DEVELOPMENT AND ANALYSIS OF AUTHENTICATION METHOD FOR IOT DEVICES SOFTWARE ON THE NETWORK USING BLOCKCHAIN TECHNOLOGIES

Authors

  • Dmitry Gennadevich Shtennikov Faculty of Software Engineering and Computer Systems, ITMO Universaty (RU)
  • Kirill Sergeevich Kuzmin Faculty of Software Engineering and Computer Systems, ITMO Universaty (RU)
  • Nikolay Evgenevich Letov Faculty of Software Engineering and Computer Systems, ITMO Universaty (RU)

DOI:

https://doi.org/10.17770/etr2019vol2.4066

Keywords:

IoT, Software integrity, Blockchain

Abstract

Currently, there is an unsolved problem of IoT device authentication in networks to ensure their security. Due to low performance, work with traditional methods of protection is complicated and therefore a different approach is required. The article proposes a method for authenticating IoT devices (devices and software) by verifying their data and then entering it into the data storage. The implementation of a data storage using blockchain technology and the comparison of its efficiency with a classical database are considered. The aim of research is evelopment of the IoT device authentication method, analysis of the effectiveness and applicability of the developed method and comparison of various technological approaches to solving the problem. Obtained results is evaluation parameters of the resulting system and methods for constructing systems based on this method.

Downloads

Download data is not yet available.

References

Donald E. Knuth. The Art of Computer Programming, vol.3. Sorting and Searching, Second Edition (Reading, Massachusetts: Addison-Wesley, 1998), xiv+780pp.+foldout. ISBN 0-201-89685-0

Melanie Swan. Blockchain: Blueprint for a New Economy O'Reilly, 2015

Blockchain and IoT: interaction perspectives and problems on the way of development [Online] https://forklog.com/blokchejn-i-iot-perspektivy-vzaimodejstviya-i-problemy-na-puti-razvitiya/ [Acessed: 27 Feb, 2019]

Bitcoin: A Peer-to-Peer Electronic Cash System [Online] https://bitcoin.org/bitcoin.pdf [Acessed: March 2, 2019].

The method of guaranteeing trust in blockchains [Online]. https://habr.com/post/338696/ [Acessed: Feb 25, 2019]

Arduino vs. Raspberry Pi: Mortal enemies, or best friends? [Online] https://www.digitaltrends.com/computing/arduino-vs-raspberry-pi/ [Acessed: Feb 24, 2019]

Arduino official site [Online] URL: https://www.arduino.cc/

Raspberry PI official site[Online] https://www.raspberrypi.org/

A. Zanella, N. Bui, A. Castellani, L. Vangelista and M. Zorzi, "Internet of Things for Smart Cities," in IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, Feb. 2014 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6740844&isnumber=6810798

H.C. Pöhls, JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application, in: Proc. 9th Int. Conf. Innovative Mobile Internet Serv. in Ubiquitous Comput., IMIS’15, 2015, pp. 306–312

G. Prisco, Slock. it to introduce smart locks linked to smart ethereum contracts, decentralize the sharing economy, Bitcoin Mag. (Nov) (2015) (online), Available: https://bitcoinmagazine.com/articles/sloc- it-to-introduce-smart-locs-lined-to-smart-ethereum-contractsdecentralize-the-sharing-economy-1446746719, (Accessed:02 February 2019)

Downloads

Published

2019-06-20

How to Cite

[1]
D. G. Shtennikov, K. S. Kuzmin, and N. E. Letov, “DEVELOPMENT AND ANALYSIS OF AUTHENTICATION METHOD FOR IOT DEVICES SOFTWARE ON THE NETWORK USING BLOCKCHAIN TECHNOLOGIES”, ETR, vol. 2, pp. 126–131, Jun. 2019, doi: 10.17770/etr2019vol2.4066.