez-nous
ENSIAS
Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc
Télécopie : (+212) 5 37 68 60 78
Secrétariat de direction : 06 61 48 10 97
Secrétariat général : 06 61 34 09 27
Service des affaires financières : 06 61 44 76 79
Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma
Résidences : 06 61 82 89 77
Contacts
Education - This is a contributing Drupal Theme
Design by
WeebPal.