Please use this identifier to cite or link to this item: https://scholarhub.balamand.edu.lb/handle/uob/7567
Title: Performance Evaluation and Analysis of LightCert4IoT using Cooja-Contiki Simulator
Authors: Khoury, David
Haddad, Samir El 
Sondi, Patrick
Haidar, Gaby Abou
Semaan, David
Sayah, Jinane 
Affiliations: Department of Computer Science 
Department of Telecommunications and Networking Engineering 
Keywords: Authentication
Authentication
Blockchain
Blockchains
Certificate
Internet of Things
IoT-5G
Object recognition
Public key
Public Key Infrastructure
Security
Simulation
Smart contracts
Issue Date: 2024-01-01
Publisher: Institute of Electrical and Electronics Engineers Inc.
Part of: IEEE Access
Volume: 12
Start page: 122350
End page: 122362
Abstract: 
Recently, the growth of the focus on internet of things (IoT) is rocketing in parallel with the evolution of the mobile fifth generation (5G) networks. To fully utilize IoT, which wirelessly connects billions of devices, a 5G network is essential. However, the provision of user’s certificates exposes the network to serious security threats. The LightCert4IoT leverages the advantages of EDGE nodes with blockchain technology and smart contracts to address the existing challenges of PKI (Public Key Infrastructure) certificates in IoT devices, which neatly achieves certificate issuance, update, and revocation more securely and efficiently. An end-user issues a self-signed certificate and lets Local Registration Authorities (LRAs)/EDGE nodes to verify and validate the binding identity-self signed certificate of the users through a blockchain such as Ethereum. This work analyzes the performance of LightCert4IoT in the IoT devices by utilizing the Cooja-Contiki simulator. The results show reduced energy consumption and memory size when compared to the conventional X509 certificate. As a conclusion, the LightCert4IoT meets the requirements of major IoT devices constraints. The paper also addresses the security threats with widespread use of IoT devices and analyses the adversary on security level from the authentication based on hardware token and blockchain and deploying firewall to protect servers against malicious attacks like DDOS. Scalability, resource limitations, privacy concerns are analyzed as IoT devices handle sensitive information, and the transparent and immutable nature of blockchain can raise data protection. Analysis of Network partitioning challenge and communication overhead.
URI: https://scholarhub.balamand.edu.lb/handle/uob/7567
DOI: 10.1109/ACCESS.2024.3451134
Ezproxy URL: Link to full text
Type: Journal Article
Appears in Collections:Department of Computer Science

Show full item record

Record view(s)

19
checked on Dec 14, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.