Advertisement

Interacting with the Internet of Things Using Smart Contracts and Blockchain Technologies

  • Nikos Fotiou
  • Vasilios A. Siris
  • George C. Polyzos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11342)

Abstract

Despite technological advances, most smart objects in the Internet of Things (IoT) cannot be accessed using technologies designed and developed for interacting with powerful Internet servers. IoT use cases involve devices that not only have limited resources, but also they are not always connected to the Internet and are physically exposed to tampering. In this paper, we describe the design, development, and evaluation of a smart contract-based solution that allows end-users to securely interact with smart devices. Our approach enables access control, Thing authentication, and payments in a fully decentralized setting, taking at the same time into consideration the limitations and constraints imposed by both blockchain technologies and the IoT paradigm. Our prototype implementation is based on existing technologies, i.e., Ethereum smart contracts, which makes it realistic and fundamentally secure.

Keywords

IoT Distributed Ledger Technologies Ethereum Interoperability Access control Authentication Payments 

Notes

Acknowledgments

The research reported here has been undertaken in the context of project SOFIE (Secure Open Federation for Internet Everywhere), which has received funding from EU’s Horizon 2020 programme, under grant agreement No. 779984 (and at AUEB it is managed through AUEB-RC). The authors thank Dmitrij Lagutin for his valuable comments.

References

  1. 1.
    Bernstein, D.J.: Curve25519: new diffie-hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207–228. Springer, Heidelberg (2006).  https://doi.org/10.1007/11745853_14CrossRefGoogle Scholar
  2. 2.
    Cohn, J., Finn, P., Nair, S., Sanjai, P.: Device democracy: saving the future of the Internet of Things. IBM Institute for Business Value (2014). http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=GBE03620USEN. Accessed 30 Aug 2018
  3. 3.
    Di Francesco Maesa, D., Mori, P., Ricci, L.: Blockchain based access control. In: Chen, L.Y., Reiser, H.P. (eds.) DAIS 2017. LNCS, vol. 10320, pp. 206–220. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-59665-5_15CrossRefGoogle Scholar
  4. 4.
    Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618–623 (2017)Google Scholar
  5. 5.
    Fotiou, N., Kotsonis, T., Marias, G.F., Polyzos, G.C.: Access control for the Internet of Things. In: 2016 ESORICS International Workshop on Secure Internet of Things (SIoT), pp. 29–38 (2016)Google Scholar
  6. 6.
    Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2015)CrossRefGoogle Scholar
  7. 7.
    Polyzos, G.C., Fotiou, N.: Blockchain-assisted information distribution for the Internet of Things. In: Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, pp. 75–78 (2017)Google Scholar
  8. 8.
    Shafagh, H., Burkhalter, L., Hithnawi, A., Duquennoy, S.: Towards blockchain-based auditable storage and sharing of IoT data. In: Proceedings of the 2017 on Cloud Computing Security Workshop, CCSW 2017, pp. 45–50. ACM, New York (2017)Google Scholar
  9. 9.
    Shoup, V.: A proposal for an ISO standard for public key encryption. Cryptology ePrint Archive, Report 2001/112 (2001). https://eprint.iacr.org/2001/112
  10. 10.
    Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014)Google Scholar
  11. 11.
    Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180–184 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Nikos Fotiou
    • 1
  • Vasilios A. Siris
    • 1
  • George C. Polyzos
    • 1
  1. 1.Mobile Multimedia Laboratory, Department of Informatics School of Information Sciences and TechnologyAthens University of Economics and BusinessAthensGreece

Personalised recommendations