Abstract
In smart home technology, we are facing with increasing development in communications and capabilities which enforces to design a robust and scalable scheme for access verification. Nonetheless, without proper authentication preventing from unauthorized access is not possible. Although, some related schemes have presented to address security challenges, these are usually implemented relying on the central point considered as a trusted third party and suffered from drawbacks such as single point failure, privacy violation, monitoring user’s activities, lack of transparency, incongruous with the computing capability of devices. However, we propose a blockchain-based authentication and access verification scheme (BAAS) to mitigate security and efficiency challenge in smart home. In this model we determined blockchain nodes which are spread throughout in whole area. These nodes store all issued access policies in an efficient and tamper-proof data structure called Merkle Patricia Tree (MPT) and provide distributed access verification. BAAS advantages of: providing mutual and point to point authentication; eliminating direct mediators; exploiting attribute-based signature to achieve privacy-preserving; increasing efficiency by providing distribution; increasing trust by providing transparency on the activities of blockchain nodes and profiting of MPT that grantees the integrity and provides efficient detection. Meanwhile, implementing security analysis proves all provided security features. Besides, BAAS is simulated on OPNET software to evaluate its computational complexity and validate functionality.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abdi Nasib Far H, Bayat M, Kumar Das A, Fotouhi M, Pournaghi SM, Doostari MA (2021) LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wireless Netw 27(2):1389–1412. https://doi.org/10.1007/s11276-020-02523-9
Ammi M, Alarabi S, Benkhelifa E (2021) Customized blockchain-based architecture for secure smart home for lightweight IoT. Inf Process Manag 58(3):102482. https://doi.org/10.1016/j.ipm.2020.102482
Ashibani Y, Mahmoud QH (2018) An efficient and secure scheme for smart home communication using identity-based signcryption. 2017 IEEE 36th International Performance Computing and Communications Conference, IPCCC 2017 2018-Janua:1–7, https://doi.org/10.1109/PCCC.2017.8280497
Bhardwaj S, Ozcelebi T, Lukkien J, Uysal C (2012) Resource and service management architecture of a low capacity network for smart spaces. IEEE Trans Consum Electron 58(2):389–396. https://doi.org/10.1109/TCE.2012.6227438
Chakravorty A, Wlodarczyk T, Rong C (2013) Privacy preserving data analytics for smart homes. In: 2013 IEEE Security and Privacy Workshops, pp 23–27, https://doi.org/10.1109/SPW.2013.22
Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ecc-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electr Eng 69:534–554
Chen Y, Luo B (2012) S2A: Secure Smart Household Appliances. Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY ’12 pp 217–228, https://doi.org/10.1145/2133601.2133628, URL http://dl.acm.org/citation.cfm?doid=2133601.2133628
Chifor BC, Bica I, Patriciu VV, Pop F (2018) A security authorization scheme for smart home Internet of Things devices. Futur Gener Comput Syst 86:740–749. https://doi.org/10.1016/j.future.2017.05.048
Christidis K, Devetsikiotis M (2016) Blockchains and Smart Contracts for the Internet of Things,” in IEEE Access, vol. 4, no. , pp. 2292-2303, 2016. IEEE Access 4:2292–2303, https://doi.org/10.1109/ACCESS.2016.2566339
Collen A, Nijdam NA, Augusto-Gonzalez J, Katsikas SK, Giannoutakis KM, Spathoulas G, Gelenbe E, Votis K, Tzovaras D, Ghavami N, et al. (2018) Ghost-safe-guarding home iot environments with personalised real-time risk control. In: International ISCIS Security Workshop, Springer, pp 68–78
Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: The case study of a smart home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017 (January):618–623, https://doi.org/10.1109/PERCOMW.2017.7917634
Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Internet Things 9:100158. https://doi.org/10.1016/j.iot.2020.100158
Feng X, Shi Q, Xie Q, Liu L (2021) An efficient privacy-preserving authentication model based on blockchain for VANETs. J Syst Arch. https://doi.org/10.1016/j.sysarc.2021.102158
Fernández-caramés TM, Member S (2018) A review on the use of blockchain for the internet of things. Ieee Access 3536:32979–33001. https://doi.org/10.1109/ACCESS.2018.2842685
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA, CCS ’06, p 89–98, https://doi.org/10.1145/1180405.1180418,
Gramoli V (2017) From blockchain consensus back to Byzantine consensus. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.09.023
Han K, Kim J, Shon T, Ko D (2013) A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers Ubiquit Comput 17(5):945–949. https://doi.org/10.1007/s00779-012-0541-2
He D, Zeadally S, Kumar N, Wu W (2016) Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans Inf Forensics Secur 11(9):2052–2064. https://doi.org/10.1109/TIFS.2016.2573746
He Q, Guan N, Lv M, Yi W (2018) On the Consensus Mechanisms of Blockchain/DLT for Internet of Things. 2018 IEEE 13th International Symposium on Industrial Embedded Systems, SIES 2018 - Proceedings pp 1–10, https://doi.org/10.1109/SIES.2018.8442076
Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JR, Filippoupolitis A, Roesch E (2018) A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 78:398–428. https://doi.org/10.1016/j.cose.2018.07.011
Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JR, Filippoupolitis A, Roesch E (2018) A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 78:398–428
Islam SKH, Khan MK, Al-khouri AM (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur Commun Netw 8(13):2214–2231
Kaur D, Kumar D (2021) Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. J Inf Secur Appl 58(February):102787. https://doi.org/10.1016/j.jisa.2021.102787
Khan MA, Salah K (2018) IoT security: Review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411. https://doi.org/10.1016/j.future.2017.11.022
Kim GW, Lee DG, Han JW, Lee SH, Kim SW (2009) Security technologies based on a home gateway for making smart homes secure. Internet Res 19(2):209–226. https://doi.org/10.1108/10662240910952355
Kim Y, Park J (2020) Hybrid decentralized PBFT blockchain framework for openstack message queue. Human-Centr Comput Inf Sci. https://doi.org/10.1186/s13673-020-00238-6
Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221. https://doi.org/10.1016/j.comnet.2018.03.012
Kumar P, Gurtov A, Iinatti J, Ylianttila M, Sain M (2016) Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens J 16(1):254–264. https://doi.org/10.1109/JSEN.2015.2475298
Lamport L, Shostak R, Pease M (1982) The Byzantine generals problem. ACM Trans Progr Lang Syst (TOPLAS) 4(3):382–401. https://doi.org/10.1145/357172.357176
Li J, Au MH, Susilo W, Xie D, Ren K (2010) Attribute-based signature and its applications. Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 pp 60–69, https://doi.org/10.1145/1755688.1755697
Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Fut Gen Comput Syst. https://doi.org/10.1016/j.future.2017.08.020
Li Y (2013) Design of a key establishment protocol for smart home energy management system. Proceedings - 5th International Conference on Computational Intelligence, Communication Systems, and Networks, CICSyN 2013 pp 88–93, https://doi.org/10.1109/CICSYN.2013.42
Lin C, He D, Huang X, Choo KKR, Vasilakos AV (2018) BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116(February):42–52. https://doi.org/10.1016/j.jnca.2018.05.005
Lin C, He D, Huang X, Choo KKR, Vasilakos AV (2018) BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42–52. https://doi.org/10.1016/j.jnca.2018.05.005
Liu J, Li X, Jiang Q, Obaidat MS, Vijayakumar P (2020) BUA: a blockchain-based unlinkable authentication in VANETs. IEEE Conf Commun. https://doi.org/10.1109/ICC40277.2020.9148863
Lu Z, Wang Q, Qu G, Zhang H, Liu Z (2019) A blockchain-based privacy-preserving authentication scheme for VANETs. IEEE Trans Very Large Scale Integr Syst 27(12):2792–2801. https://doi.org/10.1109/TVLSI.2019.2929420
Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Cryptographers’ track at the RSA conference, Springer, pp 376–392
Malluhi QM, Shikfa A, Tran VD, Trinh VC (2019) Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices. Comput Commun 145(June):113–125. https://doi.org/10.1016/j.comcom.2019.06.008
Mohanta BK, Jena D, Panda SS, Sobhanayak S (2019) Blockchain technology: A survey on applications and security privacy challenges. Internet of Things 8:100107, https://doi.org/10.1016/j.iot.2019.100107, URL https://www.sciencedirect.com/science/article/pii/S2542660518300702
Mohanty SN, Ramya K, Rani SS, Gupta D, Shankar K, Lakshmanaprabu S, Khanna A (2020) An efficient lightweight integrated blockchain (elib) model for iot security and privacy. Future Generation Computer Systems 102:1027–1037, https://doi.org/10.1016/j.future.2019.09.050, URL https://www.sciencedirect.com/science/article/pii/S0167739X19319843
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentr Bus Rev 2:21260
Peng L, Feng W, Yan Z, Li Y, Zhou X, Shimizu S (2021) Privacy preservation in permissionless blockchain: A survey. Digital Communications and Networks 7(3):295–307, https://doi.org/10.1016/j.dcan.2020.05.008, URL https://www.sciencedirect.com/science/article/pii/S2352864819303827
Pournaghi SM, Zahednejad B, Bayat M, Farjami Y (2018) NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput Netw 134:78–92. https://doi.org/10.1016/j.comnet.2018.01.015
Pournaghi SM, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Humaniz Comput 0123456789:1–29. https://doi.org/10.1007/s12652-020-01710-y
Risteska Stojkoska BL, Trivodaliev KV (2017) A review of Internet of Things for smart home: Challenges and solutions. J Clean Prod 140:1454–1464. https://doi.org/10.1016/j.jclepro.2016.10.006
Rivest RL, Hellman ME, Anderson JC (1992) Responses to NIST’s Proposal. Commun ACM 35(7):41–54. https://doi.org/10.1145/129902.129905
Salah K, Calyam P, Buhari MI (2008) Assessing readiness of IP networks to support desktop videoconferencing using OPNET. J Netw Comput Appl 31(4):921–943. https://doi.org/10.1016/j.jnca.2007.01.001
Salman T, Zolanvari M, Erbad A, Jain R, Samaka M (2019) Security services using blockchains: a state of the art survey. IEEE Commun Surv Tutori 21(1):858–880. https://doi.org/10.1109/COMST.2018.2863956
Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146. https://doi.org/10.1016/j.cose.2019.06.002
de Oliveira T, Dang HV, Lúcio LH, Marquering HA, Olabarriaga S (2021) AC-AC: Dynamic revocable access control for acute care teams to access medical records. Smart Health 20:100190. https://doi.org/10.1016/j.smhl.2021.100190
Tschofenig H, Arkko J, Thaler D, McPherson D (2015) Architectural considerations in smart object networking. RFC 7452
Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper pp 1–32, https://doi.org/10.1017/CBO9781107415324.004, arXiv:1011.1669v3
Yao Y, Chang X, Misic J, Misic VB, Li L (2019) BLA: Blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J 6(2):3775–3784. https://doi.org/10.1109/JIOT.2019.2892009
Zhang S, Rong J, Wang B (2020) A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. Int J Electr Power Energy Syst 121(March):106140. https://doi.org/10.1016/j.ijepes.2020.106140
Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29(8):1721–1735
Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: Using blockchain to protect personal data. Proceedings - 2015 IEEE Security and Privacy Workshops. SPW 2015 pp 180–184, https://doi.org/10.1109/SPW.2015.27
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Heshmati, A., Bayat, M., Doostari, M. et al. Blockchain based authentication and access verfication scheme in smart home. J Ambient Intell Human Comput 14, 2525–2547 (2023). https://doi.org/10.1007/s12652-022-04501-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-04501-9