BAAP-FIoT: Blockchain-Assisted Authentication Protocol for Fog-Enabled Internet of Things Environment
Document Type
Article
Publication Date
6-1-2025
Publication Title
IEEE Internet of Things Journal
Abstract
The proliferation of Internet of Things (IoT) devices across multiple domains has heralded an era of unprecedented connectivity and data exchange. Fog computing enhances edge-network processing, enabling real-time data analysis and prompt responses. However, ensuring secure and trustworthy communication among these devices remains a paramount concern. In fog-enabled IoT environments, securing communication among users, IoT devices, gateways, and fog nodes is of paramount importance to prevent unauthorized access and ensure data integrity and confidentiality. Additionally, users can control and deliver instructions to IoT devices remotely. Hence, we propose a blockchain-assisted authentication protocol tailored specifically for fog-enabled IoT environments to verify the user's identity prior to accessing the IoT devices. The proposed protocol leverages cutting-edge crypto primitives like elliptic curve cryptography, hash functions, and blockchain to establish secure communication between users and IoT devices. Furthermore, we evaluate the proposed scheme through formal (Scyther) and informal analysis, demonstrating its efficacy in mitigating well-known attacks. On the other hand, the proposed protocol exhibits robustness against relevant protocols in terms of communication and computational aspects, as well as reliability for real-world fog-enabled IoT applications.
DOI
10.1109/JIOT.2025.3528746
Recommended Citation
R. B. Ponnuru, S. A. P. Kumar, M. Azab and G. R. Alavalapati, "BAAP-FIoT: Blockchain-Assisted Authentication Protocol for Fog-Enabled Internet of Things Environment," in IEEE Internet of Things Journal, vol. 12, no. 11, pp. 15681-15696, 1 June1, 2025, doi: 10.1109/JIOT.2025.3528746.
Volume
12
Issue
11
Comments
This work was supported in part by the U.S. National Science Foundation under Award CNS 2215388; in part by U.S. Department of Energy under Grant DE-SC0024686; in part by the Faculty Start-up Research Grants at the University of Illinois at Springfield; and in part by the Commonwealth Cyber Initiative (CCI), an investment in Advancing Cybersecurity Research, Innovation, and Workforce Development.