56
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Blockchain-based group signature for secure authentication of IoT systems in smart home environments

, , &
Received 12 Sep 2023, Accepted 21 Feb 2024, Published online: 10 Mar 2024

References

  • Almusaylim ZA, Zaman N. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wirel Network. 2019;25(6):3193–3204. doi:10.1007/s11276-018-1712-5
  • Kamran M, Khan HU, Nisar W, et al. Blockchain and internet of things: a bibliometric study. Comp Elec Eng. 2020;81:106525. doi: 10.1016/j.compeleceng.2019.106525
  • Kashihara M, Bhuyan S, Taenaka D, et al. A survey on blockchain, SDN and NFV for the smart-home security. Internet Things. 2022;20:100588. doi: 10.1016/j.iot.2022.100588
  • Mocrii D, Chen Y, Musilek P. IoT-based smart homes: a review of system architecture, software, communications, privacy and security. Internet Things. 2018;1:81–98. doi: 10.1016/j.iot.2018.08.009
  • Douha NYR, Bhuyan M, Kashihara S, Fall D, Taenaka Y, and Kadobayashi Y. A survey on blockchain, SDN and NFV for the smart-home security. Internet Things (Netherlands). 2022;20(April):100588. doi: 10.1016/j.iot.2022.100588
  • Guo Y, Zhang Z, Guo Y. SecFHome: secure remote authentication in fog-enabled smart home environment. Comput Network. 2021;207(September):108818. doi: 10.1016/j.comnet.2022.108818
  • Lin C, He D, Kumar N, et al. HomeChain: a blockchain-based secure mutual authentication system for smart homes. IEEE Internet Things J. 2020;7(2):818–829. doi: 10.1109/JIOT.2019.2944400
  • Khan MA, Salah K. IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst. 2018;82:395–411. doi: 10.1016/j.future.2017.11.022
  • Zhang Z, Zhou S. A decentralized strongly secure attribute-based encryption and authentication scheme for distributed internet of Mobile things ✩. Comput Network. 2021;201(July):108553. doi: 10.1016/j.comnet.2021.108553
  • Cvitic I, Perakovic D, Gupta BB, et al. Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J. 2022;9(3):2109–2123. doi: 10.1109/JIOT.2021.3090909
  • Lee Y, Rathore S, Park JH, et al. A blockchain based smart home gateway architecture for preventing data forgery. Human-Centric Comput Inf Sci. 2020;10(1). doi: 10.1186/s13673-020-0214-5
  • Ammi M, Alarabi S, Benkhelifa E. Customized blockchain-based architecture for secure smart home for lightweight IoT. Inf Process Manag. 2021;58(3):102482. doi: 10.1016/j.ipm.2020.102482
  • Pirayesh J, Giaretta A, Conti M, et al. A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput Network. 2022;216(June):109077. doi: 10.1016/j.comnet.2022.109077
  • Roychoudhury P, Roychoudhury B, Saikia DK. Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput Commun. 2018;127(February):146–157. doi: 10.1016/j.comcom.2018.06.005
  • Homes SS, Iqbal W, Abbas H, et al. ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes. IEEE Int Things J. 2021;8(12):9622–9633. doi: 10.1109/JIOT.2020.3024058
  • Rashid A, Masood A, Khan R. Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs. Cluster Comput. 2022;6(1):237–254. doi: 10.1007/s10586-022-03583-6
  • Hammi MT, Hammi B, Bellot P, et al. Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur. 2018;78:126–142. doi: 10.1016/j.cose.2018.06.004
  • Bang AO, Rao UP, Visconti A, et al. An IoT inventory before deployment: a survey on IoT protocols, communication technologies, vulnerabilities, attacks, and future research directions. Comput Secur. 2022;123:102914. doi: 10.1016/j.cose.2022.102914
  • AbuAlghanam O, Qatawneh M, Almobaideen W, et al. A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities. J Inf Secur Appl. 2022;67(May):103173. doi: 10.1016/j.jisa.2022.103173
  • Dang TLN, Nguyen MS. An approach to data privacy in smart home using blockchain technology. Proc Conf Adv Comput Appl Acomp. 2018;58–64. doi: 10.1109/ACOMP.2018.00017
  • García-Vázquez F, Guerrero-Osuna HA, Ornelas-Vargas G, et al. Design and implementation of the e-switch for a smart home. Sensors. 2021;21(11):1–17. doi: 10.3390/s21113811
  • Ren Y, Leng Y, Qi J, et al. Multiple cloud storage mechanism based on blockchain in smart homes. Futur Gener Comput Syst. 2021;115:304–313. doi: 10.1016/j.future.2020.09.019
  • Zhang S, Lee JH. A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 2020;7(5):4557–4565. doi: 10.1109/JIOT.2019.2960027
  • Ali G, Ahmad N, Cao Y, et al. xDbauth: blockchain based cross domain authentication and authorization framework for internet of things. IEEE Access. 2020;8:58800–58816. doi: 10.1109/ACCESS.2020.2982542
  • Jiang Y, Ge S, Shen X. AAAS: an anonymous authentication scheme based on group signature in VANETs. IEEE Access. 2020;8:98986–98998. doi: 10.1109/ACCESS.2020.2997840
  • Zhang C, Xue X, Feng L, et al. Group-signature and group session key combined safety message authentication protocol for VANETs. IEEE Access. 2019;7:178310–178320. doi: 10.1109/ACCESS.2019.2958356
  • Risteska Stojkoska BL, Trivodaliev KV. A review of internet of things for smart home: challenges and solutions. J Clean Prod. 2017;140:1454–1464. doi: 10.1016/j.jclepro.2016.10.006
  • Oleshchuk V. Internet of things and privacy preserving technologies. ProcVeh Technol Inf Theory Aerosp Electron Syst Technol Wirel VITAE. 2009;336–340. doi: 10.1109/WIRELESSVITAE.2009.5172470
  • Zhang R, Xue R, Liu L. Security and privacy on blockchain. ACM Comput Surv. 2019;52(3):1–34. doi: 10.1145/3316481
  • Yang R, Wakefield R, Lyu S, et al. Public and private blockchain in construction business process and information integration. Autom Constr. 2020;118(February):103276. doi: 10.1016/j.autcon.2020.103276
  • Esposito C, Ficco M, Gupta BB. Blockchain-based authentication and authorization for smart city applications. Inf Process Manag. 2021;58(2):102468. doi: 10.1016/j.ipm.2020.102468
  • Stahl S. The evolution of the normal distribution. Math Mag. 2006;79(2):96–113. doi: 10.1080/0025570x.2006.11953386

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.