4
4
Abstract—The exponential growth in the number of connected 3) smart agriculture and so on. With such expansion to a
devices as well as the data produced from these devices call for wide range of fields, the number of devices connected to the
a secure and efficient access control mechanism that can ensure internet and to each other is expected to reach around 20
the privacy of both users and data. Most of the conventional key
management mechanisms depend upon a trusted third party like billion by 2022[1].
a registration center or key generation center for the generation
and management of keys. Trusting a third party has its own By concept, an IoT application system is ubiquitous of a
ramifications and results in a centralized architecture; therefore variety of devices (things) that are capable of interacting with
this article addresses these issues by designing a Blockchain each other so that a broad range of services can be provided.
based distributed IoT architecture that uses Hash Chains for
secure key management. The proposed architecture exploits the Each device, be it physical or virtual, of an IoT system
key characteristics of Blockchain technology such as openness, must be accessible by the system users regardless of their
immutability, traceability, and fault tolerance, to ensure data location. It is critical that only authenticated and approved
privacy in IoT scenarios and, thus, provides a secure environment users can access the system; otherwise, the system will be
for communication. The paper also proposes a scheme for vulnerable to numerous security attacks like spoofing, data
secure and efficient key generation and management for mutual
authentication between communication entities. The proposed tampering, DOS attack, impersonation attack, information
scheme uses a one-way hash chain technique to provide a set theft, etc. Certainly, these security issues continue to be
of public and private key pairs to the IoT devices that allow the the prime obstacle for the adoption of IoT in large scale
key pairs to verify themselves at any time. Experimental analysis organizations. As per a survey, one of the most significant
confirms the superior performance of the proposed scheme to the concerns in the deployment of solutions for different IoT
conventional mechanisms.
use-cases is security. Securing the communication among
Index Terms—Internet of Things, Blockchain, Decentraliza- different entities and ensuring data privacy using encryption
tion, Hash Chain, Privacy, Security are the most commonly used methods to ensure IoT security
[2]. However, the conventional security methods do not fully
I. I NTRODUCTION conform to the IoT systems because of the heterogeneity
and limited resources of IoT devices. Moreover, most of
T HE rate at which the number of physical devices
connected to the Internet is increasing exponentially.
People are gradually furnishing their homes with smart
the proposed solutions are centralized in which scalability
becomes a matter of concern since thousands of devices
devices like smart remote controls, smart TVs, surveillance work in an IoT use-case [3]. Lastly, each use-case demands
cameras, smart bulbs, etc., while vehicles are being equipped a different approach for system design, deployment and
with different smart devices so that they can share traffic- ensuring security. Therefore, new approaches should be
related data [1]. In factories, robots and smart tools are designed with the aim to facilitate the hassle free addition
being implemented to increase the productivity of their of new services as well as new devices with add-on security
operations. The application areas of IoT are not limited to benefits.
these use-cases; but is largely endorsed in several other areas, As a recently promising solution, the concept of Blockchain is
including agriculture, cities, transportation system, grids, etc. suggested to provide a secure and efficient base for several IoT
Indeed, IoT has allowed the evolution of many other areas applications.With the growing popularity of digital currency,
like 1) smart health systems 2) smart transportation systems researchers have focused their attention on the different
usages of Blockchain which is the key element behind
S.S. Panda, D. Jena and B. Kumar Mohanta are with the Department of Bitcoin. Coined by Nakamoto in 2008 [4], a Blockchain is
Computer Science Engineering, IIIT Bhubaneswar, Odisha, India, 751003 e-
mails: C117011@iiit-bh.ac.in, debasish@iiit-bh.ac.in, C116004@iiit-bh.ac.in essentially a distributed ledger that is inherently immutable,
S. Ramasubbareddy is with Department of Information Technology, open, synchronized and verifiable [5]. It facilitates distributed
VNRVJIET, Hyderabad, India, 500090, e-mail: svramasub- decision making so that all entities of the system share equal
bareddy1219@gmail.com
M. Daneshmand is with the School of Business, Stevens privilege. Simply put, Blockchain networks enable a number
Institute of Technology, Hoboken, NJ 07030, USA, e-mail: of entities that do not share a trust relationship to coordinate,
Mahmoud.Daneshmand@stevens.edu amalgamate and associate in application development process
A.H. Gandomi (corresponding author) is with the Faculty of Engineering
Information Technology, University of Technology Sydney, Australia, e-mail: or business intelligence process [6].
gandomi@uts.edu.au
2
Most of the existing works solely depend upon the security handle the different issues related to data privacy and security
attribute of Blockchain, which may not be enough for some of in an IoT framework.
the IoT use-cases. For example, the full anonymity provided
• Consensus: The entities of the network will collec-
by Blockchain doesn’t ensure identification, which is crucial
tively agree that each transaction that is recorded in the
in most of the IoT use-cases. Moreover, it remains unclear
Blockchain and the order of transactions in relation to
whether a low power and resource-constrained IoT device will
others are valid.
be able to perform transactions in Blockchain and participate
• Provenance: The entities know the history of the data and
in the Blockchain mining process. Most of the researchers
how it flows within the network.
are still in their elementary stage, whereby only an approach
• Immutability: Entities can not tamper with the transac-
is presented but no proper implementation or analysis are
tions once they are agreed upon and recorded in the chain.
given. Therefore, in this paper, a distributed framework using
• Finality: Once a transaction is committed, it cannot be
two Blockchain structures is presented which enables secure
reversed.i.e. data cannot be rolled back to the previous
communication among IoT devices. One-way hash chains are
state. If a transaction is in error, then a new transaction
employed for authentication and key management.
must be used to reverse the error with both transactions
Given the challenges in developing a distributed, reliable
visible.
and secure authentication scheme for a heterogeneous IoT
network, a Blockchain-based distributed authentication and Bitcoin is an example of a permission-less public Blockchain.
key management scheme has been proposed in this article. It is a peer to peer payment system that allows people to
The key contributions are given below: send currency to one another without requiring a centralized
1) A framework using two Blockchain structure is devel- intermediary using a class of assets called cryptocurrency
oped to provide a distributed and secure IoT network [5]. It uses a resource intensive process known as proof
for communication. of work (PoW) to achieve consensus. PoW in the Bitcoin
2) A distributed authentication and key management using system extends the hashcash based PoW system and develops
one-way hash chains to authenticate as well as to assign a mechanism to safeguard the Blockchain by applying the
keys to the entities of the system. The introduction of distributed consensus mechanism [4]. The hashcash system
Blockchain technology in the scheme facilitates dis- was proposed by Adam Back and uses the puzzle friendliness
tributed decision making without the need for a third property of the cryptographic hash function [7]. Transactions
party. in Bitcoin are public and visible, but the entities behind each
3) The scheme has been implemented on the Ethereum transaction are largely anonymous making them very difficult
platform and an in-depth evaluation of the scheme to track.
proves its proficiency in making an IoT use-case secure. To exploit the advantages of Blockchain technology, a
4) Further security analysis of the proposed authentication number of platforms have been designed to integrate it with
scheme is being compared with other existing schemes IoT to provide smart and usable foundations for future research
which prove the strength of the proposed scheme. The and development. Some of the popular platforms include
performance analysis shows that the scheme is highly Ethereum, Hyperledger, Multichain, IOTA, Rootstock, IoT
efficient and scalable. Chain, Atonomi, Lisk, Chain of Things etc. Specifically,
The rest of the article is arranged as follows: Section 2 gives Ethereum was the first acknowledged platform for the develop-
a brief introduction of Blockchain along with some popular ment of decentralized or distributed systems using Blockchain
platforms that combine it with IoT. Section 3 discusses the technology, which supports smart contracts. These smart con-
existing Blockchain based security solutions for IoT systems. tracts execute on the Ethereum Virtual Machine (EVM), a
Section 4 discusses the preliminaries required for the proposed type of operating system provided by the Ethereum platform
scheme. Then a detailed description of the proposed model [8]. Ethereum provides a type of cryptocurrency called Ether
is presented in section 5. The scheme is evaluated in terms (ETH), that can be used for both financial transactions and
of security and performance in section 6. Finally, section 7 executing smart contracts.Though most of the earlier versions
concludes the article with future research plans. of Ethereum used PoW as the consensus mechanism, the
recent version employes proof of stake (PoS) as the consensus
mechanism. The PoW based consensus used in Ethereum
II. B LOCKCHAIN FOR I OT is known as Ethash, a memory intensive and less power
Blockchain, the key element of Bitcoin, has been grow- consuming consensus mechanism as compared to traditional
ing at an unbelievable pace over the last few years with PoW. Ethereum can be used to implement both permission less
its application now extending beyond digital currency. As and permission-based frameworks over Blockchain. Lately,
stated, Blockchain, as distributed ledger that is inherently smart contracts have been extensively used for modeling and
immutable, open, synchronized and verifiable, can be thought securing a number of IoT use-cases. Ethereum was the first
of as a shared replicated ledger with smart contracts [6]. Smart platform to provide a base for development of Distributed
Contracts are nothing more than a piece of computer codes Applications(DAPP) [9]. As another popular platform, Hy-
that provide the shared implementation of the business rules perledger is a permission-based Blockchain framework that
associated with each transaction. The following features of provides an Enterprise-grade foundation for transactional ap-
Blockchain describe how and why Blockchain can be used to plications, where the nodes in the network need to know each
3
other prior to setting up the network[10]. Practical Byzantine an approach to combine IoT and Blockchain technology
fault tolerance (PBFT) is used as the consensus mechanism where smart contracts define the functionalities of each
used in Hyperledger fabric, which safeguards the network from devices. However, their approach lacks clarity in terms of
crash faults, network faults, Sybil attacks and Byzantine nodes. the usage and the application of the approach to different
Hyperledger provides better performance in terms of higher use-cases of IoT is also restricted. The authors in [18] utilized
transaction throughput and less power consumption compared Ethereum Blockchain for secure analysis and management of
to Bitcoin and Ethereum. Nevertheless, it has limitations, for medical sensors.
instance applications built on Hyperledger cannot be fully These sensors combined with IoT smart devices help in
decentralized and will be less scalable. Multichain is another monitoring the health condition of a patient from remote
open platform to model and deploy private Blockchain within locations. Another method to ensure mutual authentication
a closed environment, just like Hyperledger. It is forked from among IoT devices is introduced in [3], which groups IoT
Bitcoin to broaden the functionality domain of Blockchain that devices into virtual zones within which they can share
provides users with more features, such as speed, permissions, data securely. However, this method doesn’t allow inter
multiple assets and atomic exchanges. Another Ethereum like zonal communication and is still in its elementary phase.
platform is Rootstock for Blockchain based IoT developments. In [19], a distributed storage system is presented for IoT
Since it is compatible with Ethereum, smart contracts writ- applications that generate huge amounts of data. Although
ten for the Ethereum environment can also be used over the work confirms that the storage system utilizes Blockchain
this platform. It also has an built-in infrastructure layer that technology to store the generated data in a distributed manner,
provides users with better computing power, fast payment other security and privacy needs of IoT applications are not
channels and larger storage space. Atonomi is another platform addressed in the research article.
that provides trust and identity that are essential for the Recently, an authentication scheme for IoT devices using
increasingly connected world by securing a device’s identity gateway nodes and Blockchain technology has been proposed
on the distributed ledger, tracking a device’s reputation and in [20], where gateway nodes are included to address the
securing the communication between devices. low computation power and resource constrained nature of
IoT devices. Similarly, in [21], IoT devices are connected to
fog nodes that share a Blockchain structure. Even though the
III. R ELATED W ORK
proposed design ensures a secure communication between
Even though Blockchain is still in its infancy, substantial fog nodes and devices, the applicability of the scheme is very
research has already been done in different areas of IoT using restricted.
Blockchain technology. In this section, the authors discuss
some of the existing works in the field. To summarize, most of the existing research works are not
In [11], the authors propose the advantages and applicable to the wide range of IoT application areas. Apart
disadvantages of Blockchain technology with respect to from this, most of the works solely depend upon the security
IoT, concluding that Blockchain promotes the secure attribute of Blockchain, which may not be enough for some of
and trustworthy sharing of resources and data in an IoT the IoT use-cases. For example, the full anonymity provided
environment among multiple entities. The authors in [12] by Blockchain doesn’t ensure identification, which is crucial
revealed shown how Blockchain technology can be used to in most of the IoT use-cases. Moreover, it remains unclear
design a trust-less, decentralized environment for industrial whether a low power and resource constrained IoT device will
IoT. However, there was no formal proof for validation of be able to perform transactions in Blockchain and participate
their proposed model given in the article. In [13], a privacy in the Blockchain mining process. Most of the researchers are
preserving mechanism was presented that helps to authorize still in their elementary stage, whereby only an approach is
IoT devices in cloud systems. The presented method allows presented but no proper implementation or analysis are given.
stakeholders to share their data gathered from sensor devices
with different service providers in a fully anonymous way. IV. P RELIMINARIES
Yet, it was not adapted to the use-cases where identification
A. System Variables
is essential. Another access control method using Blockchain
technology known as ”FairAccess” was proposed in [14], This section specifies the system variables that need to be
which works analogous to the Role based access control accepted and used by the all entities of the system. These
([15]). FairAccess was specially designed for IoT use-cases variables are specified below.
∗
where the policies are kept in a private Blockchain so that • Assume G to be a cyclic multiplicative subgroup of Zp
they cannot be tampered with. However, this method is not of prime order p, with identity elemente = 1andg ∈ G
applicable to all IoT use-cases since it was designed to work is a generator of G. We assume that computing discrete
only for policy based systems. logarithms in G with respect to g is computationally
In [16], the authors address the various challenges of infeasible.
Blockchain in the context of IoT such as scalability, For example, G might be a large multiplicative subgroup
computational complexity and storage overhead and propose of Zp∗
a light weight Blockchain having a simple consensus for some large prime p, where q is a large prime dividing
mechanism to address these issues. In [17], the authors share p − 1. Alternatively G could be the group of points on
4
an elliptic curve. The kth private key (P rKk ) and its corresponding public
key (P uKk ), where 0¡k¡N, are generated as per the Eqn. (3)
• N is a positive integer that specifies the number of and (4)
public/private key pairs available to an IoT device.
k
Table I contains the description of the notations used in the PrKk =
Y
H j (s) (3)
article. j=0
| {z }
TABLE II
120 Hash Value C OMPARISON BASED ON C HARACTERISTIC PARAMETERS
Private Key
Complete key set
100 Characteristic [20] [22] [24] Current Study
Mutual Authentication Yes Yes – Yes
80 Resists Replay Attack No No – Yes
Time (s)
0 B. Security Analysis
5000 10000 15000 20000 25000 30000
Length of hash chain An extensive analysis of the proposed scheme proves that
the scheme is highly accomplished to meet the privacy and
Fig. 4. Time required for Key pair generation security needs of an IoT use-case. This section shows how the
proposed scheme secured against various network attacks and
makes comparison to some existing works that have similar
1200 objectives. The comparison detail are provided in Table II.
• Mutual Authentication and Message Integrity: Authenti-
1000 cating the source as well as the destination before starting
Transaction Number
• Resistance to Denial of Service (DoS) Attack: In a DOS [3] M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of
attack, the adversary attempts to prevent the use of a trust: A decentralized blockchain-based authentication system for iot,”
Computers & Security, vol. 78, pp. 126–142, 2018.
network resource or a valid service by temporarily or per- [4] S. Nakamoto and A. Bitcoin, “A peer-to-peer electronic cash system,”
manently blocking the server of the system. In Distributed Bitcoin.–URL: https://bitcoin. org/bitcoin. pdf, vol. 4, 2008.
DOS (DDoS) attack, multiple attackers consume the [5] S. S. Panda, B. K. Mohanta, U. Satapathy, D. Jena, D. Gountia, and T. K.
Patra, “Study of blockchain based decentralized consensus algorithms,”
resources of the system to disrupt its normal functioning. in TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE,
This can be done by flooding the target device with 2019, pp. 908–913.
unnecessary messages. If the target device is the central [6] B. K. Mohanta, S. S. Panda, and D. Jena, “An overview of smart contract
and use cases in blockchain technology,” in 2018 9th International Con-
node of a centralized system, then failure of the central ference on Computing, Communication and Networking Technologies
node affects the whole system.In the proposed approach, (ICCCNT). IEEE, 2018, pp. 1–4.
both the use of Blockchain technology and the large [7] A. Back et al., “Hashcash-a denial of service counter-measure,” 2002.
[8]
number of miners in the Ethereum platform increases the [9] B. K. Mohanta, A. Sahoo, S. Patel, S. S. Panda, D. Jena, and D. Gountia,
resistance to such an attack. Furthermore, the high cost of “Decauth: Decentralized authentication scheme for iot device using
making a transaction in Blockchain network, discourages ethereum blockchain,” in TENCON 2019-2019 IEEE Region 10 Con-
ference (TENCON). IEEE, 2019, pp. 558–563.
an attacker from launching an attack. [10] E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis,
• Scalability: In context of this article, scalability is char- A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich et al.,
acterized by the ability to guarantee that the size of the “Hyperledger fabric: a distributed operating system for permissioned
blockchains,” in Proceedings of the Thirteenth EuroSys Conference,
system doesn’t affect its performance. In other words, if 2018, pp. 1–15.
the number of devices increases, then it should not affect [11] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for
the time required for authentication and key management. the internet of things,” Ieee Access, vol. 4, pp. 2292–2303, 2016.
[12] A. Bahga and V. K. Madisetti, “Blockchain platform for industrial
In the proposed work, the AMNs store the information internet of things,” Journal of Software Engineering and Applications,
related to authentication and key management of their vol. 9, no. 10, pp. 533–546, 2016.
own network. All Blockchains belonging to different [13] T. Hardjono and N. Smith, “Cloud-based commissioning of constrained
devices using permissioned blockchains,” in Proceedings of the 2nd
AMN networks are handled by MNs of the Cloud layer. ACM international workshop on IoT privacy, trust, and security, 2016,
Apart from this, a device has to store very minimal pp. 29–36.
information required only for validating its authenticity [14] A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman, “Fairaccess: a new
blockchain-based access control framework for the internet of things,”
and securing its communication with other devices. More- Security and Communication Networks, vol. 9, no. 18, pp. 5943–5964,
over, using peer to peer networks like Blockchain, the 2016.
scalability issue can be handled very easily [27]. Due to [15] D. Ferraiolo, J. Cugini, and D. R. Kuhn, “Role-based access control
(rbac): Features and motivations,” in Proceedings of 11th annual com-
all these features, the proposed approach can achieve a puter security application conference, 1995, pp. 241–48.
good security performance. [16] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Lsb: A
lightweight scalable blockchain for iot security and privacy,” arXiv
preprint arXiv:1712.02969, 2017.
VII. C ONCLUSION [17] S. Huh, S. Cho, and S. Kim, “Managing iot devices using blockchain
platform,” in 2017 19th international conference on advanced commu-
In this article, a novel approach for distributed authentica- nication technology (ICACT). IEEE, 2017, pp. 464–467.
tion and key management is presented. The approach exploits [18] H. L. Pham, T. H. Tran, and Y. Nakashima, “A secure remote healthcare
system for hospital using blockchain smart contract,” in 2018 IEEE
the advantages of Blockchain technology, cloud computing Globecom Workshops (GC Wkshps). IEEE, 2018, pp. 1–6.
and fog computing to achieve a secure and efficient archi- [19] Q. Xu, K. M. M. Aung, Y. Zhu, and K. L. Yong, “A blockchain-based
tecture for IoT use-cases. The entire system is divided into storage system for data analytics in the internet of things,” in New
Advances in the Internet of Things. Springer, 2018, pp. 119–138.
layers of Blockchain to speed up the validation process and [20] S. S. Panda, U. Satapathy, B. K. Mohanta, D. Jena, and D. Gountia, “A
to increase the scalability of the system, whereby the Ethreum blockchain based decentralized authentication framework for resource
platform was used to develop the Blockchain network. The constrained iot devices,” in 2019 10th International Conference on
Computing, Communication and Networking Technologies (ICCCNT).
scheme was thoroughly evaluated, confirming the high ef- IEEE, 2019, pp. 1–6.
ficiency and scalability of the scheme.The security analysis [21] B. K. Mohanta, D. Jena, S. S. Panda, and D. Gountia, “Decentralized
further demonstrates the scheme’s compliance to the security secure fog computing in cloud-fog-iot infrastructure using blockchain.”
[22] R. L. Rivest and A. Shamir, “Payword and micromint: Two simple mi-
requirements of IoT use-cases. Future works to improve the cropayment schemes,” in International workshop on security protocols.
proposed approach are suggested to: 1) design schemes for Springer, 1996, pp. 69–87.
inter network communication among the AMNs as well as [23] Q. Huan, I. C. Avramopoulos, H. Kobayashi, and B. Liu, “Secure
data forwarding in wireless ad hoc networks,” in IEEE International
devices and 2) implement and evaluate the schemes to verify Conference on Communications, 2005. ICC 2005. 2005, vol. 5. IEEE,
their ability in providing security and performance require- 2005, pp. 3525–3531.
ments. [24] L. Lamport, “Password authentication with insecure communication,”
Communications of the ACM, vol. 24, no. 11, pp. 770–772, 1981.
[25] G. Kounga, C. J. Mitchell, and T. Walter, “Generating certification
R EFERENCES authority authenticated public keys in ad hoc networks,” Security and
Communication Networks, vol. 5, no. 1, pp. 87–106, 2012.
[1] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A [26] Remix, “Remix description,” Available: http://remix.ethereum.org, April
survey on iot security: application areas, security threats, and solution 1, 2018.
architectures,” IEEE Access, vol. 7, pp. 82 721–82 743, 2019. [27] M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, and
[2] M. Ma, G. Shi, and F. Li, “Privacy-oriented blockchain-based distributed M. H. Rehmani, “Applications of blockchains in the internet of things:
key management architecture for hierarchical access control in the iot A comprehensive survey,” IEEE Communications Surveys & Tutorials,
scenario,” IEEE Access, vol. 7, pp. 34 045–34 059, 2019. 2018.