Rogue device mitigation in the internet of things: A blockchain-based access control approach

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorJavaid, Uzairen_US
dc.contributor.authorJameel, Furqanen_US
dc.contributor.authorJavaid, Umairen_US
dc.contributor.authorKhan, Muhammad Toaha Razaen_US
dc.contributor.authorJäntti, Rikuen_US
dc.contributor.departmentDepartment of Communications and Networkingen
dc.contributor.groupauthorCommunication Engineeringen
dc.contributor.organizationNational University of Singaporeen_US
dc.contributor.organizationUniversité Catholique de Louvainen_US
dc.contributor.organizationKyungpook National Universityen_US
dc.date.accessioned2020-12-31T08:51:19Z
dc.date.available2020-12-31T08:51:19Z
dc.date.issued2020-10-28en_US
dc.description.abstractRecent technological developments in wireless and sensor networks have led to a paradigm shift in interacting with everyday objects, which nurtured the concept of Internet of Things (IoT). However, low-powered nature of IoT devices generally becomes a hindrance that makes them vulnerable to a wide array of attacks. Among these, the emergence of rogue devices is quickly becoming a major security concern. Rogue devices are malicious in nature which typically execute different kinds of cyberattacks by exploiting the weaknesses of access control schemes in IoT environments. Therefore, access control is one of the crucial aspects of an IoT ecosystem that defines an entry point for a device or a user in the network. This paper investigates this issue and presents an access control scheme by integrating an IoT network with blockchain technology, thereby arguing to replace the traditional centralized IoT-server architecture with a decentralized one. The blockchain is used with smart contracts to establish a secure platform for device registration. Due to this reason, the IoT devices are first required to register themselves and access the network via contracts thereafter. Moreover, the contracts host a device registry, the access control list, to grant or deny access to devices. This allows the proposed scheme to authorize registered devices only and block unregistered ones, which facilitates the mitigation of rogue devices. To demonstrate the feasibility and improvements of the proposed scheme, security analysis along with in-depth performance evaluation are conducted, where the obtained results indicate its applicability. A case study is also formulated with a comparative analysis that confirms the superior performance of the proposed scheme for low-powered IoT systems.en
dc.description.versionPeer revieweden
dc.format.extent13
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationJavaid, U, Jameel, F, Javaid, U, Khan, M T R & Jäntti, R 2020, ' Rogue device mitigation in the internet of things: A blockchain-based access control approach ', MOBILE INFORMATION SYSTEMS, vol. 2020, 8831976 . https://doi.org/10.1155/2020/8831976en
dc.identifier.doi10.1155/2020/8831976en_US
dc.identifier.issn1574-017X
dc.identifier.otherPURE UUID: fac6cd01-bd4c-4e7a-acb3-b66dbc32ccd4en_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/fac6cd01-bd4c-4e7a-acb3-b66dbc32ccd4en_US
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85096035707&partnerID=8YFLogxKen_US
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/53624304/ELEC_Javaid_Rogue_device_MCS.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/101682
dc.identifier.urnURN:NBN:fi:aalto-2020123160503
dc.language.isoenen
dc.publisherHINDAWI LTD
dc.relation.ispartofseriesMOBILE INFORMATION SYSTEMSen
dc.relation.ispartofseriesVolume 2020en
dc.rightsopenAccessen
dc.titleRogue device mitigation in the internet of things: A blockchain-based access control approachen
dc.typeA1 Alkuperäisartikkeli tieteellisessä aikakauslehdessäfi
dc.type.versionpublishedVersion

Files