Abstract

Blockchain technology has been commonly used in the last years in numerous fields, such as transactions documenting and monitoring real assets (house, cash) or intangible assets (copyright, intellectual property). The internet of things (IoT) technology, on the other hand, has become the main driver of the fourth industrial revolution, and is currently utilized in diverse fields of industry. New approaches have been established through improving the authentication methods in the blockchain to address the constraints of scalability and protection in IoT operating environments of distributed blockchain technology by control of a private key. However, these authentication mechanisms do not consider security when applying IoT to the network, as the nature of IoT communication with numerous entities all the time in various locations increases security risks resulting in extreme asset damage. This posed many difficulties in finding harmony between security and scalability. To address this gap, the work suggested in this paper adapts multimodal biometrics to strengthen network security by extracting a private key with high entropy. Additionally, via a whitelist, the suggested scheme evaluates the security score for the IoT system with a blockchain smart contract to guarantee that highly secured applications authenticate easily and restrict compromised devices. Experimental results indicate that our system is existentially unforgeable to an efficient message attack, and therefore, decreases the expansion of infected devices to the network by up to 49 percent relative to traditional schemes.

Highlights

  • As life shifts rapidly online, one of the problems confronting internet users is making a transaction in an atmosphere where they cannot meet or trust each other

  • We examined the security and efficacy of our proposed scheme against typical attacks in the blockchain environment and compared the safety level with three signature schemes: the conventional private key based signature scheme (PKSS), the fuzzy key signature scheme based on unimodal biometrics (FKSSU), and our proposed fuzzy identity key signature scheme based on multimodal biometrics (FIKSSM)

  • internet of things (IoT) devices focused on blockchain technologies and multimodal biometrics

Read more

Summary

Introduction

As life shifts rapidly online, one of the problems confronting internet users is making a transaction in an atmosphere where they cannot meet or trust each other. The proposed model relies on boosting the overall efficiency of (1) the image analysis used to enhance image properties, identifying edges and points where texture varies, (2) the feature level fusion used to offer quick matching speed with high precision by choosing several strong features, (3) the fuzzy coding based on identity, which is used to distinguish key pairs, (4) the fuzzy matching used in the transaction authorization process to match the digital signature, and (5) the whitelist used for measuring the IoT system protection score and restricting its low score software to maintain the security of the network.

Literature Review
Methodology
Block diagram of of thetheproposed
Signature Scheme Using Fuzzy Identity
1: IoT device manufacturers compose thatmanufacturers’
Whitelist
Pre-Processing
Feature Extraction
Registration Phase
Transaction Generation Phase
Transaction Verification Phase
Results and Discussion
Security Evaluation
Experiment 1
Experiment 2
Experiment 3
Experiment 4
Experiment
Experiment 6
Experiment 7
Results
Kbyte 1 Kbyte
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call