[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/3432601.3432610dlproceedingsArticle/Chapter ViewAbstractPublication PagescasconConference Proceedingsconference-collections
research-article

Blockchain-based security for heterogeneous IoT systems

Published: 10 November 2020 Publication History

Abstract

The Internet of Things (IoT) is being deployed in industry, public services, and even homes. These devices are making information more available and allow for greater automation and efficiencies. With the rapid growth this industry is experiencing, the security of IoT devices has not been given the attention it needs. Many of these devices leave sensitive information exposed or may allow for malicious actors to take control of them. The Internet of Things uses a vast range of hardware which has led to many different approaches to security. Administering a network with such variability makes it easy for insecure configurations to be overlooked.
This paper proposes the use of blockchain technology as the backbone to a security framework to unify IoT devices of varying resource constraints under one system. Ethereum is used to create a secure system that is Denial of Service resistant, store encryption keys, store encrypted data, and manage trust of devices. Using the Proof-of-Authority consensus method instead of the more common Proof-of-Work, allows for more efficient use of resources. This system features mechanisms to include the use of LoRa LPWAN technology, which is often used in IoT. Tests were run on a small network of devices while recording processor utilization. Latencies were also measured, showing that devices with fewer resources showed significant latencies, and suggestions as to how these latencies can be reduced are proposed.

References

[1]
D. R. Aleko and S. Djahel. 2019. An IoT Enabled Traffic Light Controllers Synchronization Method for Road Traffic Congestion Mitigation. In 2019 International Smart Cities Conference (ISC2). IEEE, Casablanca, Morocco, 709--715.
[2]
Pelin Angin, Melih Burak Mert, Okan Mete, Azer Ramazanli, Kaan Sarica, and Bora Gungoren. 2018. A blockchain-based decentralized security architecture for IoT. In International Conference on Internet of Things. Springer, Seattle, WA, 3--18.
[3]
A.M. Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O'Reilly Media, Sebastapol, CA.
[4]
A. Augustin, J. Yi, T. Clausen, and W.Wm. Townsley. 2016. A Study of LoRa: Long Range & Low Power Networks for the Internet of Things. Sensors 16, 9 (2016), 1--18. Article 1466.
[5]
J. P. Aumasson, S. Fischer, S. Khazaei, W. Meier, and C. Rechberger. 2008. New features of Latin dances: Analysis of Salsa, ChaCha, and Rumba. In Fast Software Encryption, Vol. 5086 LNCS. Springer, Lausanne, Switzerland, 470--488.
[6]
Daniel J. Bernstein. 2004. Cache-timing attacks on AES.
[7]
Daniel J. Bernstein. 2008. ChaCha, a variant of Salsa20. https://cr.yp.to/chacha/chacha-20080128.pdf
[8]
Daniel J. Bernstein. 2008. Extending the Salsa20 nonce. https://cr.yp.to/snuffle/xsalsa-20110204.pdf
[9]
Daniel J. Bernstein. 2008. The Salsa20 Family of Stream Ciphers. Springer Berlin Heidelberg, Berlin, Heidelberg, 84--97.
[10]
K. Biswas and V. Muthukkumarasamy. 2016. Securing Smart Cities Using Blockchain Technology. In 2016 18th International Conference on High Performance Computing and Communications; 14th International Conference on Smart City; 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, Sydney, Australia, 1392--1393.
[11]
Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform. (2014), 36 pages. White Paper.
[12]
Cisco Systems Inc. 2020. Cisco Annual Internet Report (2018-2023) White Paper. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
[13]
Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. 2018. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain. In Italian Conference on Cyber Security. CINI, Milan, Italy, 1--11.
[14]
A. Dorri, S. S. Kanhere, and R. Jurdak. 2017. Towards an Optimized BlockChain for IoT. In 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE/ACM, Pittsburgh, PA, 173--178.
[15]
Cynthia Dwork and Moni Naor. 1993. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology --- CRYPTO' 92. Springer Berlin Heidelberg, Berlin, Heidelberg, 139--147.
[16]
Seth Gilbert and Nancy Lynch. 2002. Brewer's Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services. SIGACT News 33, 2 (June 2002), 51--59.
[17]
J. Hoffstein, J. Pipher, and J.H. Silverman. 2014. An Introduction to Mathematical Cryptography. Springer New York, New York, NY.
[18]
Sunghyuck Hong. 2017. Secure and light IoT protocol (SLIP) for anti-hacking. Journal of Computer Virology and Hacking Techniques 13, 4 (01 Nov. 2017), 241--247.
[19]
Seyoung Huh, Sangrae Cho, and Soohyung Kim. 2017. Managing IoT devices using blockchain platform. In 2017 19th International Conference on Advanced Communication Technology (ICACT). IEEE, Phoenix Park, PyeongChang, South Korea, 464--467.
[20]
K. Lauter. 2004. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11, 1 (2004), 62--67.
[21]
Jun Lin, Zhiqi Shen, and Chunyan Miao. 2017. Using Blockchain Technology to Build Trust in Sharing LoRaWAN IoT. In Proceedings of the 2nd International Conference on Crowd Science and Engineering. Association for Computing Machinery, Beijing, China, 38--43.
[22]
Kerry Maletsky. 2015. RSA vs ECC comparison for embedded systems. (2015), 4 pages.
[23]
Daniel Minoli and Benedict Occhiogrosso. 2018. Blockchain mechanisms for IoT security. Internet of Things 1--2 (2018), 1--13.
[24]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System.
[25]
National Institute of Standards and Technology. 2001. FIPS PUB 197: Announcing the ADVANCED ENCRYPTION STANDARD (AES). National Institute of Standards and Technology, Gaithersburg, MD.
[26]
K. R. Özyilmaz and A. Yurdakul. 2019. Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks. IEEE Consumer Electronics Magazine 8, 2 (March 2019), 28--34.
[27]
Phillip Sparks. 2017. White Paper: The route to a trillion devices. https://community.arm.com/iot/b/internet-of-things/posts/white-paper-the-route-to-a-trillion-devices
[28]
US Food and Drug Administration. 2017. Cybersecurity vulnerabilities identified in St. Jude Medical's implantable cardiac devices and Merlin@ home transmitter: FDA safety communication. https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm535843.htm
[29]
Vivek Vishnumurthy, Sangeeth Chandrakumar, and Emin Gun Sirer. 2003. Karma: A secure economic framework for peer-to-peer resource sharing. In Workshop on Economics of Peer-to-peer Systems. Berkeley School of Information, Berkeley, CA, 1--6.
[30]
S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F. Wang. 2019. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems 49, 11 (2019), 2266--2277.
[31]
Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. (Oct. 2014), 32 pages. https://ethereum.github.io/yellowpaper/paper.pdf.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image DL Hosted proceedings
CASCON '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering
November 2020
297 pages

Sponsors

  • IBM Centre for Advanced Studies (CAS)
  • IBM Canada: IBM Canada

Publisher

IBM Corp.

United States

Publication History

Published: 10 November 2020

Qualifiers

  • Research-article

Acceptance Rates

Overall Acceptance Rate 24 of 90 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 94
    Total Downloads
  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media