Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function
Yurika Pant Khanal,
Abeer Alsadoon,
Khurram Shahzad,
Ahmad B. Al-Khalil,
Penatiyana W. C. Prasad,
Sabih Ur Rehman and
Rafiqul Islam
Additional contact information
Yurika Pant Khanal: School of Computing, Mathematics and Engineering, Charles Sturt University, Melbourne 3062, Australia
Abeer Alsadoon: School of Computing, Mathematics and Engineering, Charles Sturt University, Melbourne 3062, Australia
Khurram Shahzad: School of Computing, Mathematics and Engineering, Charles Sturt University, Melbourne 3062, Australia
Ahmad B. Al-Khalil: College of Science, Department of Computer Science, The University of Duhok, Duhok 42001, Iraq
Penatiyana W. C. Prasad: School of Computing, Mathematics and Engineering, Charles Sturt University, Melbourne 3062, Australia
Sabih Ur Rehman: School of Computing, Mathematics and Engineering, Charles Sturt University, Melbourne 3062, Australia
Rafiqul Islam: School of Computing, Mathematics and Engineering, Charles Sturt University, Melbourne 3062, Australia
Future Internet, 2022, vol. 14, issue 3, 1-17
Abstract:
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT system. This work aims to preserve the privacy of user access policy by protecting the confidentiality and authenticity of the transmitted message while obtaining the necessary consents for data access. We consider a Modified Elliptic Curve Integrated Encryption Scheme (ECIES) to improve the security strength of the transmitted message. A secure hash function is used in conjunction with a key derivation function to modify the encryption procedure, which enhances the efficiency of the encryption and decryption by generating multiple secure keys through one master key. The proposed solution eliminates user-dependent variables by including transaction generation and verification in the calculation of computation time, resulting in increased system reliability. In comparison to previously established work, the security of the transmitted message is improved through a reduction of more than 12% in the correlation coefficient between the constructed request transaction and encrypted transaction, coupled with a decrease of up to 7% in computation time.
Keywords: Internet of Things; blockchain; ECIES; secure hash function; privacy; reliability (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (2)
Downloads: (external link)
https://www.mdpi.com/1999-5903/14/3/77/pdf (application/pdf)
https://www.mdpi.com/1999-5903/14/3/77/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:14:y:2022:i:3:p:77-:d:760900
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().