SECURING NETWORK DEVICES FROM UNAUTHORIZED ACCESS USING BLOCKCHAIN TECHNOLOGY

Authors: Roshan Kumar Chaudhary and Mohit Shrestha
Affiliation: Tribhuvan University

Category:

Keywords: Blockchain, Network Security, Decentralized Authentication, Distributed Ledger Technology, Network Devices, Security Framework, Tamper-Resistant Logging
ABSTRACT. Unauthorized access to network devices presents a critical threat to the security and reliability of modern communication infrastructures. Traditional centralized access control systems often suffer from vulnerabilities such as single points of failure and lack of transparency. This paper introduces a blockchain based decentralized access control framework aimed at securing network devices against unauthorized access. Leveraging smart contracts on a distributed ledger, the proposed system ensures immutable, transparent, and verifiable management of access permissions without dependence on centralized authorities. The architecture details the interaction between users, devices, and blockchain components, alongside the logic for granting, revoking, and auditing access. Analysis of the framework highlights its potential to enhance security, trust, and accountability in network access control. This work lays a foundation for integrating blockchain technology into network security paradigms.

References:

K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016, doi: 10.1109/ACCESS.2016.2566339
IBM Security, Blockchain Identity and Access Management Study. IBM Corp., 2021. [Online]. Available: https://www.ibm.com/security/blockchain
A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” in Proc. IEEE PerCom Workshops, 2017, pp. 618–623, doi: 10.1109/PERCOMW.2017.7917634
Y. Zhang, L. Wang, Y. Wang, and X. Li, “Attribute-based access control for IoT devices using blockchain,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 4891–4900, Jun. 2020, doi: 10.1109/JIOT.2020.2968310
J. Liang, J. Zhao, and J. Chen, “Blockchain-based configuration management for software-defined networks,” IEEE Access, vol. 7, pp. 64480–64491, 2019, doi: 10.1109/ACCESS.2019.2917574
D. D. Maesa, P. Mori, and L. Ricci, “Blockchain based access control: State-of-the-art and future directions,” Journal of Parallel and Distributed Computing, vol. 133, pp. 118–130, 2019, doi: 10.1016/j.jpdc.2019.07.003
Gartner, Emerging Technologies: Blockchain for IT Infrastructure Security, Gartner Research, 2022. [Online]. Available: https://www.gartner.com/en/documents/4002700
M. Ali, J. Nelson, R. Shea, and M. Freedman, “Blockstack: A global naming and storage system secured by blockchains,” in Proc. USENIX ATC, 2016, pp. 181–194
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
S. Bahga and V. Madisetti, “Blockchain platform for industrial Internet of Things,” Journal of Software Practice and Experience, vol. 47, no. 9, pp. 1275–1294, 2016
H. Shafagh, L. Burkhalter, A. Hithnawi, and S. Duquennoy, “Towards blockchain-based auditable storage and sharing of IoT data,” in Proc. ACM Workshop on IoT Privacy, Trust, and Security, 2017, pp. 45–50
R. Sandhu et al., “Role-based access control models,” IEEE Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996
J. L. Hernández-Ramos, A. J. Jara, L. Marín, and A. F. Skarmeta, “Distributed capability-based access control for the Internet of Things,” Journal of Internet Services and Information Security, vol. 3, no. 3/4, pp. 1–16, 2013
G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, 2014. [Online]. Available: https://ethereum.github.io/yellowpaper/paper.pdf
X. Xu et al., “A taxonomy of blockchain-based systems for architecture design,” IEEE Int. Conf. on Software Architecture (ICSA), 2017, pp. 243–252