Abstract

As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their logs before sending it to gateway and server, so that the logs are not revealed to the public during communication process. Along with blockchain, we introduce the concept “signature chain”. The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. Our work also employs attribute-based encryption to achieve fine-grained access control and data confidentiality. The results of security analysis using AVSIPA toolset, GNY logic and semantic proof indicate that the proposed protocol meets various security requirements. Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT.

Highlights

  • With the popularization of computers and rapid development of mobile network technologies, Internet of Things (IoT) has become prevalent

  • Our work proposes an autonomous log storage management protocol with blockchain mechanism and access control for IoT environments

  • Fine-grained access control with ciphertext policy attribute-based encryption is proposed in our work

Read more

Summary

Introduction

With the popularization of computers and rapid development of mobile network technologies, Internet of Things (IoT) has become prevalent. Enabled with fifth generation (5G) technology, communication in IoT environments is performed with super low latency, high-peak data rates and massive network capacity [1]. Data aggregation and transmission in IoT networks have been significantly improved, in order to provide better efficiency of energy consumption, network control overhead, delay time, loss packet and aggregation rates [2]. Due to these advances, IoT has huge potentials to change the information technology, enhance reliability of communication systems, as well as improve our life quality. Logs generated by IoT devices contain important contents and sensitive information. Specific uses of the logs include device monitoring [11], user behavior analysis [12], or digital forensics [13]

The Problems
Related Works
Main Contributions
Paper Structure
Linear Secret-Sharing Scheme
Attribute-Based Encryption
Signcryption
Bilinear Map
Boneh-Lynn-Shacham Signature Scheme
Blockchain
Single Sign-on
System Model
Security Goals
Procedure of the Proposed Protocol
System Initialization Phase
SSO Registration Phase
SSO Login Phase
SSO Password Generation Phase
Device Registration Phase
User Registration Phase
Log Signcryption Phase
Log Unsigncryption Phase
3.3.10. Private Block Calculation Phase
3.3.11. Private Block Verification Phase
3.3.12. Public Block Calculation Phase
3.3.13. Public Block Verification Phase
Security Analysis
SUMMARY
Semantic Proof
Comparison with Related Works
Performance Analysis
Implementation
Practical Procedure
11. Suppose we have private block
System Construction
Development
G MicroSD
11. Setting
System
12. Device
13. Account
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call