IOTA-Based Authentication for IoT Devices in Satellite Networks
Autor:
Bernal, David
; Ledesma, Oscar
; Lamo, Paula
; Bermejo-Higuera, Javier
Fecha:
2025Palabra clave:
Revista / editorial:
Tech Science PressCitación:
D. Bernal, O. Ledesma, P. Lamo and J. Bermejo, "IOTA-Based Authentication for IoT Devices in Satellite Networks," Computers, Materials & Continua, vol. 79, no. 3, pp. 3697–3728, Oct. 2025. DOI: 10.32604/cmc.2025.069746Tipo de Ítem:
Articulo Revista IndexadaDirección web:
https://www.techscience.com/cmc/online/detail/24724
Resumen:
This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices, and is experimentally validated on the Shimmer Testnet. Three metrics are defined and measured: resolution time, deactivation time, and reactivation time. To improve robustness, an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation. The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility. Unlike blockchain-based approaches, which typically suffer from high confirmation delays and scalability constraints, the proposed DAG architecture provides fast, cost-free operations suitable for resource-constrained IoT devices. The results show that authentication can be efficiently performed within satellite connectivity windows, positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
| Año |
| 2012 |
| 2013 |
| 2014 |
| 2015 |
| 2016 |
| 2017 |
| 2018 |
| 2019 |
| 2020 |
| 2021 |
| 2022 |
| 2023 |
| 2024 |
| 2025 |
| 2026 |
| Vistas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 54 |
| 19 |
| Descargas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 60 |
| 38 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
MMALE a methodology for malware analysis in linux environments
de Vicente Mohino, José Javier ; Bermejo-Higuera, Javier; Bermejo Higuera, Juan Ramón; Sicilia, Juan Antonio ; Sánchez Rubio, Manuel ; Martínez Herraiz, José-Javier (Computers, materials and continua, 2021)In a computer environment, an operating systemis prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have becomemore qualified compared to a fewyears ... -
Prevention and fighting against web attacks through anomaly detection technology. A systematic review
Sureda Riera, Tomás; Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Martínez Herraiz, José-Javier; Sicilia, Juan Antonio (Sustainability (Switzerland), 01/06/2020)Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established ... -
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities
Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Sicilia, Juan Antonio ; Cubo Villalba, Javier ; Nombela Pérez, Juan José (CMC-Computers Materials & Continua, 2020)To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities ...





