The Application of Private Blockchain to Increase Security in IoT
محورهای موضوعی : مجله بین المللی ریاضیات صنعتیR. Mahmoudie 1 , S. Parsa 2 , A. M. Rahmani 3
1 - Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.
2 - Department of Computer Engineering, Iran University of Science and Technology, Tehran, Iran.
3 - Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
کلید واژه: Blockchain, Internet of Things, Security, Block Manager, Scalability, Overlay Network,
چکیده مقاله :
BlockChain (BC) has gotten a lot of interest because of its immutability and accompanying security and privacy benefits. BC has the potential to address the Internet of Things' security and privacy issues (IoT). BC, on the other hand, is computationally expensive, has limited scalability, and incurs significant bandwidth overheads and delays, making it unsuitable for use in the IoT. In this study, we propose a method that optimizes BC for use in IOT environment. we present a hierarchical structure that uses a private BC to increase scalability, reduce network overhead and delay. In the proposed method, devices with high-level resources build a network referred to as the overlay network on devices with low-level resources. The members of the overlay network manage the BC. The arrangement of the block managers at the overlay network level is two-dimensional which removes the focus from IOT management. We use trust technique and voting from direct neighbors to reduce network traffic and overhead costs. The use of factors such as trust, encouragement and penalty of block managers in the overlay network ensures accurate transactions in IOT. We use the new block manager authentication algorithm for authentication in the overlay network. The simulation results show that the proposed algorithm reduces packet overhead and delay in service delivery and increases the scalability of the BC in comparison to the system that uses the base BC. Furthermore, because in the proposed algorithm, the number of effective block managers in voting is limited to direct neighbors, the average time to confirm a block is significantly reduced.
بلاک چین (BC) به دلیل تغییر ناپذیری و مزایای امنیتی و حفظ حریم خصوصی مورد توجه زیادی قرار گرفته است. BC پتانسیل رسیدگی به مسائل امنیتی و حریم خصوصی اینترنت اشیا (IoT) را دارد. از سوی دیگر، BC از نظر محاسباتی گران است، مقیاس پذیری محدودی دارد و هزینه های سربار و تاخیرهای پهنای باند قابل توجهی را متحمل می شود که آن را برای استفاده در اینترنت اشیا نامناسب می کند. در این مطالعه، ما روشی را پیشنهاد می کنیم که BC را برای استفاده در محیط IOT بهینه می کند. ما یک ساختار سلسله مراتبی ارائه می کنیم که از یک BC خصوصی برای افزایش مقیاس پذیری، کاهش سربار شبکه و تاخیر استفاده می کند. در روش پیشنهادی، دستگاههایی با منابع سطح بالا، شبکهای به نام شبکه همپوشانی بر روی دستگاههایی با منابع سطح پایین ایجاد میکنند. اعضای شبکه همپوشانی BC را مدیریت می کنند. چیدمان مدیران بلوک در سطح شبکه همپوشانی دو بعدی است که تمرکز را از مدیریت IOT حذف می کند. ما از تکنیک اعتماد و رای گیری از همسایگان مستقیم برای کاهش ترافیک شبکه و هزینه های سربار استفاده می کنیم. استفاده از عواملی مانند اعتماد، تشویق و جریمه مدیران بلاک در شبکه همپوشانی، تراکنش های دقیق در IOT را تضمین می کند. ما از الگوریتم جدید احراز هویت مدیر بلوک برای احراز هویت در شبکه همپوشانی استفاده می کنیم. نتایج شبیهسازی نشان میدهد که الگوریتم پیشنهادی سربار بسته و تاخیر در ارائه خدمات را کاهش میدهد و مقیاسپذیری BC را در مقایسه با سیستمی که از پایه BC استفاده میکند، افزایش میدهد. علاوه بر این، از آنجا که در الگوریتم پیشنهادی، تعداد مدیران بلوک موثر در رایگیری به همسایگان مستقیم محدود میشود، میانگین زمان تایید یک بلوک به میزان قابل توجهی کاهش مییابد.
[1] A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,Security and Privacy (SP), 2016 IEEE Symposium on. IEEE 14 (2016) 839-858
[2] A. Dorri, S. Kanhere, R. Jurdak, P. Gauravaram, LSB: A lightweight scalable BC for IoT security and privacy, ArXiv preprint arXiv: 1712.02969, 2017.
[3] H. F. Atlam, R. J. Walters, G. B. Wills, Internet of nano things: security issues and applications, 2nd International Conference on Cloud and Big Data Computing 23 (2018) 7177.
[4] L. Atzori, A. Iera, G. Morabito, The internet of things: A survey, Comput. Netw. 54 (2010) 2787-2805.
[5] D. Giusto, A. Iera, G. Morabito, L. Atzori, The Internet of Things, 20th Tyrrhenian Workshop on Digital Communications, Springer Publishing Company, Incorporated, 2014.
[6] Z. Shelby, K. Hartke, C. Bormann, The Constrained ApplicationProtocol (CoAP), RFC 7252 (Proposed Standard), RFC Editor,Fremont, CA, USA, (2014) 1-112.
[7] X. Sun, N. Ansari, Edge IoT: Mobile Edge Computing for theInternet of Things, IEEE Communications Magazine 54 (2016) 22-29.
[8] C. Wu, Connected vehicles and Internet of Things, 2nd International Conference on Telecommunication and Networks (TELNET) (2017) 1-1.
[9] K. Pearsall, Manufacturing supply chain challenges - globalization andIOT, 6th Electronic System-Integration Technology Conference(ESTC) (2016) 1-5.
[10] O. Novo, Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT, IEEE Internet of Things Journal 5 (2018) 1184-1195.
[11] Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, S. Shieh, Iot security: ongoing challenges and research opportunities, Service-Oriented Computing and Applications, IEEE 7th International Conference on. IEEE (2014) 230-234
[12] G. Brambilla, M. Amoretti, F. Zanichelli, Using Block Chain for Peer-to-Peer Proof-ofLocation, ArXiv preprint arXiv: 1607.00174 (2016).
[13] G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 2014,
[14] Inspiring, http://www.inspiring.co.uk/, accessed on Sep 20, 2017.
[15] DE. Kouicem, A. Bouabdallah, H. Lakhlef, Internet of things security: A topdown survey, Computer Networks 4 (2018) 199-221. http://dx.doi.org/10.1016/j. comnet.2018.03.012/.
[16] A. Gaur, B. Scotney, G. Parr, S. McClean, Smart city architecture and its applications based on IoT, Procedia Computer Science 52 (2015) 1089-1094
[17] M. Hassanalieragh, A. Page, T. Soyata, G. Sharma, M. Aktas, G. Mateos, B. Kantarci, S. Andreescu, Health monitoring
and management using Internet-of-Things (IoT) sensing with cloud-based processing: Opportunities and challenges, Services Computing (SCC), 2015 IEEE International Conference on. IEEE 285292.
[18] S, Nakamoto, Bitcoin: A peer-to-peer electronic cash system (2008).
[19] G. Brambilla, M. Amorei, F. Zanichelli, Using Block Chain for Peer-to-Peer Proof-ofLocation, ArXiv preprint arXiv: 1607.00174 (2016).
[20] Sh. Wilkinson, J. Lowry, T. Boshevski, Metadisk a blockchain based decentralized file storage application, Technical Report. Technical Report http://metadisk. org/metadisk.pdf/
[21] X. Yue, H. Wang, D. Jin, M. Li, W. Jiang, Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control, Journal of medical systems 40 (2016) 218-231.
[22] A. Abdullahi, I. Brown, F. El-Moussa, Privacy in the age of mobility and smart devices in smart homes, In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 819-826.
[23] V. Sivaraman, H. Habibi Gharakheili, A. Vishwanath, R. Boreli, O. Mehani, Networklevel security and privacy control for smart home IoT devices, In Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 11th International Conference on. IEEE (2015) 163-167
[24] SH. Hashemi, F. Faghri, P. Rausch, RH. Campbell, World of empowered IoT users, In 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI) 4 (2016) 13-24, IEEE. http://dx.doi.org/10.1109/IoTDI.2015.39/
[25] L. Chen, L. Xu, N. Shah, Z. Gao, Y. Lu, W. Shi, On security analysis of proof-of-elapsedtime (poet), InInternational Symposium on Stabilization, Safety, and Security of Distributed Systems (2017) 282-297). Springer, Cham.
[26] A. Chakravorty, T. Wlodarczyk, C. Rong, Privacy preserving data analytics for smart homes, IEEE Security and Privacy Workshops (2013) 23-27. http://dx.doi.org/ 10.1109/SPW.2013.22/
[27] S. Huh, S. Cho, S. Kim, Managing IoT devices using blockchain platform, 19th international conference on advanced communication technology (ICACT) (2017) 464-467, http://dx.doi.org/10.23919/ ICACT.2017.7890132/
[28] B. Lee, JH. Lee, Blockchain-based secure firmware update for embedded devices in an Internet of Things environment, The Journal of Supercomputing 73 (2017) 1152-1167.
[29] SH. Hashemi, F. Faghri, P. Rausch, RH. Campbell, World of empowered IoT users, IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI) (2016) 13-24, http://dx.doi.org/10.1109/IoTDI.2015.39/
[30] O. Alphand, M. Amoretti, T. Claeys, S. Dall’Asta, A. Duda, G. Ferrari, F. Rousseau, B. Tourancheau, L. Veltri, F. Zanichelli, IoT Chain: A blockchain security architecture for the Internet of Things, IEEE wireless communications and networking conference (WCNC) (2018) 1-6), http://dx.doi.org/10.1109/WCNC.2018.8377385/
[31] AR. Chowdhury, T. Chatterjee, S. DasBi, LOCHA: a light-weight one-way cryptographic hash algorithm for wireless sensor network, Procedia Computer Science (2014) 497-504, http://dx.doi.org/10.1016/j.procs.2014.05.453/
[32] A. Huszti, A homomorphic encryption-based secure electronic voting scheme, Publ. Math. Debrecen (2011) 479-496.
[33] C. Cooja, http://anrg.usc.edu/contiki/ index.php/CoojaSimulator/.
[34] Omnet++, https://omnetpp.org//, [Online; accessed July-2019].