IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

08/30/2019
by   Rourab paul, et al.
0

Standard security protocols like SSL, TLS, IPSec etc. have high memory and processor consumption which makes all these security protocols unsuitable for resource constrained platforms such as Internet of Things (IoT). Blockchain (BC) finds its efficient application in IoT platform to preserve the five basic cryptographic primitives, such as confidentiality, authenticity, integrity, availability and non-repudiation. Conventional adoption of BC in IoT platform causes high energy consumption, delay and computational overhead which are not appropriate for various resource constrained IoT devices. This work proposes a machine learning (ML) based smart access control framework in a public and a private BC for a smart city application which makes it more efficient as compared to the existing IoT applications. The proposed IoT based smart city architecture adopts BC technology for preserving all the cryptographic security and privacy issues. Moreover, BC has very minimal overhead on IoT platform as well. This work investigates the existing threat models and critical access control issues which handle multiple permissions of various nodes and detects relevant inconsistencies to notify the corresponding nodes. Comparison in terms of all security issues with existing literature shows that the proposed architecture is competitively efficient in terms of security access control.

READ FULL TEXT
11/12/2021

A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things

In view of the security issues of the Internet of Things (IoT), consider...
06/05/2020

Securing IoT Applications using Blockchain: A Survey

The Internet of Things (IoT) has become a guiding technology behind auto...
01/06/2020

Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure

The Internet of Things (IoT) is undergoing rapid growth in the IT indust...
08/14/2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

The Authentication and Authorization for Constrained Environments (ACE) ...
10/04/2021

Controlling Resource Allocation using Blockchain-Based Delegation

Allocation of resources and their control over multiple organisations is...
09/03/2018

Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective

Smart Services using Industrial Internet of Things (IIoT) applications a...
08/05/2021

Selective privacy in IoT smart-farms for battery-powered device longevity

This paper presents a payload security model to maintain the standards o...