Secure Access Control to IoT Devices using Blockchain
Premanand Ghadekar1, Niket Doke2, Sushmita Kaneri3, Varsha Jha4 

1Premanand Ghadekar, Associate Professor and Head Department of Information Technology.
2Niket Doke, BTech Department of Information Technology from Vishwakarma Institute of Technology.
3SushmitaKaneri, BTech Department of Information Technology from Vishwakarma Institute of Technology.
4Varsha Jha, Pursuing BTech Department of Information Technology from Vishwakarma Institute of Technology.

Manuscript received on 01 March 2019 | Revised Manuscript received on 07 March 2019 | Manuscript published on 30 July 2019 | PP: 3064-3070 | Volume-8 Issue-2, July 2019 | Retrieval Number: F2273037619/19©BEIESP | DOI: 10.35940/ijrteF2273.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) is growing at an exponential rate but the area of privacy and security in IoT still remains unexplored. The existing algorithms or methods are mainly centralized and hence they are vulnerable due to their single point authentication topology. As it has been estimated that by 2020 there will be more ‘things’ than people on this earth the problem of security becomes a major concern in IoT networks, as a person having control to an IoT network will be able to control a large portion of an organization. Blockchain has recently been used to provide security to peer-to-peer networks. Blockchains are computationally expensive, heavyweight and are considered unsuitable for IoT architecture. In this paper a new lightweight and secure architecture for IoT by using Ethereum Blockchain retaining most of its security providing powers is proposed. Since Blockchain is decentralized it solves the single point authentication problem existing in IoT networks. A Smart Home System as a representative case study has been implemented for broader IoT applications. The two parameters measured are temperature and intrusion detection. The proposed model tackles some more challenges that exist in IoT networks. The Qualitative evaluation of the proposed architecture highlights how it tackles various attacks.
Index Terms: IoT, Access Control, Ethereum, Blockchain

Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy