
Research Article
bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodes
@INPROCEEDINGS{10.1007/978-3-031-17081-2_7, author={Cherif Diallo}, title={bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodes}, proceedings={Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings}, proceedings_a={AC3}, year={2022}, month={10}, keywords={IoT Blockchain Authentication Lightweight security}, doi={10.1007/978-3-031-17081-2_7} }
- Cherif Diallo
Year: 2022
bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodes
AC3
Springer
DOI: 10.1007/978-3-031-17081-2_7
Abstract
Some existing methods for authentication of IoT nodes are based on blockchain technology which has limitations that must be taken into account. In this paper, our contribution consists in proposing a new authentication protocol, named bisAUTH, for IoT objects inspired on certain characteristics of the blockchain technology. Our main objective is to propose a mechanism allowing neighboring IoT nodes of a network to authenticate in a decentralized and secure way. Evaluation of our proposed protocol against several criteria, its resistance to various attacks and its comparison with recent protocols, show that it brings significant improvements compared to the existing ones.
Copyright © 2022–2025 ICST