طرح احراز هویت ایمن مبتنی بر بلاکچین در سیستم‌های هواشناسی

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشجوی دکتری گروه مهندسی کامپیوتر و فناوری اطلاعات، واحد قزوین، دانشگاه آزاد اسلامی، قزوین، ایران

2 دانشجوی کارشناسی ارشد مهندسی کانپیوتر گرایش نرم افزار موسسه آموزش عالی دانش وران تبریز ، تبریز، ایران

10.30467/nivar.2023.415722.1260

چکیده

امنیت ارتباطات بین دستگاه‌های اینترنت اشیا یک نگرانی بزرگ در این زمینه است و با افزایش تعداد دستگاه‌ها و کاربران، معماری فعلی و پروتکل‌های ارتباطی نمی‌توانند به نیازهای سیستم مانند احراز هویت، مجوز دسترسی پاسخ کافی بدهند. یکی از راه حل های مهم این مسئله استفاده از شبکه‌های توزیع شده و غیرمتمرکز مانند بلاکچین است. تاکنون پروتکلهای احراز هویت و توافق کلید مختلفی مبتنی بر بلاکچین در اینترنت اشیا و سایر محیط ها مشابه ارائه شده است با این حال طرح احراز هویت امنی برای سیستم‌های هواشناسی پیشنهاد نشده است .در این مقاله، ما طرح احراز هویت ایمن مبتنی بر شبکه بلاکچین را برای سیستم‌های هواشناسی پیشنهاد میدهیم که در برابر حملات مختلف مقاوم است.. امنیت طرح پیشنهادی در مقابل حملات به صورت رسمی و غیر رسمی، مورد ارزیابی قرار گرفته و نتایج تجزیه و تحلیل امنیتی نشان می‌دهد که امنیت طرح پیشنهادی در مقابل حملات اکتیو و پسیو مقاوم است. در ادامه طرح پیشنهادی از نظر هزینه‌های پردازشی مورد ارزیابی قرار گرفته که نتایج ارزیابی طرح پیشنهادی نشان می‌دهد طرح پیشنهادی نسبت به طرح‌های مشابه به دلیل تمرکز روی امنیت هزینه پردازشی رو به افزایش است.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems

نویسندگان [English]

  • Yashar Salami 1
  • Seyedreza Hosseini 2
1 Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University
2 Department of Computer Engineering University College of Daneshvaran Tabriz, Iran
چکیده [English]

The security of communication between Internet of Things devices is a big concern in this field, and with the increase in the number of devices and users, the current architecture and communication protocols cannot adequately respond to the system's needs, such as authentication and access authorization. One of the important solutions to this problem is using distributed and decentralized networks such as blockchain. So far, various blockchain-based authentication and key agreement protocols have been presented in the Internet of Things and similar environments. However, a secure authentication scheme has not been proposed for meteorological systems.
This paper proposes a secure authentication scheme based on the blockchain network for meteorological systems resistant to various attacks. The Security of the proposed project against formal and informal attacks is evaluated, and the analysis results show that Securityrity of the proposed scheme resists active and passive attacks. In the following, the proposed scheme is evaluated in terms of computational costs, and the evaluation results show that the proposed scheme is increasing compared to similar schemes due to the focus on computational security.

کلیدواژه‌ها [English]

  • Blockchain
  • Meteorological
  • Security
  • Authentication
  • Access Control
1.    Y. Salami and V. Khajehvand, “SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV,” J. Comput. Robot., vol. 13, no. 1, pp. 11–20, 2020.
2.    A. Ghaffari, “Designing a wireless sensor network for ocean status notification system,” Indian J. Sci. Technol., vol. 7, no. 6, p. 809, 2014.
3.    A. Ghaffari, “Congestion control mechanisms in wireless sensor networks: A survey,” J. Netw. Comput. Appl., vol. 52, pp. 101–115, 2015.
4.    S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wirel. Networks, vol. 27, pp. 1515–1555, 2021.
5.    Y. Salami, V. Khajevand, and E. Zeinali, “Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges,” J. Comput. Robot., vol. 16, no. 2, pp. 46–56, 2023.
6.    Y. Salami, F. Taherkhani, Y. Ebazadeh, M. Nemati, V. Khajehvand, and E. Zeinali, “Blockchain-Based Internet of Vehicles in Green Smart City: Applications and Challenges and Solutions,” Anthropog. Pollut., vol. 7, no. 1, 2023.
7.    H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” Int. J. Account. Inf. Syst., vol. 48, p. 100598, 2023.
8.    T. Huynh-The et al., “Blockchain for the metaverse: A Review,” Futur. Gener. Comput. Syst., 2023.
9.    A. Pasdar, Y. C. Lee, and Z. Dong, “Connect API with blockchain: A survey on blockchain oracle implementation,” ACM Comput. Surv., vol. 55, no. 10, pp. 1–39, 2023.
10.    T. M. Tan and S. Saraniemi, “Trust in blockchain-enabled exchanges: Future directions in blockchain marketing,” J. Acad. Mark. Sci., vol. 51, no. 4, pp. 914–939, 2023.
11.    A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman, “FairAccess: a new Blockchain-based access control framework for the Internet of Things,” Secur. Commun. Networks, vol. 9, no. 18, pp. 5943–5964, 2016, doi: 10.1002/sec.1748.
12.    S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, “World of empowered IoT users,” Proc. - 2016 IEEE 1st Int. Conf. Internet-of-Things Des. Implementation, IoTDI 2016, pp. 13–24, 2016, doi: 10.1109/IoTDI.2015.39.
13.    K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016, doi: 10.1109/ACCESS.2016.2566339.
14.    A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB: A Lightweight Scalable Blockchain for IoT security and anonymity,” J. Parallel Distrib. Comput., vol. 134, pp. 180–197, 2019, doi: 10.1016/j.jpdc.2019.08.005.
15.    K. R. Özyilmaz and A. Yurdakul, “Work-in-progress: Integrating low-power IoT devices to a Blockchain-Based Infrastructure,” Proc. 13th ACM Int. Conf. Embed. Softw. 2017 Companion, EMSOFT 2017, 2017, doi: 10.1145/3125503.3125628.
16.    M. K. Kebede and S. K. Pani, “Reshaping IOT Through Blockchain,” Proc. 3rd Int. Conf. I-SMAC IoT Soc. Mobile, Anal. Cloud, I-SMAC 2019, pp. 1–5, 2019, doi: 10.1109/I-SMAC47947.2019.9032442.
17.    O. Novo, “Blockchain meets IoT: An architecture for scalable access management in IoT,” IEEE internet things J., vol. 5, no. 2, pp. 1184–1195, 2018.
18.    M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of Trust: A decentralized blockchain-based authentication system for IoT,” Comput. Secur., vol. 78, pp. 126–142, 2018, doi: 10.1016/j.cose.2018.06.004.
19.    S. C. Cha, J. F. Chen, C. Su, and K. H. Yeh, “A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things,” IEEE Access, vol. 6, no. c, pp. 24639–24649, 2018, doi: 10.1109/ACCESS.2018.2799942.
20.    S. Rostampour, M. Safkhani, Y. Bendavid, and N. Bagheri, “ECCbAP: A secure ECC-based authentication protocol for IoT edge devices,” Pervasive Mob. Comput., vol. 67, p. 101194, 2020, doi: 10.1016/j.pmcj.2020.101194.
21.    M. Yavari, M. Safkhani, S. Kumari, S. Kumar, and C. M. Chen, “An Improved Blockchain-Based Authentication Protocol for IoT Network Management,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/8836214.
22.    Y. Salami, Y. Ebazadeh, and V. Khajehvand, “CE-SKE: cost-effective secure key exchange scheme in Fog Federation,” Iran J. Comput. Sci., vol. 4, no. 3, pp. 1–13, 2021.
23.    Y. Salami and V. Khajehvand, “LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation,” Complexity, vol. 2021, p. 4667586, 2021.
24.    Y. Salami, V. Khajehvand, and E. Zeinali, “SAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation,” Secur. Commun. Networks, vol. 1, 2023.
25.    Y. Salami, V. Khajehvand, and E. Zeinali, “SOS-FCI: a secure offloading scheme in fog–cloud-based IoT,” J. Supercomput., pp. 1–31, 2023. “Avispa.” http://www.avispa-project.org/
26.    Y. Salami, V. Khajehvand, and E. Zeinali, “E3C: A Tool for Evaluating Communication and Computation Costs in Authentication and Key Exchange Protocol,” 2022, doi: 10.48550/ARXIV.2212.03308.
27.    D. Von Oheimb, “The high-level protocol specification language HLPSL developed in the EU project AVISPA,” in Proceedings of APPSEM 2005 workshop, 2005, pp. 1–17.
28.    R. Küsters and T. Wilke, “Automata-Based Analysis of Recursive Cryptographic Protocols,” in STACS 2004, 2004, pp. 382–393.