The Application of Private Blockchain to Increase Security in IoT
Subject Areas : International Journal of Industrial Mathematicsرضوان محمودیه 1 , سعید پارسا 2 , امیر مسعود رحمانی 3
1 - Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.
2 - Department of Computer Engineering, Iran University of Science and Technology, Tehran, Iran.
3 - Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
Keywords: Blockchain, Internet of Things, Security, Block Manager, Scalability, Overlay Network,
Abstract :
BlockChain (BC) has gotten a lot of interest because of its immutability and accompanying security and privacy benefits. BC has the potential to address the Internet of Things' security and privacy issues (IoT). BC, on the other hand, is computationally expensive, has limited scalability, and incurs significant bandwidth overheads and delays, making it unsuitable for use in the IoT. In this study, we propose a method that optimizes BC for use in IOT environment. we present a hierarchical structure that uses a private BC to increase scalability, reduce network overhead and delay. In the proposed method, devices with high-level resources build a network referred to as the overlay network on devices with low-level resources. The members of the overlay network manage the BC. The arrangement of the block managers at the overlay network level is two-dimensional which removes the focus from IOT management. We use trust technique and voting from direct neighbors to reduce network traffic and overhead costs. The use of factors such as trust, encouragement and penalty of block managers in the overlay network ensures accurate transactions in IOT. We use the new block manager authentication algorithm for authentication in the overlay network. The simulation results show that the proposed algorithm reduces packet overhead and delay in service delivery and increases the scalability of the BC in comparison to the system that uses the base BC. Furthermore, because in the proposed algorithm, the number of effective block managers in voting is limited to direct neighbors, the average time to confirm a block is significantly reduced.
[1] A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,Security and Privacy (SP), 2016 IEEE Symposium on. IEEE 14 (2016) 839-858
[2] A. Dorri, S. Kanhere, R. Jurdak, P. Gauravaram, LSB: A lightweight scalable BC for IoT security and privacy, ArXiv preprint arXiv: 1712.02969, 2017.
[3] H. F. Atlam, R. J. Walters, G. B. Wills, Internet of nano things: security issues and applications, 2nd International Conference on Cloud and Big Data Computing 23 (2018) 7177.
[4] L. Atzori, A. Iera, G. Morabito, The internet of things: A survey, Comput. Netw. 54 (2010) 2787-2805.
[5] D. Giusto, A. Iera, G. Morabito, L. Atzori, The Internet of Things, 20th Tyrrhenian Workshop on Digital Communications, Springer Publishing Company, Incorporated, 2014.
[6] Z. Shelby, K. Hartke, C. Bormann, The Constrained ApplicationProtocol (CoAP), RFC 7252 (Proposed Standard), RFC Editor,Fremont, CA, USA, (2014) 1-112.
[7] X. Sun, N. Ansari, Edge IoT: Mobile Edge Computing for theInternet of Things, IEEE Communications Magazine 54 (2016) 22-29.
[8] C. Wu, Connected vehicles and Internet of Things, 2nd International Conference on Telecommunication and Networks (TELNET) (2017) 1-1.
[9] K. Pearsall, Manufacturing supply chain challenges - globalization andIOT, 6th Electronic System-Integration Technology Conference(ESTC) (2016) 1-5.
[10] O. Novo, Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT, IEEE Internet of Things Journal 5 (2018) 1184-1195.
[11] Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, S. Shieh, Iot security: ongoing challenges and research opportunities, Service-Oriented Computing and Applications, IEEE 7th International Conference on. IEEE (2014) 230-234
[12] G. Brambilla, M. Amoretti, F. Zanichelli, Using Block Chain for Peer-to-Peer Proof-ofLocation, ArXiv preprint arXiv: 1607.00174 (2016).
[13] G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 2014,
[14] Inspiring, http://www.inspiring.co.uk/, accessed on Sep 20, 2017.
[15] DE. Kouicem, A. Bouabdallah, H. Lakhlef, Internet of things security: A topdown survey, Computer Networks 4 (2018) 199-221. http://dx.doi.org/10.1016/j. comnet.2018.03.012/.
[16] A. Gaur, B. Scotney, G. Parr, S. McClean, Smart city architecture and its applications based on IoT, Procedia Computer Science 52 (2015) 1089-1094
[17] M. Hassanalieragh, A. Page, T. Soyata, G. Sharma, M. Aktas, G. Mateos, B. Kantarci, S. Andreescu, Health monitoring
and management using Internet-of-Things (IoT) sensing with cloud-based processing: Opportunities and challenges, Services Computing (SCC), 2015 IEEE International Conference on. IEEE 285292.
[18] S, Nakamoto, Bitcoin: A peer-to-peer electronic cash system (2008).
[19] G. Brambilla, M. Amorei, F. Zanichelli, Using Block Chain for Peer-to-Peer Proof-ofLocation, ArXiv preprint arXiv: 1607.00174 (2016).
[20] Sh. Wilkinson, J. Lowry, T. Boshevski, Metadisk a blockchain based decentralized file storage application, Technical Report. Technical Report http://metadisk. org/metadisk.pdf/
[21] X. Yue, H. Wang, D. Jin, M. Li, W. Jiang, Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control, Journal of medical systems 40 (2016) 218-231.
[22] A. Abdullahi, I. Brown, F. El-Moussa, Privacy in the age of mobility and smart devices in smart homes, In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 819-826.
[23] V. Sivaraman, H. Habibi Gharakheili, A. Vishwanath, R. Boreli, O. Mehani, Networklevel security and privacy control for smart home IoT devices, In Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 11th International Conference on. IEEE (2015) 163-167
[24] SH. Hashemi, F. Faghri, P. Rausch, RH. Campbell, World of empowered IoT users, In 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI) 4 (2016) 13-24, IEEE. http://dx.doi.org/10.1109/IoTDI.2015.39/
[25] L. Chen, L. Xu, N. Shah, Z. Gao, Y. Lu, W. Shi, On security analysis of proof-of-elapsedtime (poet), InInternational Symposium on Stabilization, Safety, and Security of Distributed Systems (2017) 282-297). Springer, Cham.
[26] A. Chakravorty, T. Wlodarczyk, C. Rong, Privacy preserving data analytics for smart homes, IEEE Security and Privacy Workshops (2013) 23-27. http://dx.doi.org/ 10.1109/SPW.2013.22/
[27] S. Huh, S. Cho, S. Kim, Managing IoT devices using blockchain platform, 19th international conference on advanced communication technology (ICACT) (2017) 464-467, http://dx.doi.org/10.23919/ ICACT.2017.7890132/
[28] B. Lee, JH. Lee, Blockchain-based secure firmware update for embedded devices in an Internet of Things environment, The Journal of Supercomputing 73 (2017) 1152-1167.
[29] SH. Hashemi, F. Faghri, P. Rausch, RH. Campbell, World of empowered IoT users, IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI) (2016) 13-24, http://dx.doi.org/10.1109/IoTDI.2015.39/
[30] O. Alphand, M. Amoretti, T. Claeys, S. Dall’Asta, A. Duda, G. Ferrari, F. Rousseau, B. Tourancheau, L. Veltri, F. Zanichelli, IoT Chain: A blockchain security architecture for the Internet of Things, IEEE wireless communications and networking conference (WCNC) (2018) 1-6), http://dx.doi.org/10.1109/WCNC.2018.8377385/
[31] AR. Chowdhury, T. Chatterjee, S. DasBi, LOCHA: a light-weight one-way cryptographic hash algorithm for wireless sensor network, Procedia Computer Science (2014) 497-504, http://dx.doi.org/10.1016/j.procs.2014.05.453/
[32] A. Huszti, A homomorphic encryption-based secure electronic voting scheme, Publ. Math. Debrecen (2011) 479-496.
[33] C. Cooja, http://anrg.usc.edu/contiki/ index.php/CoojaSimulator/.
[34] Omnet++, https://omnetpp.org//, [Online; accessed July-2019].