International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Decentralized Identity Management for Industrial Internet of Things Utilizing Blockchain-Enhanced Multi-Factor Authentication

Author NameAuthor Details

Mohammed Al Qurashi

Mohammed Al Qurashi[1]

[1]Computer Science Department, Faculty of Computing and Information, Al-Baha University, Al-Baha, Saudi Arabia.

Abstract

The Industrial Internet of Things (IIoT) is crucial to contemporary industrial ecosystems because it increases efficiency and innovation. However, its swift growth also poses some serious security challenges, especially concerning the management of identities. This research paper introduces a new approach to strengthen IIoT security by using a Decentralised Identity Management System with Blockchain-based MFA. This study suggests an architecture for IIoT digital identity management that involves a private Blockchain network along with smart contracts and different types of MFA to build up one secure, reliable, and tamper-proof system. The approach is evaluated using a wide simulation environment, copying real-world scenarios of IIoT and attack vectors. Key performance metrics used in the analysis of the system include Authentication Success Rate, Incident Detection Rate, System Resilience Score, and Average Response Time under different circumstances, such as normal operations and attempts to break security. Results show great efficacy in authenticating legitimate access, high resistance against common cyber-attacks such as brute force and identity spoofing, and the best combination of security versus performance. This research adds significant value to the IIoT security area because it offers a holistic approach that can help fill in vital gaps concerning risk points within decentralised systems and, hence, lay the groundwork for safer and more productive industrial operations with digitalisation processes.

Index Terms

IIoT

Blockchain

Multi-Factor Authentication

Identity Management

Decentralisation

Smart Contracts

Reference

  1. 1.
    Castillón, D. C., Martín, J. C., Suarez, D. P. M., Martínez, Á. R., & Álvarez, V. L. (2020). Automation trends in industrial networks and IIoT. Industrial IoT: Challenges, Design Principles, Applications, and Security, 161-187.
  2. 2.
    Javaid, M., Haleem, A., Singh, R. P., Rab, S., & Suman, R. (2021). Upgrading the manufacturing sector via applications of industrial internet of things (IIoT). Sensors International, 2, 100129.
  3. 3.
    Salama, R., Altrjman, C., & Al-Turjman, F. (2023). An overview of the Internet of Things (IoT) and Machine to Machine (M2M) Communications. NEU Journal for Artificial Intelligence and Internet of Things, 2(3).
  4. 4.
    Khan, A. S., Yahya, M. I. B., Zen, K. B., Abdullah, J. B., Rashid, R. B. A., Javed, Y., ... & Mostafa, A. M. (2023). Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network. IEEE Access, 11, 20524-20541.
  5. 5.
    Leminen, S., Rajahonka, M., Wendelin, R., & Westerlund, M. (2020). Industrial internet of things business models in the machine-to-machine context. Industrial marketing management, 84, 298-311.
  6. 6.
    Mamdouh, M., Awad, A. I., Khalaf, A. A., & Hamed, H. F. (2021). Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Computers & Security, 111, 102491.
  7. 7.
    Wang, Y., Li, H., Huang, T., Zhang, X., & Bai, Y. (2021). Scalable identifier system for industrial internet based on multi-identifier network architecture. IEEE Internet of Things Journal.
  8. 8.
    Wan, Z., Liu, W., & Cui, H. (2022). HIBEChain: A hierarchical identity-based blockchain system for large-scale IoT. IEEE Transactions on Dependable and Secure Computing, 20(2), 1286-1301.
  9. 9.
    Singh, J., Rastogi, U., Goel, Y., & Gupta, B. (2023). Blockchain-based decentralized voting system security Perspective: Safe and secure for digital voting system. arXiv preprint arXiv:2303.06306.
  10. 10.
    Noh, J., Kwon, Y., Son, J., & Cho, S. (2022). Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks. IEEE Internet of Things Journal, 10(7), 6235-6248.
  11. 11.
    Deebak, B. D., Memon, F. H., Khowaja, S. A., Dev, K., Wang, W., Qureshi, N. M. F., & Su, C. (2022). A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems. IEEE Internet of Things Journal, 10(8), 6652-6660.
  12. 12.
    Philipp, A., & Küpper, A. (2023). DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks. arXiv preprint arXiv:2307.06919.
  13. 13.
    Fan, M., Zhang, Z., Li, Z., Sun, G., Yu, H., & Guizani, M. (2023). Blockchain-Based Decentralized and Lightweight Anonymous Authentication for Federated Learning. IEEE Transactions on Vehicular Technology.
  14. 14.
    Zhang, J., & Datta, A. (2023). Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data. arXiv e-prints, arXiv-2309.
  15. 15.
    Usmonov, M. T. O. G. L. (2021). Autentification, authorization and administration. Science and Education, 2(7), 233-242.
  16. 16.
    Wu, Y., Dai, H. N., & Wang, H. (2020). Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet of Things Journal, 8(4), 2300-2317.
  17. 17.
    Lin, C. C., Tsai, C. T., Liu, Y. L., Chang, T. T., & Chang, Y. S. (2023). Security and privacy in 5g-iiot smart factories: Novel approaches, trends, and challenges. Mobile Networks and Applications, 1-16.
  18. 18.
    Khan, N. A. (2022). 5G Network: Techniques to Increase Quality of Service and Quality of Experience. Int. J. Comput. Netw. Appl (IJCNA), 9, 476-496.
  19. 19.
    Karamitsos, I., Papadaki, M., Al-Hussaeni, K., & Kanavos, A. (2023). Transforming Airport Security: Enhancing Efficiency through Blockchain Smart Contracts. Electronics, 12(21), 4492.
  20. 20.
    Igboanusi, I. S., Dirgantoro, K. P., Lee, J. M., & Kim, D. S. (2021). Blockchain side implementation of pure wallet (pw): An offline transaction architecture. ICT Express, 7(3), 327-334.
  21. 21.
    Khan, N. A. (2022). PKI-Based security enhancement for IoT in 5G networks. In Inventive Computation and Information Technologies: Proceedings of ICICIT 2021 (pp. 217-225). Singapore: Springer Nature Singapore.
  22. 22.
    Khan, N. A., & Al Qurashi, M. (2023). Security Tradeoff in Network Virtualization and Their Countermeasures. In Inventive Computation and Information Technologies: Proceedings of ICICIT 2022 (pp. 741-749). Singapore: Springer Nature Singapore.
  23. 23.
    Prewett, K. W., Prescott, G. L., & Phillips, K. (2020). Blockchain adoption is inevitable—Barriers and risks remain. Journal of Corporate accounting & finance, 31(2), 21-28.
  24. 24.
    Khan, A. S., Javed, Y., Saqib, R. M., Ahmad, Z., Abdullah, J., Zen, K., & Khan, N. A. (2022). Lightweight multifactor authentication scheme for nextgen cellular networks. IEEE access, 10, 31273-31288.
  25. 25.
    Wang, W., Xu, H., Alazab, M., Gadekallu, T. R., Han, Z., & Su, C. (2021). Blockchain-based reliable and efficient certificateless signature for IioT devices. IEEE transactions on industrial informatics, 18(10), 7059-7067.
SCOPUS
SCImago Journal & Country Rank