IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

by   Rourab paul, et al.

Standard security protocols like SSL, TLS, IPSec etc. have high memory and processor consumption which makes all these security protocols unsuitable for resource constrained platforms such as Internet of Things (IoT). Blockchain (BC) finds its efficient application in IoT platform to preserve the five basic cryptographic primitives, such as confidentiality, authenticity, integrity, availability and non-repudiation. Conventional adoption of BC in IoT platform causes high energy consumption, delay and computational overhead which are not appropriate for various resource constrained IoT devices. This work proposes a machine learning (ML) based smart access control framework in a public and a private BC for a smart city application which makes it more efficient as compared to the existing IoT applications. The proposed IoT based smart city architecture adopts BC technology for preserving all the cryptographic security and privacy issues. Moreover, BC has very minimal overhead on IoT platform as well. This work investigates the existing threat models and critical access control issues which handle multiple permissions of various nodes and detects relevant inconsistencies to notify the corresponding nodes. Comparison in terms of all security issues with existing literature shows that the proposed architecture is competitively efficient in terms of security access control.


A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things

In view of the security issues of the Internet of Things (IoT), consider...

Securing IoT Applications using Blockchain: A Survey

The Internet of Things (IoT) has become a guiding technology behind auto...

Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure

The Internet of Things (IoT) is undergoing rapid growth in the IT indust...

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

The Authentication and Authorization for Constrained Environments (ACE) ...

Controlling Resource Allocation using Blockchain-Based Delegation

Allocation of resources and their control over multiple organisations is...

Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective

Smart Services using Industrial Internet of Things (IIoT) applications a...

Selective privacy in IoT smart-farms for battery-powered device longevity

This paper presents a payload security model to maintain the standards o...