A New Scalable and Secure Access Control Scheme using Blockchain Technology for IoT

Sivaselvan N, Vivekananda Bhat K, Muttukrishnan Rajarajan, Ashok Kumar Das

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

The growth of IoT devices is so rapid that several billions of such devices would be in use in a span of four-year period. Essential security mechanisms need to be put in place to curb several security attacks prevalent in IoT. Access control is an important security mechanism that ensures legitimate and controlled access to critical and limited resources in IoT. The current access control schemes for IoT could not handle burgeoning number of IoT devices, while meeting the necessary level of security. Consequently, in this paper, we propose a new scalable and secure access control scheme for IoT. With blockchain as the root-of-trust, the proposed scheme performs access control for the IoT devices without having the resource-constrained IoT devices to be part of the blockchain network and to possess substantial amount of blockchain data. Blockchain's tamper-proof property makes it an ideal candidate to be chosen as the root-of-trust. The scheme is secure against various security attacks prevalent in IoT. A proof-of-concept implementation for the scheme is developed and deployed in Ethereum Mainnet. The transaction costs of the different operations in the scheme are fairly below USD 3. Furthermore, scalability of the proposed scheme in different scenarios is investigated.

Original languageEnglish
Pages (from-to)2957-2974
Number of pages18
JournalIEEE Transactions on Network and Service Management
Volume20
Issue number3
DOIs
Publication statusPublished - 01-09-2023

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A New Scalable and Secure Access Control Scheme using Blockchain Technology for IoT'. Together they form a unique fingerprint.

Cite this