Design of a Hybrid Authentication Technique for User and Device Authentication for an integrated IOT

Page 1

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

Design of a Hybrid Authentication Technique for User and Device Authentication for an integrated IOT environment using Blockchain Authentication and Artificial Intelligence

Principal Architect – Data, Connecticut, USA ***

Abstract - Attacks against Internet of Things (IoT) devices have increased dramatically in recent years. Attacks on vital internetinfrastructuresystemshavebeencarriedoutbycyber thieves using hacked IoT devices. Information security researchers are under increasing pressure to provide new tacticsandsolutionstoprotectsusceptibledevicesatalllevels following recent assaults. When it comes to home networks, malevolentactors don't care aboutthesmart devicesthat are part of them. National and global governments are placing a highvalue onsecuringcriticalIoTnetworksliketheelectrical grid and water distribution systems. Many different technologies are being applied to the problem of Internet of Things security. These include blockchain, AI, and edge/fog computing (IoT). Authentication and authorization are two legs of the CIA's crucial triad of components. However, due to the scaleofIoT networks and the limitedresources ofdevices, standard authentication and authorization mechanisms are unsuitable for handling security. We employ blockchain technology as a lightweight and straightforward authentication solution for IoT devices. The use of artificial intelligence (AI) to aid in decision-making and carry out predictive analytics in a wide variety of contexts is gaining popularity. In recent years, blockchain (a peer-to-peer distributed system) has also been used to enable AI applications,suchassecuredatasharing(formodeltraining), data privacy, trustworthy AI decision making, and decentralized AI. The purpose of this effort is to create a hybrid authentication technique based on Blockchain authentication and AI for user and device authentication in a fully interconnected IOT setting.

Keywords: IOT (Internet of Things), WSN (Wireless Sensor Networks), Blockchain Authentication, Artificial Intelligence, Hybrid Authentication

1. INTRODUCTION

TheconceptoftheInternetofThings(IoT)israpidly growingandgainingpopularity.Manyofourregulartasks and routines would be impossible without the Internet of Things. New IoT applications in areas including smart homes,smarthealthcare,smartcities,industry4.0,wireless sensor networks (WSN), and smart farming have the potentialtointroduceandadvancetheconceptofasmart world. Security measuresat several layers,along withthe capacitytoanalyzeandregulatealldataandinformation,are

essential for the platforms, networks, devices1, and applications that make up the Internet of Things (IoT) ecosystem.Thedevicescanbeeasilycompromised,leaving usersopentoidentitytheftandmeddlingwiththeirdata.

Figure: 1 BasicBlockchainStructure

Theledgermustbegeneratedandmaintainedbyeachnode in the blockchain ecosystem. To participate, a participant mustbeabletoreadandwritetransactions.Therearetwo categoriesofparticipants:read-onlyandread-write.Toput itanotherway,minerscanaddtransactionstothechainas uniquenodes.Anestablishedtechnology,blockchainholdsa lotofpromise.Itisregardedasafundamentalapproachina decentralizednetworkenvironmentsinceitisdistributed, decentralized,andunchanging.Fortheblockchainnetwork's peerstoacceptablock,minersmustcompleteproofofwork (PoW).Figure1depictstheblockchain'sbasicstructure.For securingtheInternetofThings(IoT),Blockchainhasbeen hailed as an ideal option. To ensure the safety of the IoT ecosystem,wehavealsobenefitedfromthistechnology.Itis ourprimarypurposeinthisresearchprojecttoprovidean authenticationsystembasedontheEthereumBlockchain, whichisa publicblockchainandprovidesdistributedand decentralized security for IoT devices. Using this method, users and their gadgets may communicate in a secure environment. There are three sections in which the documentisbrokendown:1stsectionincludesintroduction partofthepaper.Second,thereisasectioncalledRelated Work that provides an overview of the blockchain and includes work done by other authors to secure IoT with blockchain.ThirdistheProposedTechnique,whichincludes the results and discussion of the proposed method, and finallySectionVistheConclusion.

©
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page274

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

1.1 Internet of things paradigm

IoTisnowarealitythatpervadesmanyaspectsof ourlife,anditisonlygoingtobecomingmoreprevalentin the future.Although IoTwas formerlyviewedas a science fiction concept, it has now become a reality thanks to the work of several researchers who see it as one of the most significanttechnicalshiftsofthetwenty-firstcentury.Asingle linkedthingperpersonwasachievedin2008,andcurrent estimatesplacethenumberatroughly26smartobjectsper personby2020.Therearestillmanychallengesthatneedto beovercomebeforetheInternetofThingscanbeusedtoits fullpotential.Thesechallengesincludebutarenotlimitedto computingconstraintsimposedbyInternetofThings(IoT) devices; heterogeneity; identification; power supply; data storage/processing;amongotherthings.Securityandprivacy are two of the most pressing issues, considering the widespreaduseofsmartdevicesineverydaylife.IoTsecurity solutions aren't applicable in general because of the restrictions of IoT components, which have minimal capabilitiesinbothenergyandprocessingresources.

As a result, they cannot implement elaborate schemes supporting security. Unfortunately, this makes thingsevenmoredifficult.MostprevalentIoTexploits,and vulnerabilities have been documented by the OWASP InternetofThingsProject.

1.2 IoT and Machine learning algorithms

Most devices that participate on the internet of things are autonomous and have modest power requirements.Thesenodescancollectdata,actbasedonthat data, and communicate with one another and with other entitiesthankstotheuseofsensors,actuators,andeventhe Cloud.Whenthecomplexity ofthealgorithmsbecametoo difficult to manage, attention turned from artificial intelligence(AI)tomachinelearning(ML).Machinelearning methods are used in numerous modern contexts, from statistical analysis and prediction to practical tasks like speech recognition and fraud detection. Algorithms and methodsusedinmachinelearninghavebeenimpactedby many disciplines, including mathematics, neuroscience, statistics, and computer science. To test an algorithm's ability to learn from data, it is common to split the developmentofthealgorithmintotwodistinctphases:the training phase and the verification phase. Most today's machine learning algorithms fall under the categories of unsupervised,supervised,andreinforcementlearning.For thefirst-classtrainingphasetobesuccessful,alabelleddata set is required so that the studied relationships can be represented.Incontrasttothefirsttype,theinput/output pairings for the unsupervised learning techniques are not provided.Theprimaryfocusofthisactivityisonlocatingthe linksbetweenthevariousdatapoints.Thethirdtype,online learning, describes situations in which an agent acquires

knowledge about how to behave by engaging in trial-anderrorinteractionswithaninteractiveenvironment.

1.3 Objective of Paper

Design and development of an authentication techniquewhichemployeeshybridalgorithms/techniques suchasBlockchainAuthenticationandArtificialIntelligence, forseamlessuseraswellasdeviceauthenticationinanIOT network.

2. LITERATURE SURVEY

Achraf Fayad et. All (2019) Numerousstudieshavebeen donetoproposenovelmethodsandsystemsforensuringthe authenticationofIoTdevices.Manyexistingeffortsdonot meet all of the IoT's objectives, such as permitting the mobility of nodes or guaranteeing scalability through decentralisedtechniquesormakingiteasytointegratenew devices and services. The authors of this paper put up a simple way of authentication in this situation. Using a blockchain,whichisentirelydecentralised,isattheheartof our answer to this problem. As a result, it fulfils all of the previously described conditions. Real-world implementations of our method were used to test the validityofourfindings.Itwasevidentfromtheresultsthatit waslowinweight.[1]

Aissam Outchkoucht et. All (2017) Even as the mechanisms for actuation, communication, and control improveandbecomemorewidespread,theriskstheypose tousertrustandtheInternetofThingsasawhole,whennot adequatelyaddressed,arealsoincreasinginsophistication and pervasiveness. This investigation has centered on the IoT(InternetofThings).Itproposedaframeworkwiththe intentionoffixingtwoissues:Ithosethatarisefromusinga centralized design, and (ii) the need to transmit the administrationofaccesscontrolfromacentralbodytothe nodes of the network. Indeed, the limited devices of the InternetofThingsdonothavethecomputationalresources or data storage space required to support a decentralized accesscontrolsystem.Thesheernumberofconnectedsmart devices can be overwhelming in an IoT setting, posing a number of regulatory issues related to regulating user access. As a result, security officers and managers often resorttoenforcing"staticpolicies,"inwhichallsecurityand accesscontrolrulesarewrittenbyasingleperson.[2]

Soumyashree S. Panda et. All (2019) The Internet of Things(IoT)anditsmanyuseshavebecomeanintegralpart of our everyday lives. Without the need for human intervention, a number of smart devices can interact with one other. To participate in an autonomous system, only genuine entities should be able to participate. As a result, thisstudyproposesanIoTsystemauthenticationscheme. Blockchainisthedecentralisedledgertechnologythatwould beusedintheproposedsystem,notacentralauthority.[3]

© 2022,
|
|
Certified Journal | Page275
IRJET
Impact Factor value: 7.529
ISO 9001:2008

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

Khadija Fazal et. All (2020) Authenticatedusersmustbe abletoaccessandretrievedatafromeachdevice.Accessto thesegadgetsandthecommunicationstheyprovideshould besafeinmostinstances.IoTsecurityisakeyroadblockto widespreadadoptionandimplementationofthetechnology, foravarietyofreasons,includingthefactthatitisextremely vulnerable to cyberattacks. Authors present a blockchainbasedEthereumauthenticationsystemforconstructingsafe zonesintheinternetofthings.VariousIoTsettings,services, and situations can benefit from the authors' proposed strategy.Wecanbeconfidentinthesecurityofoursystem becauseweareusingapublicformofBlockchain.Totestthe suggestedapproach, wewantto writea smartcontract in solidityusingtheRemixIDEandanalyseitsperformancein termsofcostandtime.[4]

Dr. Sakthi Kumaresh et. All (2021) In this article, a Decentralized Artificial Intelligence-enabled Blockchain network is implemented using the confluence of AI and Blockchain technology (DAIBCN). The proposed DAIBC methodusesadecisiontreemodeltoautomaticallyidentify minernodes.Thereislessrequirementforminernodesto performcomplexhashfunctionsinordertobeeligiblefor reward. The testing findings reveal that the suggested AIenabledapproachsavesasignificantamountofenergyand also reduces the time it takes to complete a transaction becausethenodeselectionisdoneautomatically.[5]

Praveen Kumar Kollu et. All (2021) Blockhain development has spurred continuing study in a variety of theoreticalandfunctionalareas.Decentralization,identity, and trust are three of today's most pressing technological issues, and the blockchain is widely seen as a promising answer even as it is still in its infancy. When it comes to finding the best way to store and access cloud data, the groundbreakingblockchainisaninvaluableresource.This article examines the potential ofblockchaintechnology to defend cloud computing. A cloud computing data security mechanismisalsopresentedinthispaper.Thisapplication uses smart contracts and permission lists to secure data security.[6]

Shanshan Zhao et. All (2019) Dataisgenerated,collected, processed,sent,andstored byseveral organisations in an IIoT ecosystem. Blockchaining both IIoT entities and businessprocessesishighlysoughtafterbythesectors.The Internet of Things (IIoT) is predicted to be widely implemented in sectors as a result of fast technological advancements and new business models. In this article, we've looked at blockchain and IIoT integration from an industrial standpoint. Introduced is a blockchain-enabled architecture for the Internet of Things (IoT). The most importantapplicationsandissuesarecovered.BlockchainenabledIIoTresearchissuesandpotentialtrendswerealso examinedbytheauthors.[7]

Muhammad Tahir et. All (2020) Authentication,privacy, chaos,mining,andadministrationarejustafewoftheissues thatthegrowingIoTmarketandtheBlockchainecosystem are creating. In IoT applications, mutual authentication is essentialbecauseitgivessecuritytousersandassuresthe validity of data and protects their privacy. The mutual authentication of IoT devices has been separated into distinctclassesbasedontheauthenticationandassessment methodologies. A innovative approach for mutual authenticationandauthorisationispresentedinthiswork bytheauthors.Distributedjointconditionalprobabilityand the selection of random numbers are used to establish robustness in the proposed framework. The performance assessment and results analysis reveal that the suggested framework achieves better security strength, fewer communicationoverheadcosts,andconsumeslesstimein processingdatatogetherwithincreasedsecurity.[8]

Dr Mohd Javaid et. All (2021) Inadditiontoensuringthe safety of all communications between the many interconnectedsmartdevices,the blockchainalsokeepsa permanent record of every single message ever sent. Individuals'identitiescouldalsobeprotectedviablockchain technology. Due to its deceptive nature, this technology enablesitsuserstoestablishasafeanddependableonline persona.ABlockchainidentitymightbeusedforanything fromasingleclicktoaccessingawholesuiteofapplications andservicesorevenforgingdigitalsignatures.Blockchain couldbeusefulforSMEsandsuppliersasitoffersasecure, high-qualitytransactionaldatasource.Furthermore,ashop mustguaranteethatallofitsproductsareofuniformquality. [9]

Bhabendu K. Mohanta et. All (2019) The Internet of Things (or IoT) is a relatively new concept. Smart homes, smart cities, smart transportation, and smart healthcare systems are just a few examples of how IoT is enhancing human well-being in a variety of contexts. Real-time monitoringandcontrolareavailableinallcircumstances.To test the efficacy of the DecAuth (Decentralized Authentication)system,thispaperproposesaBlockchainbased ethereum platform implementation. An IoT device maybeauthenticatedinadecentralisedmanner,according totheexperimentalresults.Also,accordingtothestudy,the suggestedsystemisimpenetrable bythecurrentlyknown assaults.[10]

Jesse Yli-Huumo et. All (2016) TheBitcoincryptocurrency ispoweredbyblockchaintechnology.Anopenledgerofall transactionsismaintainedinadecentralizedsettingthatis accessibletoeveryone.Blockchainaimstogiveitsuserswith complete anonymity, safety, privacy, and transparency. However, these characteristics pose several technological issuesandconstraintsthatmustbeaddressed.Authorsused thesystematicmappingstudyapproachtomapallrelevant studiesonBlockchaintechnologytobettergraspthepresent stateofthefield.Thestudy'smainobjectivewastomapout

©
Page276
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

the existing state and future directions of blockchain technology.Asidefromthetechnical viewpoint,writers in this study did not offer viewpoints on economics, law, business, or regulation. From scientific databases, 41 primary publicationswereretrievedand examinedbythe authors.[11]

3. METHODOLOGY

3.1 Proposed Work Block Diagram

Figure: 3.1 ProposedWorkBlockDiagram

The proposed system is aimed for seamless authenticationofUser(s)&Device(s)inIOT-WSNNetwork’s, the system employs a block – chain of user/device authentication entries, which is used to train a Function Fitting Neural Network, which is used to ascertain the authenticity of new block - chain entry for user/device authentication,informofatransactionauthenticityscore.

Apart from block - chain based login access; secondaryauthenticationisprovidedbasedUserandDevice parameters listed below. The user/device parameters are used to train another pattern matching neural network, whichisusedtoprovideUser/DeviceAuthenticationScore.

Block-Chain based authentication score is combined with User/Device authentication score using custom machine intelligencetogeneratefinalauthenticationscore,whichis usedtoprovidemulti-layeraccesstovariousservicesand resourceshostedbytheIOT–WSNNetwork.

About LEVENBERG-MARQUARDT

Tocalculatethe minimum ofa function (linearor nonlinear) over a space of parameters, the well-known Levenberg-Marquardtalgorithm(LMA)isoftenemployed.A function,suchasaquadratic,isusedinternallytomimica reliableportionofthegoalfunction.Onceagoodmatchis established, the trusted area grows to include the new addition. The Levenberg-Marquardt methodology is sensitivetotheinitialbeginningparameters,asisthecase withmanynumericalalgorithms.Thisarticledescribesthe training and testing phases of the Levenberg-Marquardt algorithmforlearningartificialneuralnetworks.

Why LEVENBERG-MARQUARDT:

The created LM-ANN model is more sensitive for predictionoftheinflowswhenthestatisticsofthelong-term andseasonal-termoutputsarecompared.Further,thespeed andreliabilityoftheLM-ANNtechniquemakeitapplicableto themodellingofawiderangeofhydrologicalfactors.Fora givencollectionoftrainingdata,theLevenbergMarquardt (LM)trainingfunctionachievedthebestperformance(the smallestMSE).LevenbergMarquardtisfoundtobethemost effectivepredictivealgorithmthroughextensivetesting.

Key Benefits of LEVENBERG-MARQUARDT Algorithm:

1. TheLMalgorithmismorerobustandhasmorestable convergencethantheeGNalgorithm

2. This algorithm is mostly used for training small and mediumsizedproblemsinANN.

3. Theadvantageoftheapproachisthat,oncethenetwork is trained, it allows instantaneous evaluation of solutions at any desired number of points; thus, spendinglittlecomputingtime.

4. Levenberg-Marquardtalgorithmgivesthebestresults withhighperformance.

5. The Levenberg-Marquardt (LM) gradient descent algorithmisusedextensivelyforthetrainingofArtificial NeuralNetworks(ANN).

6. The Levenberg–Marquardt algorithm provides a numerical solution to the problem of minimizing a (generallynonlinear)function.

7. TheLEVENBERG-MARQUARDTmethodisasingle-shot method which attempts to find the local fit-statistic minimumnearesttothestartingpoint.

How LEVENBERG-MARQUARDT Helps

In the proposed work Levenberg–Marquardt algorithm Used for train artificial neural network and processsomefunctionsthansomemathematicalcalculation

©
Page277
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

will be perform then train function, then plot error and performance plot and calculated estimated distance with respect or transmit power. if any node tries to establish connectioninournetwork,ifthisisinourrangethenour accesscontrollerprovidedtruekeyforestablishconnection withsomeleniencyotherwiseifthisisinoutsidetherange thenaccesscontrollerprovidedfakerandomkeyforprivacy.

3.1.1 User & Device Parameters Used

User Parameters

S.No Parameter Name Narration

1. User Name/Password PrimaryAccessControl&User Identification

2. Keyboard/Touch HandlingProfile 2nd FactorAuthenticatorUsing ComparisonofKeyboard/Touch HandlingWithPreviously KnownHistory

3. FingerprintScan 2nd FactorAuthenticatorUsing Biometric–FingerprintScan UsingMinutiaeExtraction &EuclidianDistance Computation

4. Signature Using DSC 2nd FactorAuthenticationUsing DigitalSignatureCertificate ProvidedByTrustedAuthority SuchAsCCAInIndia

Table: 3.1 UserParameters

Device Parameters

S.No Parameter Name Narration

1. MACAddress PrimaryDeviceIdentifier,Using UniqueMachineAddressUsed ForDirectNodeAddressUsage orReferencedUsageSuchAsIP AddressBasedRedirection

2. Node Configuration 2ndFactorAuthenticatorUsing ComputingConfigurationofThe DeviceSuchAsProcessorSpeed, NumberofCores,RAM,Flash ROM,ArchitectureEtc

3. Battery Configuration& Health

4. Radio Configuration

2ndFactorAuthenticatorUsing BatteryConfiguration,Voltage, mAh,Technology,No.ofBanks EtcAlongWithBatteryHealth Monitoring

2ndFactorAuthenticatorUsing Wireless/RadioConfigurationof TheNode/DeviceSuchAs Transmitpower,Receive Sensitivity,NoiseFloorEtc

Table: 3.2 DeviceParameters

Factor value:

3.2 Trusted Node RF Ranging Based Location/Distance Approximation

Figure: 3.2 TrustedNodeRFRangingBased Location/Distance

Approximation

Apartfromtheauthenticationpathdescribedabove, another method of improving authentication score is provided, for User/Device denied access by marginal difference in authentication score, by verification of their physical/geographicproximitytothetrusted/centralnode using a novel technique developed using Artificial Intelligence & slowly increasing Transmit Distance by varying theRadioPowerusingTransmitPowerEstimation ANN, until ping is replied by the User/Device requesting access. After each ping, the pin generator increases the power by a certain amount until a node connects. Once a node does connect, the trained network calculates its distancefromanaccesscontrollerandprovidesakeyand someleniencyinaccess.Theaccesscontrollerwillprovidea false (fake) key if the neural networks calculated range is greaterthanthecoveragerange.Thisishowwe'llverifythe authenticity.

©
Page278
2022, IRJET | Impact
7.529 | ISO 9001:2008 Certified Journal |

International Research Journal of Engineering

and

Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

3.3 Artificial Neural Network Flow Chart

Neuralnetworksareself-learningadaptivesystems thatuseinterconnectednodes(sometimescalledneurons)in amulti-tieredarchitecturelikethehumanbrain(alsoknown as artificial neural networks). By being fed enough information,aneuralnetworkcanlearntoidentifypatterns, organizeinformationintocategories,andmakepredictions about the future. The input is broken down into levels of abstractionbyaneuralnetwork.Itmaybetaughttodetect patterns in speech or images, for example, using many samples, just like a human brain. A system's behavior is determinedbythewayitscomponentsarelinkedtogether and the weights attached to those links. To achieve the required job, these weights are automatically modified duringtrainingbasedonapredeterminedlearningrule.In thisflowchartwecansee1stourANNcodeisstartthancall totestvaluestheninputandtargetstestvaluesthenhidden layeroperationperformthenprocesssomefunctionsthan some mathematical calculation will be perform then train function, then plot error and performance plot after that codewillbestop.

4. RESULT

4.1 ANN Results

Figure: 3.3 ArtificialNeuralNetworkFlowChart

Figure: 4.1 BestValidationPerformancePlot

The accompanying diagram depicts the Artificial NeuralNetwork'sbestvalidationperformanceplot.Thebest, validation, test, and railway lines are all displayed here. Errortypicallyreduceswithadditionaltrainingepochsbut mayincreaseonthevalidationdatasetifthenetworkbegins to overfit the training data. Epochs with low validation errorsgetthegreatestresultswiththedefaultconfiguration afteraseriesofsixconsecutiveincreasesinvalidationerror.

© 2022, IRJET | Impact
7.529 | ISO 9001:2008 Certified Journal | Page279
Factor value:

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

power estimated is 3 mw and ping is success after 100 seconds.Atthedistanceof101meterandpowerestimated on this distance is 20 mw ping is success. This distance is outsidetherangeofcoverageareasothereisriskinprivacy if connection is established so access controller sent fake randomkeythatisintheformofzeroforprovidesecurityto network.

S. NO. Time Distance Power

1 0Sec. 0meter 3mw

2 10Sec. 10meters 2mw

3 20Sec. 20meters 3mw

4 30Sec. 30meters 4mw

Figure: 4.2 ErrorHistogramPlot

The error histogram plot produced by our neural networksimulationisdisplayedabove.Anerrorhistogramis a histogram of the deviations from the desired value, or forecast,thatoccurredaftertrainingafeedforwardneural network.Becausetheyindicatehowfartheprojectedvalues deviatefromthedesiredones,theseerrornumberscanbe negative.Thenumberofdiscretecategories(or"bins")ina barchart.Thehistogramisaformofbarchartthatdisplays numerical data by organizing it into discrete buckets. The error bars in the preceding graph range from a high of 0.01913at7instancestoalowof0.2843.

4.2 Estimated Power Results

Figure: 4.3 PingRequest-Distance&EstimatedPower

Theaboveresultisforpowerestimationbasedon distance,accesscontrollerstartssendingpingrequestatthe 0second,andcontinuouslysentpinwithtimeintervalof10 seconds with increment of some power after each 10 seconds of time interval. At the 0 (zero) meter transmit

5 40Sec. 40meters 2mw

6 50Sec. 50meters 8mw

7 60Sec. 60meters 11mw

8 70Sec. 70meters 14mw

9 80Sec. 80meters 17mw

10 90Sec. 90meters 19mw

11 100Sec. 101meters 20mw

Table: 4.1 PingRequest-Distance&EstimatedPower

Figure: 4.4 FakeRandomKeyGenerated

© 2022,
Certified Journal | Page280
IRJET | Impact Factor value: 7.529 | ISO 9001:2008

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

Inthisabovefigurewecanseepingreceivedatthe distanceof101meterandatthisdistancetransmitpoweris 20 mw, this range of distance estimated is outside of the allowedrange,soaccesscontrollergeneratesfakerandom keys in the form of zeros and provide to node for authenticationandprivacyofnetwork.

4.3 Node Distance Based Access Controller Result

Figure: 4.5 PingRequest–Distance&EstimatedPower

Abovefigureshowsdistanceestimationwithpower, access controller starts sending ping request with 2mw power,atthispowerdistanceestimatedbytrainednetwork is1meterat1second. Accesscontrollersentping request continuously with increment of some power, after 19 secondswith2mwpowerestimateddistancecalculatedby trained network is 19 meters at this point ping is success because this range in converge area so access controller provide initial key for establish connection with some leniencyinaccess.

S. NO. Time Distance Power

1 1Sec. 1meter 2mw

2 2Sec. 2meters 2.5mw

3 4Sec. 4meters 3mw

4 6Sec. 7meters 3mw

5 8Sec. 8meters 2.5mw

6 10Sec. 10meters 2mw

7 12Sec. 12meters 2mw

8 14Sec. 14meters 2mw

9 16Sec. 17meters 1mw

10 18Sec. 18meters 1mw

11 19Sec. 19meters 2mw

Table: 4.2 PingRequest–Distance&EstimatedPower

Figure: 4.6 InitializedKey

Inthisabovefigurewecanseeestimateddistance and initialize key. Above figure shows that node is in convergerange,sonodedistance-basedaccesscontrolleris ready for establish connection between node and access controller,becausepingisreceivedatdistanceof19meter. So,accesscontrollerprovedinitialkey,generatedinitialkey wecanalsoseeinabovefigure.

© 2022,
Certified Journal | Page281
IRJET | Impact Factor value: 7.529 | ISO 9001:2008

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

controllersentpingrequestcontinuouslywithincrementof somepowerwiththetimeintervalof10 seconds,after78 secondswith15mwpowerestimateddistancecalculatedby trainednetworkis77metersatthispointpingisaccept.But thisdistanceisnotinconvergerange,soaccesscontroller providesfakekeyforprivacyofnetwork.

S. NO. Time Distance Power

1 0Sec. 0meter 3mw

2 10Sec. 10meters 2mw

3 20Sec. 20meters 2mw

4 30Sec. 30meters 4mw

5 40Sec. 40meters 1mw

6 50Sec. 50meters 8mw

7 60Sec. 60meters 12mw

8 70Sec. 70meters 14mw

9 78Sec. 77meters 15mw

Table: 4.3 PingRequest-Distance&EstimatedPower

Figure: 4.7 GeneratedRandomKey

Inthisabovefigurewecanseegeneratedtrulyrandomkey.

Figure: 4.8 PingRequest-Distance&EstimatedPower

The above figure shows distance estimation with power,accesscontrollerstartssendingpingrequestwith0 mw power, at this power distance estimated by trained network is 0 meter at when time is 0 second. Access

value:

Figure: 4.9 FakeRandomKeyGenerated

© 2022, IRJET | Impact Factor
7.529 | ISO 9001:2008 Certified Journal | Page282

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

Inthisabovefigurewecanseepingreceivedatthe distanceof77meterandtheirtransmitpoweris15mw,this rangeofdistanceestimatedisoutsideoftheallowedrange, soaccesscontrollergeneratesfakerandomkeysintheform ofzerosandprovidetonodeforauthenticationandprivacy ofnetwork.

5. CONCLUSIONS & FUTURE SCOPE

Conclusion

Blockchain technology is used in the suggested system.Blockchain-basedsecuritymechanismsmayalsobe implemented in the real world. The same blockchain architectureallowsplayerstoidentifyeachdevice.Thedata putintothesystemisunquestionableandmaybeused to identify the device that supplied it. IoT applications will benefitgreatlyfromblockchain'sabilitytoprovidesecure, distributedauthenticationandauthorizationofIoTdevices. Smartcontractscanconfirmdevicemessageexchangeson the blockchain, making it possible to secure device communication.

IoT protocols can be more secure with the aid of blockchain technology. In the Blockchain, messages sent between devices may be seen as transactions, and smart contractscanbeusedtoverifythem.IoTprotocolscanbe moresecurewiththeaidofblockchaintechnology.Thegoal proposed work is provided privacy in network based on distanceandpowerestimation,ifanynodetriestoestablish connectioninournetwork,ifthisisinourrangethenour accesscontrollerprovidedtruekeyforestablishconnection withsomeleniencyotherwiseifthisisinoutsidetherange thenaccesscontrollerprovidedfakerandomkeyforprivacy. Severalfactors,includingPathlossisthedecreaseinpower density of a radio signal over a long distance. Path loss is morelikelyduetothegradualattenuationofradiosignals overtheirextendedjourney.

The so-called inverse square law states that the radio wave power density increases as the square of the distance decreases. The sensitivity of the receiver is the secondmostessentialfactorinestablishingarange.Fading margin and environmental circumstances are two other variables that must be accounted for in any computation. There is also a potential height effect on the measuring range,sobemindfulofthatwhilesettingupyourantenna. Theaccompanyinggraphdepictsnonlinearitythatiscaused bythenonlineareffectsofseveraldifferentvariablesinthe RFspectrum.

Future Scope

Biometric identifiers, fingerprints, voice samples, retina or iris information, and other forms of biometric identificationallcanbedoneforimprovementintermsof security.Akey'sdependabilitymayalsobeestimatedusing trustmetricsbuiltontopofthedatarecordsthatmakeup

blockchain. There will be a lot of testing of Io Chain’s performance and sturdiness through the development of various apps on top of it. Also, the private Ethereum blockchainnetworkhastobeupdatedsothatthePoS-based versionoftheledgermaybeutilized,whenitispublishedby Ethereumdevelopers.Toexpandthisworkintohealthcare, hospitality,pharmaceuticalandeducationispossibleinthe future.

REFERENCES

[1] Achraf Fayad, Badis Hammi, Rida Khatoun “A Blockchain-basedLightweightAuthenticationSolution forIoT”CyberSecurityinNetworkingConference2019.

[2] Aissam Outchkoucht, Hamza, Jean Philippe Leroy “Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things” InternationalJournalofAdvancedComputerScienceand Applications2017.

[3] SoumyashreeS.Panda,UtkalikaSatapathy,BhabenduK. Mohanta “A Blockchain Based Decentralized Authentication Framework for Resource Constrained IOTdevices”IEEE2019.

[4] Khadija Fazal1, Adeel M.Syed “Blockchain Authentication Mechanism for Securing Internet of Things”PakJET2020.

[5] Dr.SakthiKumaresh,Dr.KBPriyaIyer“Decentralised Artificial Intelligence Enabled Blockchain Network Model”TurkishJournalofComputerandMathematics Education2021.

[6] Praveen Kumar Kollu, Monika Saxena, Khongdet Phasinam“BlockchainTechniquesforSecureStorageof Data in Cloud Environment” Turkish Journal of ComputerandMathematicsEducation2021.

[7] Shanshan Zhao, Shancang Li “Blockchain Enabled IndustrialInternetofThingsTechnology”IEEE2019.

[8] Muhammad Tahir, Muhammad Sardaraz , Shakoor Muhammad “A Lightweight Authentication and AuthorizationFramework forBlockchain-EnabledIoT NetworkinHealth-Informatics”Sustainability2020.

[9] DrMohdJavaid,Prof.AbidHaleem,DrRaviPratapSingh “BlockchaintechnologyapplicationsforIndustry4.0:A literaturebasedreview”JournalPre-proof2021.

[10] BhabenduK.Mohanta,AnishaSahoo,ShibasisPatel “DecAuth:DecentralizedAuthenticationSchemeforIoT DeviceUsingEthereumBlockchain”IEEE2019.

[11] JesseYli-Huumo,DeokyoonKo,SujinCho“WhereIs Current Research on Blockchain Technology? A SystematicReview”PLOSONE2016.

© 2022,
|
| ISO
Certified Journal | Page283
IRJET
Impact Factor value: 7.529
9001:2008

Turn static files into dynamic content formats.

Create a flipbook