Multi-layer Attestation for Internet of Things using Blockchain
Vytarani Mathane1, P V Lakshmi2

1Vytarani Mathane*, research scholar, GITAM (Deemed to be University).
2P V Lakshmi, professor, GITAM (Deemed to be University).

Manuscript received on February 01, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 995-1000 | Volume-9 Issue-3, February, 2020. | Retrieval Number: C4719029320/2020©BEIESP | DOI: 10.35940/ijeat.C4719.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Internet of Things (IOT) by its nature comprises of heterogeneous devices with varying degree of resources and capabilities with common attributes that those are connected and uniquely identifiable over the network. Given the always on always connected nature of IoT devices along with virtually limitless applications, the attack surface of constituent IoT device is very large. Hence ability to attest IoT devices for its trustworthiness is very important factor in determining trustworthiness of IoT network. In past significant amount of research has focused on possible attestation mechanisms for IoT but all those proposals invariably depend on specific hardware implementation like TrustZone, SGX, TPM, RTC, memory with OTP etc. Sine all such security primitives are either architecture or manufacturer specific it is not possible to build common unified attestation scheme for all constituent IoT devices in a typical IoT network using any of those primitives. This research work proposes different pragmatic approach to define such common and scalable attestation scheme that all IoT devices within IoT network could deploy. The proposed scheme makes use of memory management which is one of most basic features of any processor or controller to build common and scalable attestation mechanism for all types of IoT devices. The approach is to understand threat model and then develop mitigations in pragmatic manner.
Keywords: IOT, attestation, security, distributed ledger, heterogeneous devices, network integrity, device integrity, data integrity, factory automation, low power devices, low resource devices.