SlideShare a Scribd company logo
IoT Two Factor Authentication Using Blockchain
David Hyland-Wood
david.wood@consensys.net
13 November 2019
Methods for Securing Spacecraft Tasking and
Control via an Enterprise Ethereum Blockchain
David Hyland-Wood, Peter Robinson, Roberto Saltini,
Sandra Johnson, Christopher Hare
http://w3id.org/people/prototypo/talks/eeg20191113
Internet of Things (IoT) two-factor authentication using blockchain
Abstract
We discuss the applicability of
enterprise Ethereum blockchains
to the problem of
IoT communication security,
analyse the properties of blockchain consensus algorithms
suitable for use with IoT devices, and suggest appropriate
information architectures.
The Need for
Improved IoT Security
“Some studies show that a
mere 28% of IoT devices
enjoy encryption, as do a
mere 25% of IoT data
repositories.”
Chris Matyszczyk, ZDNet
“45% (of surveyed
enterprises) have an
encryption strategy
applied consistently
across their enterprise.”
2019 Global Encryption
Trends Study
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
Spotty ComSec
Spacecraft and ground-based systems that control them are at risk of both active
hacking and denial-of-service attacks. Although few spacecraft operators publicly
acknowledge cybersecurity incidents, governmental transparency regulations in
the United States have allowed evidence of some incidents to be acknowledged:
● attacks that led to unauthorised access to “networks that control spacecraft”
at NASA JPL (NASA, June 2019)
● acknowledgement that U.S. Air Force satellites are “jammed by commercial
equipment easily acquired by state and nonstate actors” (Air Force Research
Institute, November 2011)
Blockchains as a proposed
solution space
Credit: Wüst and Gervais, 2017
Credit: Wüst and Gervais, 2017
Proof of Authority Consensus Algorithms with
Immediate Finality
Algorithm Message traffic
to/from satellite
Change needed to
onboard software
Byzantine Fault
Tolerant
Resilience to lost
messages
Honey
Badger
O(n2) O(b) Yes No
Tendermint O(n2) O(b) Yes No
DBFT O(n2) O(b) Yes No
Algorand1 O(n2) O(b) Not always No
IBFT O(n2) O(b) Not always No
IBFT 2.0 O(n2) O(b) Yes Yes
n: number of nodes b: block size1 finality not guaranteed
Possible Information Architectures
(a) Devices as a regular blockchain node.
(b) Devices as a mining (validator) blockchain
node.
(c) Devices may read from the blockchain.
(d) Devices requests transactions to be written to
the blockchain.
Comparison of blockchain-IoT device relationships
Architecture Message traffic to/from IoT
devices
Change needed to existing
onboard software
Regular node High High
Mining node High High
Read-only Low Low to Medium
Write request Low Medium
Multi-factor authentication &
multi-party authorisation
a command is executed
only if validatedA command is executed
Using multi-factor authentication
or multi-party authorisation:
In common usage:
a command is sent a command is sent command is validated via a
blockchain read
Multi-factor
authentication
(MFA)
Multi-party
authorisation
(MPA)
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
(a) An operator proposes a command to be sent
to a spacecraft.
(b) Some number of automated processes (zero or
more) confirm command syntax and perhaps
applicability in the operational context.
(c) Some number of humans (zero or more)
confirm the command should proceed.
(d) The smart contract sets the entry of the
command approval table associated with the
hash of the command to the Boolean value True.
(e) The operator sends the command to the
spacecraft.
(f) The spacecraft hashes the command and
verifies that the entry of the approval table
associated with the hash is set to True.
(g) The spacecraft executes the command if and
only if the command verification was successful.
NB: The blockchain nodes come to consensus
after each write to any copy of the smart contract.
Results
● We analysed how existing IoT systems may improve their communication
security by using blockchains for multi-factor authentication and/or multi-party
authorisation.
● We then suggested specific blockchain properties to choose:
○ an enterprise Ethereum blockchain to implement multi-factor authentication,
multi-party authorisation or both
○ via a smart contract
○ on a private or consortium network
○ with user permissions
○ and an IBFT 2.0 consensus algorithm.
Results
● We contend that such systems may be used in the presence of
partially compromised IT networks.
IoT Two Factor Authentication Using Blockchain
David Hyland-Wood
david.wood@consensys.net
13 November 2019
http://w3id.org/people/prototypo/talks/eeg20191113
Acknowledgments
29
● Cow: Image by Karsten Paulick (https://pixabay.com/users/Kapa65-61253/) via Pixabay. Free for commercial use under the Pixabay
license. No attribution required.
● RFID tag on child’s wrist: U.S. Navy photo by Chief Journalist Al Bloom. US Government Work.
https://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3303
● Emotion Recognition by Flickr user fotologic, CC-BY-2.0 license, https://www.flickr.com/photos/fotologic/23742687222
● Barcode scanner: Wikimedia Commons user IAEA 3, CC BY-SA 2.0,
https://commons.wikimedia.org/wiki/File:Package_tracking_barcode_scanner_3.jpg
● Ncipher 2019 Global Encryption Trends Study, https://go.ncipher.com/rs/104-QOX-775/images/2019-Ponemon-France-Encryption-Trends-
Study-fr-ar.pdf
● Chris Matyszczyk, 1 in 5 IT security professionals fear their connected toilets will be hacked, October 15, 2019,
https://www.zdnet.com/article/1-in-5-it-professionals-fear-their-connected-toilets-will-be-hacked/

More Related Content

What's hot (20)

PDF
How blockchain will defend iot
Hitesh Malviya
 
PPTX
IoT, Fog Computing and the Blockchain
kumar641
 
PDF
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
NUS-ISS
 
PDF
An Introduction AI, Blockchain and IoT
Stylight
 
PDF
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
IJNSA Journal
 
PPTX
IoT Trends
Ria Katiyar
 
PPT
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
Business of Software Conference
 
PPTX
The Blockchain Wave in 2019 and Beyond - SJSU
Ahmed Banafa
 
PPTX
7 Industries Influencing Blockchain Testing
Cygnet Infotech
 
PPTX
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
PDF
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
blockchainexe
 
PPTX
Keynote Session : Internet Of Things (IOT) Security Taskforce
Priyanka Aash
 
PPT
Smart Gateways, Blockchain and the Internet of Things (Charalampos Doukas-Cre...
AGILE IoT
 
PDF
10 technology trends that will shape security industry 2018
Axis Communications
 
PDF
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
PDF
How Blockchain can be used in IoT
celine anderson
 
PPTX
IoT and Blockchain Challenges and Risks
Ahmed Banafa
 
PDF
Nucleus vision onepager
Deepika Jha
 
PPTX
IoT
snehal_152
 
PDF
Interner of Things Iinsurance gateway
Δρ. Γιώργος K. Κασάπης
 
How blockchain will defend iot
Hitesh Malviya
 
IoT, Fog Computing and the Blockchain
kumar641
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
NUS-ISS
 
An Introduction AI, Blockchain and IoT
Stylight
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
IJNSA Journal
 
IoT Trends
Ria Katiyar
 
Charalampos Doukas, ICT30 AGILE, IoT Forum 2016, Smart Gateways, Blockchain &...
Business of Software Conference
 
The Blockchain Wave in 2019 and Beyond - SJSU
Ahmed Banafa
 
7 Industries Influencing Blockchain Testing
Cygnet Infotech
 
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
blockchainexe
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Priyanka Aash
 
Smart Gateways, Blockchain and the Internet of Things (Charalampos Doukas-Cre...
AGILE IoT
 
10 technology trends that will shape security industry 2018
Axis Communications
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
How Blockchain can be used in IoT
celine anderson
 
IoT and Blockchain Challenges and Risks
Ahmed Banafa
 
Nucleus vision onepager
Deepika Jha
 
Interner of Things Iinsurance gateway
Δρ. Γιώργος K. Κασάπης
 

Similar to Internet of Things (IoT) two-factor authentication using blockchain (20)

PPTX
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
PDF
The Internet of Things: We've Got to Chat
Duo Security
 
PDF
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
PPTX
Blockchain in the Heart of Digital Transformation
Dr. Mohamed Torky
 
PPTX
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
David Wood
 
PDF
Sarwar sayeed , hector marco gisbert, tom caira ieee
IT Strategy Group
 
PDF
Blockchain technology and internet of things: review, challenge and security...
IJECEIAES
 
PDF
The Role of Blockchain in Securing IoT Devices (www.kiu.ac.ug)
publication11
 
PDF
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
PDF
Impact through Blockchain - Hype or Hope?
Theodor Beutel
 
PDF
Literature survey on peer to peer botnets
Acad
 
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
 
PDF
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
AlAtfat
 
PDF
Navigating Crypto: Industry Map
Sarasotamug
 
PDF
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
PDF
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
 
PDF
Blockchain for the internet of things a systematic literature review
eraser Juan José Calderón
 
PPTX
Information Technology Strategy by Group 3
ipm03sivaadithyas
 
PDF
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
 
PDF
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
IJCNCJournal
 
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
The Internet of Things: We've Got to Chat
Duo Security
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
Blockchain in the Heart of Digital Transformation
Dr. Mohamed Torky
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
David Wood
 
Sarwar sayeed , hector marco gisbert, tom caira ieee
IT Strategy Group
 
Blockchain technology and internet of things: review, challenge and security...
IJECEIAES
 
The Role of Blockchain in Securing IoT Devices (www.kiu.ac.ug)
publication11
 
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
Impact through Blockchain - Hype or Hope?
Theodor Beutel
 
Literature survey on peer to peer botnets
Acad
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
AlAtfat
 
Navigating Crypto: Industry Map
Sarasotamug
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
 
Blockchain for the internet of things a systematic literature review
eraser Juan José Calderón
 
Information Technology Strategy by Group 3
ipm03sivaadithyas
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
 
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
IJCNCJournal
 
Ad

More from David Wood (20)

PPTX
Returning to Online Privacy?
David Wood
 
PPTX
BlockSW 2019 Keynote
David Wood
 
PDF
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
David Wood
 
PDF
Privacy in the Smart City
David Wood
 
PDF
Controlling Complexities in Software Development
David Wood
 
PDF
Privacy Concerns related to Verifiable Claims
David Wood
 
PDF
Implementing the Verifiable Claims data model
David Wood
 
PDF
So You Wanna be a Startup CTO 20170301
David Wood
 
PDF
Functional manipulations of large data graphs 20160601
David Wood
 
PDF
When Metaphors Kill
David Wood
 
PDF
Secularism in Australia
David Wood
 
PDF
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
David Wood
 
PDF
Building a writer's platform with social media
David Wood
 
PDF
Summary of the Hero's Journey
David Wood
 
PDF
Open by Default
David Wood
 
PDF
Lod Then, Now and Next 20110926
David Wood
 
PDF
Linked Data ROI 20110426
David Wood
 
PDF
Introduction to Linked Data: RDF Vocabularies
David Wood
 
PDF
Introduction to Linked Data: RDF Vocabularies
David Wood
 
PDF
Introduction to Linked Data: RDF Vocabularies
David Wood
 
Returning to Online Privacy?
David Wood
 
BlockSW 2019 Keynote
David Wood
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
David Wood
 
Privacy in the Smart City
David Wood
 
Controlling Complexities in Software Development
David Wood
 
Privacy Concerns related to Verifiable Claims
David Wood
 
Implementing the Verifiable Claims data model
David Wood
 
So You Wanna be a Startup CTO 20170301
David Wood
 
Functional manipulations of large data graphs 20160601
David Wood
 
When Metaphors Kill
David Wood
 
Secularism in Australia
David Wood
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
David Wood
 
Building a writer's platform with social media
David Wood
 
Summary of the Hero's Journey
David Wood
 
Open by Default
David Wood
 
Lod Then, Now and Next 20110926
David Wood
 
Linked Data ROI 20110426
David Wood
 
Introduction to Linked Data: RDF Vocabularies
David Wood
 
Introduction to Linked Data: RDF Vocabularies
David Wood
 
Introduction to Linked Data: RDF Vocabularies
David Wood
 
Ad

Recently uploaded (20)

PDF
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
 
PPTX
Lesson 1 Cell (Structures, Functions, and Theory).pptx
marvinnbustamante1
 
PPT
21st Century Literature from the Philippines and the World QUARTER 1/ MODULE ...
isaacmendoza76
 
PPTX
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
 
PPTX
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
 
PDF
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
PPTX
SYMPATHOMIMETICS[ADRENERGIC AGONISTS] pptx
saip95568
 
PDF
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
PPTX
Connecting Linear and Angular Quantities in Human Movement.pptx
AngeliqueTolentinoDe
 
PPTX
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
PDF
Rapid Mathematics Assessment Score sheet for all Grade levels
DessaCletSantos
 
PPTX
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
PDF
COM and NET Component Services 1st Edition Juval Löwy
kboqcyuw976
 
DOCX
Lesson 1 - Nature and Inquiry of Research
marvinnbustamante1
 
PPTX
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
PPTX
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
PPTX
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
PDF
Nanotechnology and Functional Foods Effective Delivery of Bioactive Ingredien...
rmswlwcxai8321
 
PDF
DIGESTION OF CARBOHYDRATES ,PROTEINS AND LIPIDS
raviralanaresh2
 
PPTX
PLANNING FOR EMERGENCY AND DISASTER MANAGEMENT ppt.pptx
PRADEEP ABOTHU
 
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
 
Lesson 1 Cell (Structures, Functions, and Theory).pptx
marvinnbustamante1
 
21st Century Literature from the Philippines and the World QUARTER 1/ MODULE ...
isaacmendoza76
 
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
 
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
 
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
SYMPATHOMIMETICS[ADRENERGIC AGONISTS] pptx
saip95568
 
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
Connecting Linear and Angular Quantities in Human Movement.pptx
AngeliqueTolentinoDe
 
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
Rapid Mathematics Assessment Score sheet for all Grade levels
DessaCletSantos
 
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
COM and NET Component Services 1st Edition Juval Löwy
kboqcyuw976
 
Lesson 1 - Nature and Inquiry of Research
marvinnbustamante1
 
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
Nanotechnology and Functional Foods Effective Delivery of Bioactive Ingredien...
rmswlwcxai8321
 
DIGESTION OF CARBOHYDRATES ,PROTEINS AND LIPIDS
raviralanaresh2
 
PLANNING FOR EMERGENCY AND DISASTER MANAGEMENT ppt.pptx
PRADEEP ABOTHU
 

Internet of Things (IoT) two-factor authentication using blockchain

  • 1. IoT Two Factor Authentication Using Blockchain David Hyland-Wood [email protected] 13 November 2019
  • 2. Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereum Blockchain David Hyland-Wood, Peter Robinson, Roberto Saltini, Sandra Johnson, Christopher Hare
  • 5. Abstract We discuss the applicability of enterprise Ethereum blockchains to the problem of IoT communication security, analyse the properties of blockchain consensus algorithms suitable for use with IoT devices, and suggest appropriate information architectures.
  • 6. The Need for Improved IoT Security
  • 7. “Some studies show that a mere 28% of IoT devices enjoy encryption, as do a mere 25% of IoT data repositories.” Chris Matyszczyk, ZDNet “45% (of surveyed enterprises) have an encryption strategy applied consistently across their enterprise.” 2019 Global Encryption Trends Study
  • 10. Spotty ComSec Spacecraft and ground-based systems that control them are at risk of both active hacking and denial-of-service attacks. Although few spacecraft operators publicly acknowledge cybersecurity incidents, governmental transparency regulations in the United States have allowed evidence of some incidents to be acknowledged: ● attacks that led to unauthorised access to “networks that control spacecraft” at NASA JPL (NASA, June 2019) ● acknowledgement that U.S. Air Force satellites are “jammed by commercial equipment easily acquired by state and nonstate actors” (Air Force Research Institute, November 2011)
  • 11. Blockchains as a proposed solution space
  • 12. Credit: Wüst and Gervais, 2017
  • 13. Credit: Wüst and Gervais, 2017
  • 14. Proof of Authority Consensus Algorithms with Immediate Finality Algorithm Message traffic to/from satellite Change needed to onboard software Byzantine Fault Tolerant Resilience to lost messages Honey Badger O(n2) O(b) Yes No Tendermint O(n2) O(b) Yes No DBFT O(n2) O(b) Yes No Algorand1 O(n2) O(b) Not always No IBFT O(n2) O(b) Not always No IBFT 2.0 O(n2) O(b) Yes Yes n: number of nodes b: block size1 finality not guaranteed
  • 16. (a) Devices as a regular blockchain node. (b) Devices as a mining (validator) blockchain node. (c) Devices may read from the blockchain. (d) Devices requests transactions to be written to the blockchain.
  • 17. Comparison of blockchain-IoT device relationships Architecture Message traffic to/from IoT devices Change needed to existing onboard software Regular node High High Mining node High High Read-only Low Low to Medium Write request Low Medium
  • 19. a command is executed only if validatedA command is executed Using multi-factor authentication or multi-party authorisation: In common usage: a command is sent a command is sent command is validated via a blockchain read
  • 24. (a) An operator proposes a command to be sent to a spacecraft. (b) Some number of automated processes (zero or more) confirm command syntax and perhaps applicability in the operational context. (c) Some number of humans (zero or more) confirm the command should proceed. (d) The smart contract sets the entry of the command approval table associated with the hash of the command to the Boolean value True. (e) The operator sends the command to the spacecraft. (f) The spacecraft hashes the command and verifies that the entry of the approval table associated with the hash is set to True. (g) The spacecraft executes the command if and only if the command verification was successful. NB: The blockchain nodes come to consensus after each write to any copy of the smart contract.
  • 25. Results ● We analysed how existing IoT systems may improve their communication security by using blockchains for multi-factor authentication and/or multi-party authorisation. ● We then suggested specific blockchain properties to choose: ○ an enterprise Ethereum blockchain to implement multi-factor authentication, multi-party authorisation or both ○ via a smart contract ○ on a private or consortium network ○ with user permissions ○ and an IBFT 2.0 consensus algorithm.
  • 26. Results ● We contend that such systems may be used in the presence of partially compromised IT networks.
  • 27. IoT Two Factor Authentication Using Blockchain David Hyland-Wood [email protected] 13 November 2019
  • 29. Acknowledgments 29 ● Cow: Image by Karsten Paulick (https://pixabay.com/users/Kapa65-61253/) via Pixabay. Free for commercial use under the Pixabay license. No attribution required. ● RFID tag on child’s wrist: U.S. Navy photo by Chief Journalist Al Bloom. US Government Work. https://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3303 ● Emotion Recognition by Flickr user fotologic, CC-BY-2.0 license, https://www.flickr.com/photos/fotologic/23742687222 ● Barcode scanner: Wikimedia Commons user IAEA 3, CC BY-SA 2.0, https://commons.wikimedia.org/wiki/File:Package_tracking_barcode_scanner_3.jpg ● Ncipher 2019 Global Encryption Trends Study, https://go.ncipher.com/rs/104-QOX-775/images/2019-Ponemon-France-Encryption-Trends- Study-fr-ar.pdf ● Chris Matyszczyk, 1 in 5 IT security professionals fear their connected toilets will be hacked, October 15, 2019, https://www.zdnet.com/article/1-in-5-it-professionals-fear-their-connected-toilets-will-be-hacked/