Please use this identifier to cite or link to this item:
https://doi.org/10.1155/2020/8831976
Title: | Rogue device mitigation in the internet of things: A blockchain-based access control approach | Authors: | Javaid, U. Jameel, F. Javaid, U. Khan, M.T.R. Jäntti, R. |
Issue Date: | 2020 | Publisher: | Hindawi Limited | Citation: | Javaid, U., Jameel, F., Javaid, U., Khan, M.T.R., Jäntti, R. (2020). Rogue device mitigation in the internet of things: A blockchain-based access control approach. Mobile Information Systems 2020 : 8831976. ScholarBank@NUS Repository. https://doi.org/10.1155/2020/8831976 | Rights: | Attribution 4.0 International | Abstract: | Recent technological developments in wireless and sensor networks have led to a paradigm shift in interacting with everyday objects, which nurtured the concept of Internet of Things (IoT). However, low-powered nature of IoT devices generally becomes a hindrance that makes them vulnerable to a wide array of attacks. Among these, the emergence of rogue devices is quickly becoming a major security concern. Rogue devices are malicious in nature which typically execute different kinds of cyberattacks by exploiting the weaknesses of access control schemes in IoT environments. Therefore, access control is one of the crucial aspects of an IoT ecosystem that defines an entry point for a device or a user in the network. This paper investigates this issue and presents an access control scheme by integrating an IoT network with blockchain technology, thereby arguing to replace the traditional centralized IoT-server architecture with a decentralized one. The blockchain is used with smart contracts to establish a secure platform for device registration. Due to this reason, the IoT devices are first required to register themselves and access the network via contracts thereafter. Moreover, the contracts host a device registry, the access control list, to grant or deny access to devices. This allows the proposed scheme to authorize registered devices only and block unregistered ones, which facilitates the mitigation of rogue devices. To demonstrate the feasibility and improvements of the proposed scheme, security analysis along with in-depth performance evaluation are conducted, where the obtained results indicate its applicability. A case study is also formulated with a comparative analysis that confirms the superior performance of the proposed scheme for low-powered IoT systems. © 2020 Uzair Javaid et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | Source Title: | Mobile Information Systems | URI: | https://scholarbank.nus.edu.sg/handle/10635/198391 | ISSN: | 1574017X | DOI: | 10.1155/2020/8831976 | Rights: | Attribution 4.0 International |
Appears in Collections: | Students Publications |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1155_2020_8831976.pdf | 4.87 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License