Please use this identifier to cite or link to this item:
https://scholarhub.balamand.edu.lb/handle/uob/7567
Title: | Performance Evaluation and Analysis of LightCert4IoT using Cooja-Contiki Simulator | Authors: | Khoury, David Haddad, Samir El Sondi, Patrick Haidar, Gaby Abou Semaan, David Sayah, Jinane |
Affiliations: | Department of Computer Science Department of Telecommunications and Networking Engineering |
Keywords: | Authentication Authentication Blockchain Blockchains Certificate Internet of Things IoT-5G Object recognition Public key Public Key Infrastructure Security Simulation Smart contracts |
Issue Date: | 2024-01-01 | Publisher: | Institute of Electrical and Electronics Engineers Inc. | Part of: | IEEE Access | Volume: | 12 | Start page: | 122350 | End page: | 122362 | Abstract: | Recently, the growth of the focus on internet of things (IoT) is rocketing in parallel with the evolution of the mobile fifth generation (5G) networks. To fully utilize IoT, which wirelessly connects billions of devices, a 5G network is essential. However, the provision of user’s certificates exposes the network to serious security threats. The LightCert4IoT leverages the advantages of EDGE nodes with blockchain technology and smart contracts to address the existing challenges of PKI (Public Key Infrastructure) certificates in IoT devices, which neatly achieves certificate issuance, update, and revocation more securely and efficiently. An end-user issues a self-signed certificate and lets Local Registration Authorities (LRAs)/EDGE nodes to verify and validate the binding identity-self signed certificate of the users through a blockchain such as Ethereum. This work analyzes the performance of LightCert4IoT in the IoT devices by utilizing the Cooja-Contiki simulator. The results show reduced energy consumption and memory size when compared to the conventional X509 certificate. As a conclusion, the LightCert4IoT meets the requirements of major IoT devices constraints. The paper also addresses the security threats with widespread use of IoT devices and analyses the adversary on security level from the authentication based on hardware token and blockchain and deploying firewall to protect servers against malicious attacks like DDOS. Scalability, resource limitations, privacy concerns are analyzed as IoT devices handle sensitive information, and the transparent and immutable nature of blockchain can raise data protection. Analysis of Network partitioning challenge and communication overhead. |
URI: | https://scholarhub.balamand.edu.lb/handle/uob/7567 | DOI: | 10.1109/ACCESS.2024.3451134 | Ezproxy URL: | Link to full text | Type: | Journal Article |
Appears in Collections: | Department of Computer Science |
Show full item record
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.