Unified Authentication Scheme for IoT Blockchain Based on PUF
- 1 September 2021
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)
Abstract
The number of global Internet of Things devices has increased rapidly and has a wide range of application markets. Access authentication methods for massive heterogeneous IoT devices are complicated, and central servers and trusted platforms cannot take effective measures against tampered devices. Analyzing the problems and challenges faced by IoT devices, this paper proposes a unified authentication scheme for IoT blockchain devices based on PUF. The PUF model is used to authenticate IoT devices, and the model parameters are decomposed into various parts and stored in each node in the blockchain. The homomorphic hash function is used to aggregate the partial authentication response values generated by the distribution in the invisible case to complete the authentication of the device information. It solves the complex and diverse problems of device authentication schemes and realizes the credibility and security of devices data sources and devices information storage stability. Finally, the functional analysis confirmed that the scheme is practical and executable.Keywords
This publication has 35 references indexed in Scilit:
- Who Moved My Data? Privacy Protection in SmartphonesIEEE Communications Magazine, 2017
- Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5GInternational Journal of Communication Systems, 2015
- Enabling Cloud Computing in Emergency Management SystemsIEEE Cloud Computing, 2014
- Low-Power Low-Latency Data Allocation for Hybrid Scratch-Pad MemoryIEEE Embedded Systems Letters, 2014
- RNA nanotechnology for computer design and in vivo computationPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2013
- Energy Efficient Task Assignment with Guaranteed Probability Satisfying Timing Constraints for Embedded SystemsIEEE Transactions on Parallel and Distributed Systems, 2013
- A hierarchical reliability-driven scheduling algorithm in grid systemsJournal of Parallel and Distributed Computing, 2012
- PUFKY: A Fully Functional PUF-Based Cryptographic Key GeneratorLecture Notes in Computer Science, 2012
- On-the-fly verification of rateless erasure codes for efficient content distributionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision ResistanceLecture Notes in Computer Science, 2004