BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems

Document Type : Original Article

Authors

1 Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University

2 Department of Computer Engineering University College of Daneshvaran Tabriz, Iran

10.30467/nivar.2023.415722.1260

Abstract

The security of communication between Internet of Things devices is a big concern in this field, and with the increase in the number of devices and users, the current architecture and communication protocols cannot adequately respond to the system's needs, such as authentication and access authorization. One of the important solutions to this problem is using distributed and decentralized networks such as blockchain. So far, various blockchain-based authentication and key agreement protocols have been presented in the Internet of Things and similar environments. However, a secure authentication scheme has not been proposed for meteorological systems.
This paper proposes a secure authentication scheme based on the blockchain network for meteorological systems resistant to various attacks. The Security of the proposed project against formal and informal attacks is evaluated, and the analysis results show that Securityrity of the proposed scheme resists active and passive attacks. In the following, the proposed scheme is evaluated in terms of computational costs, and the evaluation results show that the proposed scheme is increasing compared to similar schemes due to the focus on computational security.

Keywords

Main Subjects


1.    Y. Salami and V. Khajehvand, “SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV,” J. Comput. Robot., vol. 13, no. 1, pp. 11–20, 2020.
2.    A. Ghaffari, “Designing a wireless sensor network for ocean status notification system,” Indian J. Sci. Technol., vol. 7, no. 6, p. 809, 2014.
3.    A. Ghaffari, “Congestion control mechanisms in wireless sensor networks: A survey,” J. Netw. Comput. Appl., vol. 52, pp. 101–115, 2015.
4.    S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wirel. Networks, vol. 27, pp. 1515–1555, 2021.
5.    Y. Salami, V. Khajevand, and E. Zeinali, “Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges,” J. Comput. Robot., vol. 16, no. 2, pp. 46–56, 2023.
6.    Y. Salami, F. Taherkhani, Y. Ebazadeh, M. Nemati, V. Khajehvand, and E. Zeinali, “Blockchain-Based Internet of Vehicles in Green Smart City: Applications and Challenges and Solutions,” Anthropog. Pollut., vol. 7, no. 1, 2023.
7.    H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” Int. J. Account. Inf. Syst., vol. 48, p. 100598, 2023.
8.    T. Huynh-The et al., “Blockchain for the metaverse: A Review,” Futur. Gener. Comput. Syst., 2023.
9.    A. Pasdar, Y. C. Lee, and Z. Dong, “Connect API with blockchain: A survey on blockchain oracle implementation,” ACM Comput. Surv., vol. 55, no. 10, pp. 1–39, 2023.
10.    T. M. Tan and S. Saraniemi, “Trust in blockchain-enabled exchanges: Future directions in blockchain marketing,” J. Acad. Mark. Sci., vol. 51, no. 4, pp. 914–939, 2023.
11.    A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman, “FairAccess: a new Blockchain-based access control framework for the Internet of Things,” Secur. Commun. Networks, vol. 9, no. 18, pp. 5943–5964, 2016, doi: 10.1002/sec.1748.
12.    S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, “World of empowered IoT users,” Proc. - 2016 IEEE 1st Int. Conf. Internet-of-Things Des. Implementation, IoTDI 2016, pp. 13–24, 2016, doi: 10.1109/IoTDI.2015.39.
13.    K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016, doi: 10.1109/ACCESS.2016.2566339.
14.    A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB: A Lightweight Scalable Blockchain for IoT security and anonymity,” J. Parallel Distrib. Comput., vol. 134, pp. 180–197, 2019, doi: 10.1016/j.jpdc.2019.08.005.
15.    K. R. Özyilmaz and A. Yurdakul, “Work-in-progress: Integrating low-power IoT devices to a Blockchain-Based Infrastructure,” Proc. 13th ACM Int. Conf. Embed. Softw. 2017 Companion, EMSOFT 2017, 2017, doi: 10.1145/3125503.3125628.
16.    M. K. Kebede and S. K. Pani, “Reshaping IOT Through Blockchain,” Proc. 3rd Int. Conf. I-SMAC IoT Soc. Mobile, Anal. Cloud, I-SMAC 2019, pp. 1–5, 2019, doi: 10.1109/I-SMAC47947.2019.9032442.
17.    O. Novo, “Blockchain meets IoT: An architecture for scalable access management in IoT,” IEEE internet things J., vol. 5, no. 2, pp. 1184–1195, 2018.
18.    M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of Trust: A decentralized blockchain-based authentication system for IoT,” Comput. Secur., vol. 78, pp. 126–142, 2018, doi: 10.1016/j.cose.2018.06.004.
19.    S. C. Cha, J. F. Chen, C. Su, and K. H. Yeh, “A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things,” IEEE Access, vol. 6, no. c, pp. 24639–24649, 2018, doi: 10.1109/ACCESS.2018.2799942.
20.    S. Rostampour, M. Safkhani, Y. Bendavid, and N. Bagheri, “ECCbAP: A secure ECC-based authentication protocol for IoT edge devices,” Pervasive Mob. Comput., vol. 67, p. 101194, 2020, doi: 10.1016/j.pmcj.2020.101194.
21.    M. Yavari, M. Safkhani, S. Kumari, S. Kumar, and C. M. Chen, “An Improved Blockchain-Based Authentication Protocol for IoT Network Management,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/8836214.
22.    Y. Salami, Y. Ebazadeh, and V. Khajehvand, “CE-SKE: cost-effective secure key exchange scheme in Fog Federation,” Iran J. Comput. Sci., vol. 4, no. 3, pp. 1–13, 2021.
23.    Y. Salami and V. Khajehvand, “LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation,” Complexity, vol. 2021, p. 4667586, 2021.
24.    Y. Salami, V. Khajehvand, and E. Zeinali, “SAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation,” Secur. Commun. Networks, vol. 1, 2023.
25.    Y. Salami, V. Khajehvand, and E. Zeinali, “SOS-FCI: a secure offloading scheme in fog–cloud-based IoT,” J. Supercomput., pp. 1–31, 2023. “Avispa.” http://www.avispa-project.org/
26.    Y. Salami, V. Khajehvand, and E. Zeinali, “E3C: A Tool for Evaluating Communication and Computation Costs in Authentication and Key Exchange Protocol,” 2022, doi: 10.48550/ARXIV.2212.03308.
27.    D. Von Oheimb, “The high-level protocol specification language HLPSL developed in the EU project AVISPA,” in Proceedings of APPSEM 2005 workshop, 2005, pp. 1–17.
28.    R. Küsters and T. Wilke, “Automata-Based Analysis of Recursive Cryptographic Protocols,” in STACS 2004, 2004, pp. 382–393.
 
  • Receive Date: 09 June 2023
  • Revise Date: 06 July 2023
  • Accept Date: 19 September 2023
  • First Publish Date: 19 September 2023