2021
DOI: 10.3390/s21093119
|View full text |Cite
|
Sign up to set email alerts
|

Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs

Abstract: Non-fungible tokens (NFTs) are widely used in blockchain to represent unique and non-interchangeable assets. Current NFTs allow representing assets by a unique identifier, as a possession of an owner. The novelty introduced in this paper is the proposal of smart NFTs to represent IoT devices, which are physical smart assets. Hence, they are also identified as the utility of a user, they have a blockchain account (BCA) address to participate actively in the blockchain transactions, they can establish secure com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0
4

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(28 citation statements)
references
References 27 publications
0
23
0
4
Order By: Relevance
“…HSM can save the keys from X.509 standard and SAS token, which may be used for two attestation mechanisms supported by the provisioning service. The keys can be stored in software, but it is more vulnerable than an HSM [ 72 ].…”
Section: Iot-enabled Smart Device Authentication Architectures In Sma...mentioning
confidence: 99%
See 1 more Smart Citation
“…HSM can save the keys from X.509 standard and SAS token, which may be used for two attestation mechanisms supported by the provisioning service. The keys can be stored in software, but it is more vulnerable than an HSM [ 72 ].…”
Section: Iot-enabled Smart Device Authentication Architectures In Sma...mentioning
confidence: 99%
“…Recently a Blockchain-enabled solution has been proposed that utilizes Blockchain tokenization for asset identification by binding the tokens to the physical properties of the chip. The authors integrate Non-Fungible Tokens (NFTs) in [ 72 ] to represent assets by a unique identifier as a possession of an owner. The authors proposed a smart NFT that is physically bound to its IoT device.…”
Section: Authentication Schemes Based On Distributed Architectures In...mentioning
confidence: 99%
“…In the scope of this paper, we focus on the protocol proposed by Islam et al [2]. However, a similar problem seems to be present in other approaches, such as [3], because they work on the same principles. Figure 1 represents a simplified version of the protocol as a sequence diagram.…”
Section: Contextmentioning
confidence: 99%
“…In the scope of this paper, we focus on the protocol proposed by Islam et al [2]. However, a similar problem seems to be present in other approaches, such as [3], because they work on the same principles. Figure 1 • Alice is the SoC manufacturer.…”
Section: Contextmentioning
confidence: 99%
“…The literature on approaches that offer these possibilities is, according to the authors' knowledge, still thin [1]. The proposed approaches use Blockchain technology to obtain security guarantees [2], [3]. Blockchain is a technology originally designed to offer a decentralized currency system capable to work without trusted third parties [4].…”
Section: Introductionmentioning
confidence: 99%