Blockchain Based Confidential Communication and Authorization Model for IoT Devices


Altun A., Dalkılıç G.

Innovations in Intelligent Systems and Applications Conference (ASYU), İzmir, Türkiye, 31 Ekim - 02 Kasım 2019, ss.595-600 identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Cilt numarası:
  • Doi Numarası: 10.1109/asyu48272.2019.8946360
  • Basıldığı Şehir: İzmir
  • Basıldığı Ülke: Türkiye
  • Sayfa Sayıları: ss.595-600
  • Anahtar Kelimeler: IoT, gateway, blockchain, security
  • Dokuz Eylül Üniversitesi Adresli: Evet

Özet

The Internet of things (IoT) has many unexplored potentials. Features such as low purchasing costs, low energy consumption, and small size make the Internet of things indispensable and irreplaceable. However, the fact that they only have enough processor power to run particular tasks has led to the failure of implementation of many traditional security measures to the IoT environment, which are developed to date. Furthermore, the producers bring early products to the market due to the market share concerns. Moreover, the lack of knowledge of security measures to be taken by developers creates lots of security loopholes and causes unauthorized persons to seize a lot of valuable information, which undermines the trust of the users. Likewise, the unpredictable and rapid growth of IoT devices highlights the importance of scalability, authorization and encryption issues. Although partial solutions are being suggested to address these concerns, a generally accepted solution still does not exist. Thanks to its tamper-proof, decentralized, distributed, programmable structure, blockchain can be used as a solution to these security concerns. Blockchain-based authentication and access control systems can be used to strengthen IoT security. Until recently, it has been thought that communication over the blockchain network is not possible for resource-constrained devices because the communication depends on using not only complex but also memory hungry cryptography algorithms. In this paper, our application aims resource-constrained device authorization through the blockchain network that is presented together with the analysis and test results related to this study.