Abstract
The concern of network security is one of the major factors preventing the development of IoT-based applications. Such security risks can be mitigated by adopting a proper authentication scheme. The lack of quantitative comparison increases the difficulty when choosing the authentication scheme. This paper presents an empirical study of the effectiveness of three authentication methods including the blockchain-based method, a newly joined competitor. This study does not solely focus on the scheme level security but also five common structural topologies in IoT networks. We conduct simulations of these topological networks under six attack strategies and evaluate their survival sizes and survival link ratios. The network vulnerability coefficient is also proposed to illustrate a network's expected exploit rate providing quantitative results to compare among schemes. The blockchain-based method achieves a 57.68% to 225.28% improvement compared to a defenseless network and outperforms other traditional schemes in BA, NSW and GRID structured networks. The results indicate that the network topology can greatly affect the resilience of an authentication scheme.
Original language | English |
---|---|
Pages (from-to) | 389-400 |
Number of pages | 12 |
Journal | IEEE Transactions on Consumer Electronics |
Volume | 70 |
Issue number | 1 |
DOIs | |
Publication status | Published - 1 Feb 2024 |
Keywords
- IoT security
- authentication
- blockchain
- complex network