IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

08/30/2019
by   Rourab paul, et al.
0

Standard security protocols like SSL, TLS, IPSec etc. have high memory and processor consumption which makes all these security protocols unsuitable for resource constrained platforms such as Internet of Things (IoT). Blockchain (BC) finds its efficient application in IoT platform to preserve the five basic cryptographic primitives, such as confidentiality, authenticity, integrity, availability and non-repudiation. Conventional adoption of BC in IoT platform causes high energy consumption, delay and computational overhead which are not appropriate for various resource constrained IoT devices. This work proposes a machine learning (ML) based smart access control framework in a public and a private BC for a smart city application which makes it more efficient as compared to the existing IoT applications. The proposed IoT based smart city architecture adopts BC technology for preserving all the cryptographic security and privacy issues. Moreover, BC has very minimal overhead on IoT platform as well. This work investigates the existing threat models and critical access control issues which handle multiple permissions of various nodes and detects relevant inconsistencies to notify the corresponding nodes. Comparison in terms of all security issues with existing literature shows that the proposed architecture is competitively efficient in terms of security access control.

READ FULL TEXT
research
11/12/2021

A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things

In view of the security issues of the Internet of Things (IoT), consider...
research
11/09/2022

DSCOT: An NFT-Based Blockchain Architecture for the Authentication of IoT-Enabled Smart Devices in Smart Cities

Smart city architecture brings all the underlying architectures, i.e., I...
research
10/04/2021

Controlling Resource Allocation using Blockchain-Based Delegation

Allocation of resources and their control over multiple organisations is...
research
08/14/2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

The Authentication and Authorization for Constrained Environments (ACE) ...
research
09/03/2018

Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective

Smart Services using Industrial Internet of Things (IIoT) applications a...
research
08/05/2021

Selective privacy in IoT smart-farms for battery-powered device longevity

This paper presents a payload security model to maintain the standards o...
research
07/15/2022

Multi-RAT IoT – What's to Gain? An Energy-Monitoring Platform

Multiple LPWANs have been rolled out to support the variety of IoT appli...

Please sign up or login with your details

Forgot password? Click here to reset