Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
5 results
Search Results
Item Decentralised Authentication Protocol for Devices & Users to Access Private Network Services Using Blockchain(IEEE Computer Society, 2023) Praneeth, P.; Tanguturu, R.; Aenugutala, S.P.; Cunha, T.B.D.; Manjappa, K.With recent advancements in the Internet of things, challenges to secure devices and data related to devices have increased. Adversaries using different threats manage to clone/hack/tamper devices by hacking credentials stored in centralised databases. In this work, a decentralised approach using blockchain is proposed to check the authenticity of the device/user trying to access the services of the service provider network. The proposed method uses public and private blockchain networks and Physical Unclonable Function (PUF) to authenticate the device/user and to store their credentials. The decentralised application runs on Hyperledger Fabric, an open-source platform for building blockchain networks. The proposed protocol is tested and implemented in the physical testbed containing Raspberry Pi and Arduino Mega's. © 2023 FRUCT.Item PUF-Based Ownership Transfer Using Blockchain(Springer Science and Business Media Deutschland GmbH, 2025) Cunha, T.B.D.; Manjappa, M.; Singh, V.; Anand, A.Counterfeiting of electronic components in the branded products is one of the most important and difficult issues to deal with in national/international markets along with the trusted ownership transfer of the product. Today we have to trust an individual while buying a product believing that the product is not tampered. But, we do not have any trusted source which can back this claim. This creates a lot of speculation in the market. For a long time RFID tags were used to find the anti counterfeits in the supply chain, but the problem with the RFID tag is that they can be cloned and hence the authenticity of the tags over the network is questionable. Hence, in order to counter this, we are leveraging blockchain technology to build a novel ownership transfer protocol where the ownership transfer mechanism is secured and authenticated using Physically Unclonable Functions (PUF). The genuinity of the product is checked by PUF by using Challenge Response check during the ownership transfer. Further, the ownership transfer history of the particular product is also maintained in the blockchain which helps the buyer to get more details on the product. The proposed blockchain architecture also provides a temporary ownership transfer option for the owners during servicing or leasing. The proposed architecture is implemented in ethereum blockchain platform and tested for its efficiency. The architecture is found to be promising. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.Item Decentralized Authentication and Data Security Scheme for IoMT Devices and Patients Using Blockchain, PUF and IPFS(Springer Science and Business Media Deutschland GmbH, 2025) Cunha, T.B.D.; Manjappa, M.; Mina, D.; Waykar, S.M.; Naik, K.S.The Internet of Medical Things (IoMT) is a rapidly evolving field and requires strong authentication and data security measures to protect patient privacy and preserve the integrity of medical data. This research focuses on Interplanetary File Systems (IPFS), blockchain, and Physical Unclonable Functions (PUFs) to propose a decentralized authentication and data security scheme for IoMT devices and patients. Blockchain technology and PUF are combined in the IoMT device authentication process to provide high trust and integrity in device identity. Similarly, patient authentication utilizes the transparent and immutable properties of the blockchain. A secure and auditable framework for patient identity verification and to further improve data access, availability, and flexibility while mitigating the risks associated with centralized storage systems, the project incorporates IPFS as a decentralized storage option for patient data. Through the use of IPFS gateways, patient data is securely dispersed among a network of nodes, reducing the possibility of denied access and single points of failure. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.Item Private and Consortium Blockchain-based Authentication Protocol for IoT Devices Using PUF(Korean Institute of Communications and Information Sciences, 2024) Cunha, T.B.D.; Manjappa, K.In this work, a static random access memory-physical unclonable function (SRAM-PUF) based device security framework is proposed which uses the trending blockchain technology for securing the device credentials. The proposed framework produces a unique fingerprint called PUF key for each device based on its hardware characteristics which will act as an authenticating parameter for the devices during the authentication and re-authentication phase. The proposed work uses both consortium and private blockchains for storing device credentials and authentication, unlike the current trend of using either a secured database or only a public blockchain. The consortium blockchain is used for first-time authentication, while the private blockchain is used for repeated authentication which saves the time incurred in accessing the consortium blockchain during repeated authentication. The proposed protocol also includes mutual authentication between the entities involved and thus provides dual security (device authentication and mutual authentication) to the proposed protocol making the system more secure and robust against attacks. Security analysis of the proposed protocol is done using the Scyther tool and the protocol is also theoretically proven to be stable under various attacks using threat analysis and the real-or-random model (ROR). The performance analysis of the protocol is done by analyzing the computation and communication cost of the proposed protocol against other state-of-the-art protocols. Further, the proposed protocol is also evaluated in the blockchain testbed which includes Raspberry PI and Arduino components. The results conveyed that the introduction of a private blockchain reduces the time incurred in the device re-authentication. © 2024 KICS.Item Physical unclonable functions and QKD-based authentication scheme for IoT devices using blockchain(Elsevier B.V., 2024) Cunha, T.B.D.; Manjappa, M.; Ranjan, R.; Vasilakos, A.V.As the number of Internet of Things (IoT) devices is increasing exponentially, strong security measures are needed to guard against different types of cyberattacks. This research offers a novel IoT device authentication technique to mitigate these challenges by integrating three cutting-edge technologies namely blockchain technology, Quantum Key Distribution (QKD), and Physically Unclonable Functions (PUFs). By utilizing the distinctive qualities of PUFs for device identification and the unrivaled security of QKD for key exchange, the proposed approach seeks to address the significant security issues present in IoT environments. Adopting blockchain technology ensures transparency and verifiability of the authentication process across distributed IoT networks by adding an unchangeable, decentralized layer of trust. An examination of the computing and communication costs reveals that the proposed protocol is effective, necessitating low computational resources that are critical for IoT devices with limited resources. The protocol's resistance against a variety of attacks is demonstrated by formal proofs based on the Real-Or-Random (ROR) model and security evaluations using the Scyther tool, ensuring the integrity and secrecy of communications. Various threats are analyzed, and the protocol is proven to be secure and efficient from all forms of attacks. © 2024 Elsevier B.V.
