Secure Path: Block-Chaining IoT Information for Continuous Authentication in Smart Spaces

نویسندگان

چکیده

The Internet of Things offers a wide range possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors opportunistically used feed behavioural authentication systems. How integrate all this information in reliable way get continuous service presents several open challenges. Among these: how combine semi-trusted coming non-tamper-proof sensors, where store such data avoiding single point failure, analyse distributed way, which interface use provide an multitude different services and applications. In paper, we present Blockchain-based architectural solution system able transform IoT interactions into useful system. design includes: (i) security procedure certify users’ positions identities, (ii) secure storage hold information, (iii) dynamically assign trust level user’s position. We call “Secure Path”.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways

In this paper, a secure and efficient authentication and authorization architecture for IoT-based healthcare is developed. Security and privacy of patients’ medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. Secure authentication and authorization of a remote healthcare professional is the main focus of this work. Due to resource constraints of medical sensors,...

متن کامل

Secure continuous biometric-enhanced authentication

Biometrics have the potential to solidify person-authentication by examining "unforgeable" features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

On the Security of Cipher Block Chaining Message Authentication Code

In [4], Bernstein presented a simple proof of security of Cipher Block Chaining (CBC) Message Authentication Code (MAC) against adversaries querying messages all of which are of the same length. In this paper we show that Bernstein’s proof can be used to prove security of CBC MAC against adversaries querying non-empty messages that are not prefixes of each other. This implies that “length-prepe...

متن کامل

The Security of the Cipher Block Chaining Message Authentication Code

Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) speci es that an m-block message x = x1 xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a pre x of ym, where y0 = 0 l and yi = Fa(mi yi 1) for i = 1; 2; : : : ;m. This method is a pervasively used international and U.S. stan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iot

سال: 2021

ISSN: ['2624-831X']

DOI: https://doi.org/10.3390/iot2020017