National Institute of Technology Rourkela

राष्ट्रीय प्रौद्योगिकी संस्थान राउरकेला

ଜାତୀୟ ପ୍ରଯୁକ୍ତି ପ୍ରତିଷ୍ଠାନ ରାଉରକେଲା

An Institute of National Importance

Seminar Details

Seminar Title:
Dynamic Authentication for Internet ofThings using Blockchain
Seminar Type:
Defence Seminar
Department:
Computer Science and Engineering
Speaker Name:
Manabhanjan Pradhan ( Rollno : 518cs1004)
Speaker Type:
Student
Venue:
Convention Hall, Department of CS Meeting Link : https://meet.google.com/rgh-cnqi-cko
Date and Time:
25 Jul 2025 4pm
Contact:
Sujata Mohanty
Abstract:

The rapid expansion of the Internet of Things (IoT) has created significant securitychallenges, particularly in ensuring secure communication and authentication across diverseapplications, from smart cities to healthcare. This thesis proposes a comprehensiveframework for authentication within IoT environments, leveraging fog computing andblockchain technology to address these challenges. The research introduces multipleauthentication schemes across various IoT domains, such as the Internet of Vehicles (IoV)and the Internet of Medical Things (IoMT), using approaches that integrate cryptographicprotocols and blockchain­enabled fog nodes to achieve secure,lightweight, and scalablesolutions.This thesis reviews IoT authentication mechanisms, emphasizing blockchain&rsquos role in enhancing security. It proposes a fog-based model for mutual authentication and data integrity, with an ECC-based scheme tailored for IoV. Formal analyses using ProVerif and informal assessments confirm resilience against key attacks. A multifactor authentication protocol for IoMT is introduced, ensuring privacy and efficiency in medical applications. The study also addresses secure, efficient communication in IoD environments.Overall, this thesis contributes to developing secure, efficient, and resilientauthentication schemes for IoT systems. The findings highlight the potential of blockchainand fog computing in enhancing IoT security and underscore the importance of adaptablesolutions for various IoT applications. Future research directions include optimizingprotocol scalability, integrating artificial intelligence for real­time threat detection, andadvancing cryptographic methods tailored to IoT&rsquos unique constraints.

Keywords: AuthenticationAVISPA Tool BAN Logic Biometric ECC RoR Model Smart card.

           

All are Cordially Welcome