Rancang Bangun Identity and Access Management IoT Berbasis KSI dan Permissioned Blockchain

Guntur Dharma Putra, Sujoko Sumaryono, Widyawan Widyawan


Blockchain offers several technological breakthroughs, ranging from monetary solutions to healthcare systems. Some approaches have proposed blockchain implementation in IoT for providing better performance and scalability. However, massive scale implementation of IoT devices suffers from several issues in identity and access managements of interconnected devices. The present study proposes the combination of permissioned blockchain and Keyless Signature Infrastructure (KSI) as a means of governing the identity and access management of IoT devices. KSI is known for its ability to offer digital signature services without the need of public or private key but hash trees updated in a regular basis. With the decentralization fashion of blockchain, KSI can be implemented more efficiently. The results may give an identity and access management with high scalability.


manajemen identitas dan akses, permissioned blockchain, Internet of Things, Keyless Signature Infrastructure, keamanan data dan jaringan

Full Text:



S. Nakamoto, (2008) “Bitcoin: a peer-to-peer electronic cash system,” [Online], http//www.bitcoin.org/bitcoin.pdf, tanggal akses: 13 Agt. 2018.

G. Brambilla, “Peer-to-Peer Location-Based Services based on Blockchain and Web Technologies,” Disertasi, Università degli Studi di Parma, Parma, Italia, Des. 2017.

S. Wilkinson dan J. Lowry, “MetaDisk: Blockchain-Based Decentralized File Storage Application,” Storj Labs Inc., Technical Report, hal. 1–11, 2014.

S. Ibba, A. Pinna, M. Seu, dan F.E. Pani, “CitySense,” Proc. XP2017 Sci. Work. - XP ’17, 2017, hal. 1–5.

X. Yue, H. Wang, D. Jin, M. Li, dan W. Jiang, “Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control,” J. Med. Syst., Vol. 40, No. 10, hal. 1–8, Oct. 2016.

A. Dorri, S.S. Kanhere, R. Jurdak, dan P. Gauravaram, “Blockchain for IoT Security and Privacy: The Case Study of a Smart Home,” 2017 IEEE Int. Conf. Pervasive Comput. Commun. Work. (PerCom Work, 2017, hal. 618–623.

A. Dorri, S.S. Kanhere, dan R. Jurdak, “Towards an Optimized BlockChain for IoT,” Proc. Second Int. Conf. Internet-of-Things Des. Implement. - IoTDI ’17, 2017, hal. 173–178.

H. Shafagh, L. Burkhalter, A. Hithnawi, dan S. Duquennoy, “Towards Blockchain-based Auditable Storage and Sharing of IoT Data,” Proc. of the 2017 on Cloud Computing Security Workshop, 2017, hal. 45–50.

M. A. Khan dan K. Salah, “IoT Security: Review, Blockchain Solutions, and Open Challenges,” Futur. Gener. Comput. Syst., Vol. 82, hal. 395–411, 2018.

J. Bernal Bernabe, J.L. Hernandez-Ramos, and A.F. Skarmeta Gomez, “Holistic Privacy-Preserving Identity Management System for the Internet of Things,” Mob. Inf. Syst., Vol. 2017, hal. 1–20, 2017.

O. Novo, “Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT,” IEEE Internet Things J., Vol. 5, No. 2, hal. 1184–1195, 2018.

M. Jakobsoson dan A. Juels, “Process of Work and Bread Pudding Protocols (Extended Abstract),” Proc. IFIP TC6/TC11 Jt. Work. Conf. Secur. Inf. Net- Work. Commun. Multimed. Secur., 1999, hal. 258–272.

F. Dai, Y. Shi, N. Meng, L. Wei, dan Z. Ye, “From Bitcoin to Cybersecurity: A Comparative Study of Blockchain Application and Security Issues,” 2017 4th Int. Conf. Syst. Informatics, ICSAI 2017, 2018, hal. 975–979.

J.H. Lee, “BIDaaS: Blockchain Based ID As a Service,” IEEE Access, Vol. 6, hal. 2274–2278, 2017.

A. Buldas, A. Kroonmaa, dan R. Laanoja, “Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees,” Secure IT Systems, 2013, pp. 313–320.

N. Emmadi dan H. Narumanchi, “Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures’ Infrastructure,” Proc. of the 18th International Conference on Distributed Computing and Networking - ICDCN ’17, 2017, hal. 1–6.

A. Khalimonenko, J. Strohschneider, dan O. Kupreev, (2017 ) “DDoS Attacks in Q4 2016,” [Online] https://securelist.com/ddos-attacks-inq4-2016/77412/, tanggal akses: 13 Agt. 2018.

Z. Shelby, K. Hartke, dan C. Bormann, “The Constrained Application Protocol (CoAP),” Internet Engineering Task Force, Jun. 2014.

DOI: http://dx.doi.org/10.22146/jnteti.v7i4.455


  • There are currently no refbacks.

Copyright (c) 2018 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)

JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi)

Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
+62 274 552305