검색 상세

Blockchain-enabled access control with fog nodes for independent IoTs

초록/요약

Nowadays, Internet of Things (IoT) Devices are conveyed at an enormous scope, with Cisco foreseeing deployment of 500 billion devices by 2030. Thus, there will be an unimaginably vast amount of data produced by those devices. Because the IoT devices have limited capabilities and are being deployed in a large amount shortly, current traditional IoT platforms may not be able to handle access control effectively in terms of scalability, reliability, and real-time response. As a general observation, it may be realistic to claim that the predominant usage of computer technologies as it has developed also means that people tend to trust their devices far more consistently than when computers were first introduced to the public a few decades ago. We can notice many reasons for this higher level of confidence that aligns well with the field of computer technology overall, mainly due to the prevalence of digitalization as it has evolved within the past forty years. People from many diverse backgrounds accept the predominance of various smart devices and the interconnectedness they offer while not always realizing the high degree of complexity that goes into their production. They are just a part of everyday life, and people expect them to be reliable and secure for daily usage. Thus, technology and society have progressed together in unique ways. An onlooker from a bygone era would be surprised to note the changes in society even though humans most likely looked like contemporary people, as the following depiction shows: There would be one striking difference that would be immediately evident. From scientists to a secretary, their work would revolve around computer technology [1]. However, there are still some significant issues on data security that needs to be addressed thoroughly. We may consider Fog (Edge) computing technologies to handle some of the security issues. On the other hand, with the advancement of blockchain technology, edge computing, and Role-based IoT networks, we can produce a secure access control scheme in a distributed manner with higher reliability, scalability, and real-time response. Therefore, we proposed a decentralized IoT access control system based on blockchain, fog nodes, and the role of things utilizing Ethereum smart contracts for secure device-to-device access. We present overall Platform architecture, problem definition, use case scenarios, and discuss crucial evaluation viewpoints identified with security analyses, reliability, testing, and implementation of the proposed work.

more

목차

I. INTRODUCTION 1
II. BACKGROUND 4
A. Internet Of Things Architecture 4
B. Access Management in IoT 5
C. Blockchain and Ethereum Smart Contracts 7
D. Fog (Edge) Computing 8
E. Related Works 10
III. PROPOSED SOLUTION 13
A. Complete Platform Structure 13
B. Role of Things (RoT) 16
C. Devices Interactions and Access Management 17
IV. IMPLEMENTATION 19
A. The Smart Contract Variables, Structs, and Modifiers 19
B. Adding devices to fog nodes and sensors mapping 21
C. Deleting IoT Devices mappings 23
D. Access Token Creation 24
V. EXPERIMENTING 27
A. Adding/deleting operations. 27
B. Access Token Creation for Role of Things 30
VI. EVALUATION 33
A. Comparative Analysis 33
B. Security Analysis 34
VII. CONCLUSION 36
REFERENCES 38

more