
Research Article
Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things
@INPROCEEDINGS{10.1007/978-3-030-98002-3_21, author={Joanne Marie V. Santos and Jeanne Eunice V. Pascua and Nestor Michael C. Tiglao}, title={Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things}, proceedings={Cognitive Radio Oriented Wireless Networks and Wireless Internet. 16th EAI International Conference, CROWNCOM 2021, Virtual Event, December 11, 2021, and 14th EAI International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings}, proceedings_a={CROWNCOM \& WICON}, year={2022}, month={3}, keywords={IoT Blockchain Lightweight authentication Hardware acceleration}, doi={10.1007/978-3-030-98002-3_21} }
- Joanne Marie V. Santos
Jeanne Eunice V. Pascua
Nestor Michael C. Tiglao
Year: 2022
Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things
CROWNCOM & WICON
Springer
DOI: 10.1007/978-3-030-98002-3_21
Abstract
Internet of Things (IoT) is steadily evolving which allows a new paradigm of smart sensors and lightweight devices interacting with one another without human intervention, also known as machine-to-machine (M2M) communication. This allows solution for various fields such as Smart Home Automation. In this scenario, the satisfaction of security and data privacy requirements play a fundamental role. Blockchain technology with the help of cryptography offers a solution by facilitating transactions and the coordination of devices without the need of a central authority. This study aims to improve the current smart home by developing and implementing a blockchain-based authentication system with the use of the Blockchain data structure, protocols and cryptographic algorithms such as Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA-256), and Keyed-Hashing for Message Authentication (HMAC) on a microcontroller board equipped with hardware acceleration. Our performance analysis showed that hardware acceleration provided significant improvement in processing time with a speedup of 5.53 and 7.94 times for AES-128 and SHA-256, respectively, compared to a software implementation counterpart.