Affiliation:
1. School of Computer Science, Wuhan University, Wuhan, China
2. School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore
Abstract
Today, the manner in which we communicate has greatly advanced. The technology is not just about machines, but people with technology together. Machine-to-machine (M2M) communication is unavoidable in the Internet of things. However, at the same time, there are more attacks against the M2M system. Therefore, a reliable and secure authentication mechanism is required. Blockchain technology is decentralized and highly secure while being tamper-proof. This protects M2M service providers by eliminating the single point of failures. This paper proposes a blockchain-based authentication scheme that uses a practical Byzantine fault tolerance (pBFT) consensus mechanism for M2M security in cyber physical systems. By implementing a blockchain to an M2M system, it provides an ID for devices on the blockchain. Simulation results have shown that the data on the chain cannot be altered. A pBFT consensus algorithm also ensures that the blockchain network is able to come to a consensus with faults.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference5 articles.
1. Cardenas S.A.A.S.S.A.A. , Secure control: towards survivable cyber-physical systems, in IEEE 28th International Conference on Distributed Computing Systems, 2008.
2. Yuchen Zhang W.D.A.F.W. , Architecture and real-time characteristics analysis of the cyber-physical system, in IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011.
3. Chen Hongsong F.Z.A.Z.D. , Security and trust research in M2M system, in IEEE International Conference on Vehicular Electronics and Safety (ICVES), 2011.
4. Sachin Agarwal C.P.R.B.A.J.-P.S. , Operator-based overthe-air M2M wireless sensor network security, in 14th International Conference on Intelligence in Next Generation Networks, 2010.
5. Tien-Dung Nguyen A.A.-S.A.E.-N.H. , Adynamic ID-based authentication scheme, in Sixth International Conference on Networked Computing and Advanced Information Management, 2010.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献