DOI QR코드

DOI QR Code

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting (Center for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China) ;
  • Xu, Chunxiang (Center for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China) ;
  • Zhang, Yuan (Center for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China)
  • Received : 2018.04.04
  • Accepted : 2018.07.04
  • Published : 2018.12.31

Abstract

Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

Keywords

References

  1. V. Ricquebourg, D. Menga, D. Durand, B. Marhic, L. Delahoche, and C. Loge, "The smart home concept: our immediate future," in Proc. of 1st International Conference on E-Learning in Industrial Electronics, pp. 23-28, Dec, 2006.
  2. I. Bisio, A. Delfino, F. Lavagetto, and A. Sciarrone, "Enabling IoT for in-home rehabilitation: Accelerometer signals classification methods for activity and movement recognition," IEEE Internet of Things Journal, vol. 4, no. 1, pp. 135-146, Feb, 2017. https://doi.org/10.1109/JIOT.2016.2628938
  3. D. J. Cook, M. S.-Edgecombe, and P. Dawadi, "Analyzing activity behavior and movement in a naturalistic environment using smart home techniques," IEEE Journal of Biomedical and Health Informatics, vol. 19, no. 6, pp. 1882-1892, Nov, 2015. https://doi.org/10.1109/JBHI.2015.2461659
  4. P. N. Dawadi, D. J. Cook, and M. S.-Edgecombe, "Automated cognitive health assessment from smart home-based behavior data," IEEE Journal of Biomedical and Health Informatics, vol. 20, no. 4, pp. 1188-1194, Jul, 2016. https://doi.org/10.1109/JBHI.2015.2445754
  5. M. F. Li and H. J. Lin, "Design and implementation of smart home control systems based on wireless sensor networks and power line communications," IEEE Transactions on Industrial Electronics, vol. 62, no. 7, pp. 4430-4442, Jul, 2015. https://doi.org/10.1109/TIE.2014.2379586
  6. S. Sendra, L. Parra, J. Lloret, and J. Tomas, "Smart system for children's chronic illness monitoring," Information Fusion, vol. 40, pp. 76-86, Mar, 2018. https://doi.org/10.1016/j.inffus.2017.06.002
  7. R. Chowdhury, H. O.-Slimane, C. Talhi, and M. Cheriet, "Attribute-based encryption for preserving smart home data privacy," in Proc. of 15th International Conference on Smart Homes and Health Telematics, pp. 185-197, Aug, 2017.
  8. "The smart home: Intelligent home automation,".
  9. B. C. Choi, S. H. Lee, J. C. Na, and J. H. Lee, "Secure firmware validation and update for consumer devices in home networking," IEEE Transactions on Consumer Electronics, vol. 62, no.1, pp. 39-44, Feb, 2016. https://doi.org/10.1109/TCE.2016.7448561
  10. J. M. Batalla, A. Vasilakos, and M. Gajewski, "Secure smart homes: Opportunities and challenges," ACM Computing Surveys, vol. 50, no. 5, pp. 75:1-75:32, Oct, 2017.
  11. E. Fernandes, J. Jung, and A. Prakash, "Security analysis of emerging smart home applications," in Proc. of 37th IEEE Symposium on Security and Privacy, pp. 636-654, May, 2016.
  12. N. Komninos, E. Philippou, and A. Pitsillides, "Survey in smart grid and smart home security: Issues, challenges and countermeasures," IEEE Communications Surveys and Tutorials, vol. 16, no. 4, pp. 1933-1954, Nov, 2014. https://doi.org/10.1109/COMST.2014.2320093
  13. P. Kumar, A. Braeken, A. V. Gurtov, J. H. Iinatti, and P. H. Ha, "Anonymous secure framework in connected smart home environments," IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 968-979, Apr, 2017. https://doi.org/10.1109/TIFS.2016.2647225
  14. X. Y. Huang, J. K. Liu, S. H. Tang, Y. Xiang, K. T. Liang, L. Xu, and J. Y. Zhou, "Cost-effective authentic and anonymous data sharing with forward security," IEEE Transactions on Computers, vol. 64, no.4, pp. 971-983, Apr, 2015. https://doi.org/10.1109/TC.2014.2315619
  15. X. Y. Huang, Y. Xiang, E. Bertino, J. Y. Zhou, and L. Xu, "Robust multi-factor authentication for fragile communications," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 568-581, Nov, 2014. https://doi.org/10.1109/TDSC.2013.2297110
  16. N. Feamster, "Outsourcing home network security," in Proc. of ACM SIGCOMM workshop on Home networks, pp. 37-42, Sep, 2010.
  17. S. E. Wu, J. B. Rendall, M. J. Smith, S. Y. Zhu, J. H. Xu, H. G. Wang, Q. Yang, and P. Qin, "Survey on prediction algorithms in smart homes," IEEE Internet of Things Journal, vol. 4, no. 3, pp. 636-644, Jun, 2017. https://doi.org/10.1109/JIOT.2017.2668061
  18. J. E. Kim, G. Boulos, J. Yackovich, T. Barth, C. Beckel, and D. Mosse, "Seamless integration of heterogeneous devices and access control in smart homes," in Proc. of 8th International Conference on Intelligent Environments, pp. 206-213, Jun, 2012.
  19. B. Ur, J. Jung, and S. Schechter, "The current state of access control for smart devices in homes," in Proc. of Workshop on Home Usable Privacy and Security, Jul, 2014.
  20. K. Fysarakis, C. Konstantourakis, K. Rantos, C. Manifavas, and I. Papaefstathiou, "Wsacd-a Usable Access Control Framework for Smart Home Devices," in Proc. of International Conference on Information Security Theory and Practice, pp. 120-133, Aug, 2015.
  21. K. Fysarakis, C. Konstantourakis, K. Rantos, C. Manifavas, and I. Papaefstathiou, "XSACd cross domain resource sharing and access control for smart environments," Future Generation Computer Systems, vol. 80, pp. 572-582, Mar, 2018. https://doi.org/10.1016/j.future.2016.05.023
  22. A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, "FairAccess: a new Blockchain-based access control framework for the Internet of Things," Security and Communication Networks, vol. 9, pp. 5943-5964, Dec, 2016. https://doi.org/10.1002/sec.1748
  23. A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, "Towards a novel privacy-preserving access control model based on blockchain technology in IoT," Europe and MENA Cooperation Advances in Information and Communication Technologies, pp. 523-533, 2017.
  24. O. J. A. Pinno, A. R. A. Gregio, and L. C. De Bona, "ControlChain: Blockchain as a central enabler for access control authorizations in the IoT," in 18th Proc. of IEEE Global Communications Conference (GLOBECOM), pp. 1-6, Dec, 2017.
  25. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, "Blockchain for IoT security and privacy: The case study of a smart home," in Proc. of 15th International Conference on Pervasive Computing and Communications Workshops, pp. 618-623, Mar, 2017.
  26. S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system".
  27. G. Wood, "Ethereum: a secure decentralised generalised transaction ledger," Ethereum Project Yellow Paper.
  28. "The cryptocurrency for payments based on blockchain technology".
  29. M. Pilkington, "Blockchain technology: Principles and applications."
  30. V. Buterin, "On public and private blockchains," Ethereum blog.
  31. V. Buterin, "Visions, part 1: The value of blockchain technology."
  32. R. C. Merkle, "A digital signature based on a conventional encryption function," in Proc. of 4th International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 369-378, Aug, 1987.
  33. F. G. Li, Y.N. Han, and C. H. Jin, "Cost-effective and anonymous access control for wireless body area networks," IEEE Systems Journal, pp. (99):1-12, May, 2016.
  34. P. S. L. M. Barreto, B. Libert, N. McCullagh, and J.-J. Quisquater, "Efficient and provably-secure identity-based signatures and signcryption from bilinear maps," in Proc. of 11th International conference on the theory and application of cryptology and information security (ASIACRYPT), pp. 515-532, Dec, 2005.
  35. "Hacker lexicon: what are dos and ddos attacks?".
  36. V. Sivaraman, H. H. Gharakheili, A. Vishwanath, et al, "Network-level security and privacy control for smart-home IoT devices," in Proc. of 11th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 163-167, Oct, 2015.

Cited by

  1. Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain vol.20, pp.2, 2019, https://doi.org/10.7472/jksii.2019.20.2.61
  2. Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer vol.20, pp.5, 2018, https://doi.org/10.7472/jksii.2019.20.5.9
  3. Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach vol.2021, pp.None, 2018, https://doi.org/10.1155/2021/5550153
  4. Analysis of Blockchain Ecosystem and Suggestions for Improvement vol.19, pp.1, 2018, https://doi.org/10.6109/jicce.2021.19.1.8
  5. A blockchain-based access control scheme for smart home vol.1971, pp.1, 2018, https://doi.org/10.1088/1742-6596/1971/1/012049