Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology

Authors

  • Rebecca Ling Ze Siew Universiti Malaysia Sarawak, Kuching, Sarawak
  • Brendan Chan Kah Le Universiti Malaysia Sarawak
  • Lee Kai Yue Universiti Malaysia Sarawak
  • Nuri Nazirah Binti Ismail Universiti Malaysia Sarawak
  • Xavier Liong Zhi Hao Universiti Malaysia Sarawak
  • Muhammad Faisal Director HRIMS, Ministry of Human Rights

DOI:

https://doi.org/10.62951/ijcts.v1i3.29

Keywords:

Industrial Internet of Things (iioT), Blockchain, MFA, Security, Scalability

Abstract

The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.

References

Almadani, M. S., & Hussain, F. K. (2023). Implementing a Secure Blockchain-Based Wallet System with Multi-Factor Authentication. In 2023 IEEE International Conference on e-Business Engineering (ICEBE) (pp. 23-30). Sydney, Australia. https://doi.org/10.1109/ICEBE59045.2023.00010

ALSaleem, B. O., & Alshoshan, A. I. (2021). Multi-Factor Authentication to Systems Login. In 2021 National Computing Colleges Conference (NCCC) (pp. 1-4). Taif, Saudi Arabia. https://doi.org/10.1109/NCCC49330.2021.9428806

Bala, R., & Manoharan, R. (2022). Blockchain based Secure and Effective Authentication Mechanism for 5G Networks. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-6). Pune, India. https://doi.org/10.1109/ICBDS53701.2022.9936018

Djonov, M., Galabov, M., & Georgieva-Trifonova, T. (2021). Solving IoT Security and Scalability Challenges with Blockchain. In 2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 52-56). Ankara, Turkey. https://doi.org/10.1109/ISMSIT52890.2021.9604700

Fauzi, A. H., & Khan, A. S. (2017). Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC, 9(2-10), 179-183.

Fedorov, I. R., Getmaniuk, I. B., & Bezzateev, S. V. (2023). Blockchain-Based Device Authentication Method in Industrial Internet of Things. In 2023 15th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT) (pp. 243-249). https://doi.org/10.1109/ICUMT61075.2023.10333273

Gebremichael, T., et al. (2020). Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges. IEEE Access, 8, 152351-152366. https://doi.org/10.1109/ACCESS.2020.3016937

Gong-Guo, Z., & Wan, Z. (2021, April). Blockchain-based IoT security authentication system. In 2021 International Conference on Computer, Blockchain and Financial Development (CBFD). https://doi.org/10.1109/cbfd52659.2021.00090

Huang, Y., Jing, H., Li, C., & Hao, Y. (2021). Research on Intelligent Terminal Authentication Strategy Based on Blockchain. In 2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI) (pp. 23-26). Shenyang, China. https://doi.org/10.1109/ICHCI54629.2021.00012

Jian, W., Xu, J., Liang, W., & Li, K.-C. (2022). Dual Chain Authentication and Key Agreement Protocol Based on Blockchain Technology in Edge Computing. In 2022 IEEE 24th International Conference on High Performance Computing & Communications; 8th International Conference on Data Science & Systems; 20th International Conference on Smart City; 8th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys) (pp. 396-401). Hainan, China. https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00082

Khan, A. A., Bourouis, S., Kamruzzaman, M. M., Hadjouni, M., Shaikh, Z. A., Laghari, A. A., Elmannai, H., & Dhahbi, S. (2023). Data Security in Healthcare Industrial Internet of Things With Blockchain. IEEE Sensors Journal, 23(20), 25144-25151. https://doi.org/10.1109/JSEN.2023.3273851

Khan, A. S., Abdullah, J., Zen, K., & Tarmizi, S. (2017). Secure and Scalable Group Rekeying for Mobile Multihop Relay Network. Advanced Science Letters, 23(6), 5242-5245.

Khan, A. S., Halikul, I., & Abdullah, N. F. J. (2015). Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks. Jurnal Teknologi, 73(1), 75-81.

Khan, A. S., Javed, Y., Abdullah, J., Nazim, J. M., & Khan, N. (2017). Security Issues in 5G Device to Device Communication. IJCSNS, 17(5), 366.

Khan, A. S., Mehdi, M. H., Uddin, R., Abbasi, A. R., & Nisar, K. (2023). Ensemble Based Automotive Paint Surface Defect Detection Augmented by Order Statistics Filtering Using Machine Learning. Authorea Preprints.

Khan, A. S., Yahya, M. I. B., Zen, K. B., Abdullah, J. B., Rashid, R. B. A., Javed, Y., Khan, N. A., & Mostafa, A. M. (2023). Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network. IEEE Access, 11, 20524-20541.

Khan, N., Abdullah, J., & Khan, A. S. (2017). Defending Malicious Script Attacks Using Machine Learning Classifiers. Wireless Communications and Mobile Computing, 2017.

Khan, S., Abdullah, J., Khan, N., Julahi, A. A., & Tarmizi, S. (2017). Quantum-Elliptic Curve Cryptography for Multihop Communication in 5G Networks. International Journal of Computer Science and Network Security (IJCSNS, 17(5), 357-365.

Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2021). Blockchain-Based Massive Data Dissemination Handling in IIoT Environment. IEEE Network, 35(1), 318-325. https://doi.org/10.1109/MNET.011.2000355

Morais, D., Zúquete, A., & Mendes, A. (2023). Adaptive, Multi-Factor Authentication as a Service for Web Applications. In 2023 7th Cyber Security in Networking Conference (CSNet) (pp. 74-80). Montreal, QC, Canada. https://doi.org/10.1109/CSNet59123.2023.10339695

Rathee, G., Kerrache, C. A., & Lahby, M. (2023). TrustBlkSys: A Trusted and Blockchained Cybersecure System for IIoT. IEEE Transactions on Industrial Informatics, 19(2), 1592-1599. https://doi.org/10.1109/TII.2022.3182984

Shoaib, M., Ullah, A., Abbasi, I. A., Algarni, F., & Khan, A. S. (2023). Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios. IEEE Access, 11, 123295-123313.

Shukla, H., & Bhushan, B. (2023). Empowering Biometrics Authentication System Using Decentralized Blockchain Based Applications. In 2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (pp. 1177-1182). Greater Noida, India. https://doi.org/10.1109/ICCCIS60361.2023.10425327

Vekariya, D., Rastogi, A., Priyadarshini, R., Patil, M., Kumar, M. S., & Pant, B. (2023). Mengers Authentication for efficient security system using Blockchain technology for Industrial IoT (IIOT) systems. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 894-896). Greater Noida, India. https://doi.org/10.1109/ICACITE57410.2023.10182454

Zen, K., Javed, M., Lenando, H. B., Zen, H., & Khan, A. S. (2015). Intelligent Coordinator Selection Mechanism (ICSM) for IEEE 802.15.4 Beacon-Enabled MAC Protocol in Mobile Wireless Sensor Networks. International Review on Computers and Software, 10(2), 164.

Zubair, S., Fisal, N., Abazeed, M. B., Salihu, B. A., & Khan, A. S. (2015). Lightweight Distributed Geographical: A Lightweight Distributed Protocol for Virtual Clustering in Geographical Forwarding Cognitive Radio Sensor Networks. International Journal of Communication Systems, 28(1), 1-18.

Published

2024-07-18

How to Cite

Rebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, & Muhammad Faisal. (2024). Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology. International Journal of Computer Technology and Science, 1(3), 87–105. https://doi.org/10.62951/ijcts.v1i3.29

Most read articles by the same author(s)

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.