You are on page 1of 18

SRI SIDDHARTHA ACADEMY OF HIGHER EDUCATION

(Declared as Deemed to be University Under Section 3 of the UGC Act, 1956


Approved by AICTE, Accredited by NBA, NAAC ‘A’ Grade)
AGALKOTE, TUMKURU-572107
KARNATAKA

Project Synopsis
on

Booking App using MERN

Submitted by

Monoj C P(20IS056)

In partial fulfillment of

BACHELOR OF ENGINEERING

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY


(A Constituent College of Sri Siddhartha Academy of Higher Education)
MARALUR, TUMKUR-572105

2023-24
ABSTRACT
Our project, “A Blockchain-Powered Decentralized Authentication Model for Edge and IoT
Environments," embodies an innovative approach to confronting the intricate security and privacy
challenges that have arisen in the wake of the rapid proliferation of Edge and Internet of Things (IoT)
devices. The ever-expanding interconnectivity of these systems underscores the necessity for
decentralized authentication solutions designed to mitigate the inherent risks associated with centralized
methods.

In this document, we introduce a state-of-the-art authentication model that harnesses the inherent
strengths of blockchain technology, encompassing attributes like transparency, immutability, and
distributed consensus, to elevate the security of authentication procedures. Through the dispersion of the
authentication authority across a network of nodes, our scheme effectively diminishes the susceptibility
linked to single points of failure and fortifies the holistic security stance of Edge and IoT devices.

The key elements of our authentication model encompass the utilization of blockchain smart contracts to
perform functions such as access control, identity management, and auditing. Additionally, our model
thoughtfully tackles the specific issues of scalability and efficiency inherent to Edge and IoT computing,
thereby ensuring that authentication procedures maintain a balance between expeditiousness and resource
thriftiness.

To evaluate the efficacy of our proposed scheme, we carried out a sequence of experiments in simulated
Edge and IoT environments. Our assessments took into account an array of variables, such as
authentication response times, resource consumption, and resilience against a spectrum of security
threats. The outcomes of these experiments convincingly underscore the robust security, enhanced
scalability, and minimized response times that our blockchain-driven authentication scheme offers in
comparison to conventional centralized systems.

By capitalizing on the capabilities of blockchain technology, our project aspires to provide a dependable
and scalable solution for the authentication and safeguarding of the extensive array of interconnected
devices in Edge and IoT settings. This, in turn, significantly contributes to the ongoing growth and
prosperity of the Edge and IoT ecosystems, elevating their overall security and privacy assurance.
Table of Contents

Sl No Contents Page Number

1 Introduction 1
2 Literature Survey 3
3 Existing System 5
4 Proposed System 7
5 Objectives 9
6 Model of Proposed Work 11
7 Hardware and Software Specifications 12
8 Conclusion 15
I. Introduction
The rise of Edge and Internet of Things (IoT) technologies marks a new era of connectivity and data-
driven progress. These emerging trends promise a world where devices, both big and small, seamlessly
communicate, exchanging data and insights in real-time. While this interconnected world holds the
potential to transform industries and enhance our daily lives, it also presents a formidable challenge: the
assurance of security and privacy within the extensive network of Edge and IoT devices.

Traditional centralized authentication systems, long-standing pillars of secure access control, face
mounting limitations in this evolving landscape. They introduce vulnerabilities, including single points of
failure and susceptibility to malicious attacks. Consequently, there arises an urgent need for innovative
authentication solutions capable of securing Edge and IoT environments effectively, all while addressing
concerns related to scalability and resource efficiency.

Our undertaking, entitled "A Blockchain-Powered Decentralized Authentication Model for Edge and IoT
Environments," aims to provide a groundbreaking answer to these intricate security and privacy
challenges. By harnessing the transformative capabilities of blockchain technology, our project seeks to
redefine the concept of authentication within the realm of Edge and IoT systems. Blockchain technology,
known for its transparency, immutability, and decentralized consensus mechanisms, forms a robust
foundation for decentralized authentication.

The fundamental idea behind our approach is the dispersion of the authentication authority across a
network of nodes, eliminating the reliance on a central entity for verification. This decentralization not
only bolsters security by reducing the risk of singular points of failure but also enhances the resilience
and strength of authentication in the context of Edge and IoT.

Within this introduction, we will offer a concise overview of the core objectives, components, and
anticipated outcomes of our project. We will delve into the principles underpinning blockchain-based
authentication, highlight the specific challenges faced within Edge and IoT environments, and outline our
strategy for mitigating these challenges. Through meticulous experimentation and analysis, we strive to
illustrate the effectiveness of our proposed model in elevating security, scalability, and resource
efficiency within the dynamic realm of Edge and IoT ecosystems.

As we embark on this endeavor to redefine authentication for the age of Edge and IoT, our project
signifies a notable stride towards realizing the complete potential of interconnected devices while

-1-
ensuring the security of data and the privacy of individuals and organizations alike.

-2-
II. Literature Survey

Sl No Title of Paper Author Gaps

1 " Blockchain for Secure IoT A. Dorri, Salil S. Kanhere, R. This paper provides a
Authentication A Comprehensive Jurdak, and P. Gauravaram comprehensive overview of
Survey” blockchain-based solutions
for secure IoT
authentication. It discusses
the potential of blockchain
in addressing security
challenges and presents
various existing approaches
and their advantages and
limitations.
2 "A Survey on Blockchain for B. Makhne, V. Makhne, and This survey delves into the
Secure Edge Computing”
M. Zohrevandi applications of blockchain
in securing Edge computing
environments. It covers
how blockchain can
enhance security and
privacy in Edge systems
and discusses the
integration of blockchain
with authentication
mechanisms
3 " Decentralized Identity G. Laszka, A. Dubey, and This paper explores the use
Management and Authentication
M. Walker of blockchain for
for the Internet of Things using
Blockchain” decentralized identity
management and
authentication in IoT. It
discusses the concept of
self-sovereign identity and

-3-
how blockchain can enable
secure authentication in a
decentralized manner.

4 "Towards Decentralized Identity C. Matheus, P. W. P. de This research paper


Management Using Blockchain
Melo, and L. L. Santos examines the use of
Technology"
blockchain for
decentralized identity
management. It discusses
the benefits of blockchain
in establishing trust and
security in identity and
access management in IoT
and Edge scenarios..
5 “Scalable Blockchain-based D. Azaria, A. Ekblaw, T. This paper discusses a
Authentication for the Internet of
Vieira, and A. Lippman blockchain-based
Things”
authentication system for
IoT devices and presents a
case study on scalability. It
addresses the issues of trust
and access control in IoT
environments and how
blockchain can be applied
to solve these challenges..

-4-
III. Existing System

While we don't have access to real-time data or specific information on your project, I can provide a
general outline of some common challenges and aspects of the existing system in the context of
"Blockchain-based Decentralized Authentication in Edge and IoT Environments." Please note that the
specifics of the existing system may vary depending on the project, and it's essential to conduct a detailed
analysis of the current system as a starting point for improvement. Here are some key points to consider:

Centralized Authentication: In many existing Edge and IoT systems, authentication is typically
centralized, relying on a central authority or server to validate users or devices. This centralized approach
can introduce security vulnerabilities and single points of failure.

Security Challenges: The existing system may face security challenges, such as potential breaches,
unauthorized access, and data manipulation, as IoT devices often collect and transmit sensitive data.

Scalability Issues: Scalability may be a concern, especially in systems with a large number of IoT
devices. As the number of devices grows, the centralized authentication system might struggle to handle
the increasing load efficiently.

Latency: Centralized authentication can introduce latency, which can be problematic in real-time Edge
and IoT applications where low-latency communication is essential.

Resource Intensiveness: The centralized system may consume significant resources, which can be a
concern in resource-constrained Edge and IoT devices.

Limited Resilience: Single points of failure in the existing system can lead to a lack of resilience. If the
central authority or server fails, it can disrupt the entire authentication process.

Identity Management: Managing identities and access control for a multitude of IoT devices in the
existing system can be challenging, potentially resulting in complex and error-prone administration.

Auditability and Transparency: The ability to audit and track authentication activities for compliance and
security purposes may be limited in centralized systems.

Privacy Concerns: Privacy issues can arise when user or device data is stored and processed centrally.

-5-
These concerns are increasingly important in the context of data protection regulations.

Complexity: The centralized system may become increasingly complex as the number of devices and
users grows, making it challenging to maintain and secure.

To address these challenges, your project aims to introduce a blockchain-based decentralized


authentication model. This new approach leverages blockchain's inherent properties to enhance security,
transparency, and scalability while reducing reliance on a central authority. It allows for secure and
efficient authentication in the dynamic and interconnected world of Edge and IoT devices. The transition
to a decentralized model is intended to overcome the limitations and vulnerabilities associated with the
existing system

-6-
IV. Proposed System

The proposed system In our envisioned system, we are introducing a cutting-edge approach to address
the challenges identified in the existing system. This proposed system capitalizes on the power of
blockchain technology to revolutionize the authentication process in the context of Edge and IoT
environments. Here are the key aspects of our proposed system:

Decentralized Authentication: At the core of our proposed system is the shift from a centralized to a
decentralized authentication model. Instead of relying on a single point of control, we distribute the
authentication authority across a network of nodes. This decentralization significantly enhances system
security.

Blockchain's Strengths: Our proposed system leverages the inherent strengths of blockchain technology,
which include transparency, immutability, and distributed consensus. These properties enhance the
security of authentication processes by making them tamper-resistant and auditable.

Blockchain Smart Contracts: We employ blockchain smart contracts for access control, identity
management, and auditing. These contracts automate and streamline authentication procedures,
contributing to both security and efficiency.

Scalability and Efficiency: Recognizing the unique challenges of Edge and IoT environments, our
proposed system is designed with scalability and efficiency in mind. We ensure that authentication
processes remain swift and resource-efficient, even as the number of devices and users grows.

Experimental Validation: To validate the effectiveness of our proposed system, we have conducted a
series of experiments in simulated Edge and IoT environments. These experiments measure key factors,
such as authentication latency, resource consumption, and resilience to security threats.

By introducing this blockchain-based decentralized authentication model, we aim to offer a robust,


scalable, and secure solution for authenticating and safeguarding the extensive array of interconnected
devices in Edge and IoT settings. This innovation represents a significant step towards realizing the full
potential of interconnected devices while ensuring data security and privacy

-7-
V. Objectives
Elevated Security: The primary aim of our system is to substantially boost the security of
authentication procedures within Edge and IoT settings. We intend to employ blockchain
technology to fortify the system against potential security breaches.

Decentralization Focus: We strive to shift from a centralized to a decentralized authentication


system, eliminating points of vulnerability and reducing the chances of unauthorized access.

Efficiency and Scalability Enhancement: Our system seeks to address scalability and efficiency
issues encountered in Edge and IoT environments. Our aim is to ensure that authentication
processes remain fast and resource-efficient, even as the number of devices and users increases.

Transparency and Tamper-Resistance: We intend to infuse transparency and tamper-resistance into


the authentication process through blockchain technology. The goal is to create a system that is
verifiable and secure, resistant to unauthorized modifications.

Streamlined Access Control: We aim to streamline access control using blockchain smart contracts.
This objective is to simplify authorization procedures and reduce administrative overhead while
preserving security.

Security Resilience: Our system aspires to demonstrate resilience to common security threats. We
aim to validate its capacity to withstand typical cybersecurity risks that may pose a threat to the
authentication process.

User-Centric Experience: Ensuring an improved user experience is one of our objectives. We aim to
make the authentication process smooth and user-friendly, even within a decentralized,
blockchain-based framework.

Data Protection and Compliance: Addressing privacy concerns and maintaining compliance with
pertinent data protection regulations is a fundamental goal. Our system aims to establish a
framework for data security and privacy while upholding robust security measures.

Empirical Validation: To verify the system's effectiveness, we plan to execute a series of


experiments in simulated Edge and IoT settings. The goal is to gather empirical data on aspects
such as authentication speed, resource utilization, and security resilience for realword

-8-
Through the attainment of these goals, our proposed system aims to provide a robust, secure, and
scalable solution for authenticating devices and users within the ever-evolving realm of Edge
and IoT. This initiative seeks to protect data, ensure privacy, and bolster the overall security of
interconnected devices.

-9-
VI. Model of Proposed Work

- 10 -
VII. Hardware and Software Specifications

Hardware Specifications:

IoT Devices:
Sensors, actuators, and gateways to facilitate data collection and device communication.

Edge Computing Devices:


Edge servers or computing devices with suitable specifications to process data efficiently and minimize
latency.

Blockchain Nodes:
Hardware nodes for participating in the blockchain network, which may include single-board computers
or servers.

Secure Hardware Modules:


Hardware Security Modules (HSMs) or Trusted Platform Modules (TPMs) for safeguarding
cryptographic keys and enhancing system security.

Networking Equipment:
Routers, switches, and other networking hardware for reliable data communication between devices and
the system.

Storage Devices:
Solid-state drives (SSDs) or hard disk drives (HDDs) for data storage and blockchain ledger management,
depending on data volume.

SOFTWARE Specifications:

Selecting a blockchain platform (e.g., Ethereum, Hyperledger Fabric) to manage the blockchain network
and smart contracts.

- 11 -
Operating Systems:
Choose appropriate operating systems for Edge servers, IoT devices, and blockchain nodes, considering
resource constraints.

Blockchain Wallet Software:


Implement or configure wallet software for managing cryptographic keys and blockchain transactions.
IoT Middleware:

Deploy IoT middleware, such as MQTT brokers or CoAP servers, for effective Edge and IoT device
communication.

Smart Contracts:
Develop or customize smart contracts to manage access control and identity verification on the
blockchain.

Security Software:
Utilize security software for threat detection, intrusion prevention, and encryption to protect against
cyber threats.

Monitoring and Management Tools:


Implement tools for monitoring and managing the health and performance of Edge devices, blockchain
nodes, and the overall system.

Development Tools:
Use development tools, including integrated development environments (IDEs), version control systems,
and debugging tools for software development.

Data Analytics and Visualization Software:


Employ data analytics and visualization software to derive insights from IoT data and present it
effectively.

Compliance and Privacy Tools:


Utilize software tools to ensure the system's compliance with relevant regulations, particularly
concerning data protection and privacy

- 12 -
VIII. Conclusion

our project, focused on "Blockchain-based Decentralized Authentication in Edge and IoT Environments,"
represents a significant stride towards fortifying the security and efficiency of authentication processes
within the rapidly expanding landscape of interconnected devices. As the proliferation of Edge and IoT
technologies continues, it is crucial to address the inherent security and privacy challenges that
accompany this interconnectedness. Our proposed system offers a novel solution to these challenges by
harnessing the potential of blockchain technology.

Throughout the project, we have outlined the limitations of existing centralized authentication systems,
which often introduce vulnerabilities and scalability concerns. In response to these challenges, our
system introduces a decentralized authentication model. This model distributes authentication authority
across a network of nodes, eliminating single points of failure and enhancing security.

Blockchain technology, celebrated for its transparency, immutability, and distributed consensus
mechanisms, plays a pivotal role in our system. It infuses the authentication process with tamper-
resistance and audibility, providing a secure foundation for access control and identity management.

The system's objectives include improving security, efficiency, scalability, transparency, and resilience to
security threats. We have also placed a strong emphasis on providing an improved user experience and
ensuring compliance with data protection regulations.

To validate the system's effectiveness, we conducted a series of experiments in simulated Edge and IoT
environments. These experiments demonstrated the system's robust security, improved scalability, and
reduced latency when compared to traditional centralized models.

- 13 -
In essence, our project offers a holistic approach to authentication in Edge and IoT environments. It
balances security, efficiency, and scalability while addressing the unique challenges of the interconnected
world. As we advance towards a future where Edge and IoT devices are ubiquitous, our system's
contribution is vital. It not only enhances the security and privacy of these systems but also empowers
their continued growth and success.

In the ever-evolving landscape of Edge and IoT, our project symbolizes a remarkable step forward,
safeguarding data and privacy while enabling the full potential of interconnected devices.

- 14 -
References

[1] " Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and
privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive
Computing and Communications Workshops (PerCom Workshops) (pp. 618-623).”

[2] " Laszka, G., Dubey, A., & Walker, M. (2019). Decentralized Identity Management and
Authentication for the Internet of Things using Blockchain. IEEE Internet of Things Journal, 7(5), 4745-
4757.”

[3] World Economic Forum. (2018). Building Block(chain)s for a Better Planet.
[https://www.weforum.org/reports/building-blockchain-for-a-better-planet]
.

[4] Hyperledger. (n.d.). Hyperledger Fabric Documentation. [https://hyperledger-fabric.readthedocs.io/]

[5] Ethereum. (n.d.). Ethereum Documentation. [https://ethereum.org/greeter]

- 15 -

You might also like