Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment

Yasmine Harbi, Zibouda Aliouat, Saad Harous, Abdelhak Mourad Gueroui

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The Internet of Things (IoT) seeks to enhance human life by embedding everyday objects with intelligence. As deployed in diverse environments, IoT devices exchange substantial data to offer autonomously smart and innovative services. Cloud computing serves as an effective solution for processing and storing data from IoT devices, enabling remote access for end-users. However, authenticating remote users poses a critical challenge. Although several existing schemes tackle this challenge, they have notable security and performance weaknesses. This paper introduces a lightweight, distributed multi-factor authentication scheme for remote users in IoT. The proposed approach, named Lightchain, integrates blockchain technology and fog computing while incorporating a lightweight cryptographic hash function. The security of Lightchain is rigorously confirmed through formal verification using the well-recognized Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Additionally, we develop and assess Lightchain's functionality using the solidity language across diverse use cases. A comparative analysis is presented to evaluate performance costs and security requirements against recent methods. The proposed scheme demonstrates efficiency and robustness, making it well-suited for a range of IoT applications.

Original languageEnglish
Pages (from-to)90-105
Number of pages16
JournalComputer Communications
Volume221
DOIs
Publication statusPublished - May 2024

Keywords

  • AVISPA
  • Blockchain
  • Internet of things
  • Key management
  • Smart contract
  • Solidity

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment'. Together they form a unique fingerprint.

Cite this