Blockchain-Based Community Safety Security System with IoT Secure Devices
Abstract
:1. Introduction
1.1. Background
1.2. Related Works
2. Preliminary
2.1. Internet of Things (IoT) Devices
- Human intruder detection: detect humans by analyzing ground vibrations [39].
2.2. Blockchain-Based Smart Contract
- Decentralization: The operating mode of the blockchain is a technology composed of multiple decentralized peers. All ledger data will be synchronized to all participating peers.
- Authentication: All participants need to be registered on the blockchain’s Certificate Authority (CA); the participant receives the authentication certificates from the CA. Then, the participants’ transactions can be updated to the ledger after authentication.
- Privacy and anonymity: Unlike the other public blockchains like Ethereum, Fabric-based blockchains have a feature that allows peer-to-peer transactions privately in the channel. Except for the transaction, any log of transactions saved in the ledger is kept secret and anonymous.
- Unforgeable data: Every peer is storing the same content of the ledger in the blockchain. All the transactions invoked by participants need to be saved as logs in the ledger, the data are chaining between block to block. Every block also records the previous block’s hash value as a link between blocks, so it is hard to forge data.
- Traceability: Because of the unforgeable data characteristics of the blockchain mentioned above, this also makes the modification record of the data traceable.
- Clarifying illegal records: All change records will be synced in the blockchain peer’s ledger. There are signatures or timestamp data to provide evidence to protect the rights of the community’s occupants if any conflicts arise in the future.
2.3. Threat Model
- Message repudiation issues: In the general safety security system, some issues should be solved. Message repudiation is one of the issues, and we must ensure that the message sent to the receiver was indeed sent by the sender [64].
3. Proposed Architecture and Methods
3.1. System Architecture
- Blockchain Center (BC): A blockchain center composed of multiple device nodes that are storing all the records from IoT. All the involved parties must register in the blockchain center. The monitoring records of the community are saved in the blockchain center. The records in the blockchain center are unforgeable and verifiable. When the parties request to view the specified record in detail, the blockchain center will send votes to other occupants. If more than half of the votes are agreed, the parties can view with the security guard.
- Community (CM): We separate the community type into three types: residential, commercial, and mixed. It is a physical structure in which occupants live or work. Inside the community is installed with several public or private domain IoT devices, variance age or type of occupants, and at least one security guard.
- Occupants (OP): The occupants who live or work in the residential/commercial/mixed community. All occupants involved in this system are given the option to choose whether to install the IoT devices in their private spaces to ensure the safety of their property. Every occupant must have a mobile phone with a decentralized application (dAPP). The dAPP in the mobile phone is an application that connects to the blockchain center. The application needs to registers and login with the blockchain center. The occupants have the right to give the security guard permission to view the monitoring records from his/her private domain IoT.
- Security Guard (SG): The security guard hired by the community’s management administrator. The SG must monitor the condition of the community at all times. If a dangerous incident occurs, the SG must deal with it immediately to ensure the safety of the community. To view any public or private domain IoT record, SG must request the blockchain center to read the records.
- Supervisor (SP): The security guards’ supervisor is in charge of the responsibility of managing security guards. The supervisor is hired by the community’s management administrator. The security guards who are on duty need the supervisor’s permission to check for the public domain history record.
- Internet of Things devices (IoT): The IoT included the security sensor, for example, cameras and sensors. The cameras take images from the corners of the community and detect suspicious events, e.g., burglary and abnormal behaviors.
- The cameras in the community can be categorized into two types: public domain cameras and private domain cameras. Public domain cameras are installed at the public corner of the community, the installation of the private domain cameras can be chosen by occupants, and they can choose how many cameras and which position they need to install.
- The sensors in the community can be smoke detectors, motion detectors, emergency buttons, or more devices that can help to notice dangerous moments.
- Log Server (LS): Every video record and event from the camera and sensors in the community are saved to the server. The server can be a physical device in a community or a cloud service on the internet. SG needs access to the log server to read the records.
- Step 1.
- Every participant must register and get a private key and public key from BC.
- Step 2.
- An alarm event triggered by an IoT device.
- Step 3.
- The IoT device updates the event information and status to LS and updates the information via chaincode to BC.
- Step 4.
- If the triggered IoT device is the public domain device, it will send the event information to SG in the next step (step 5), otherwise, the information will be sent to the relevant occupant in step 8.
- Step 5.
- The event information sends to the security guard in the community, the security guard received the event in a surveillance system on the LS.
- Step 6.
- SG receive the event information and check for the video record immediately to verify the situation.
- Step 7.
- When the situation is checked, SG starts to resolve the alarm event and update the resolved information as a remark to LS and update the information to BC via chaincode.
- Step 8.
- If the IoT device is a private domain, the alarm event information will be sent to the related occupant’s mobile phone application.
- Step 9.
- The occupant checks the situation with his/her application on the mobile phone.
- Step 10.
- The occupant responds and updates the event information to BC. If the occupant needs SG to resolve the situation of the alarm event, then go to step 4. SG will be notified, and SG will help to deal with it. Every action chosen from OP will update to BC via invoking chaincode.
3.2. Notations
3.3. Initialization and Registration Phase
- Step 1.
- Participant X sends the information of registration to CA.
- Step 2.
- CA generates a set of a private key and a public key of the Elliptic Curve Digital Signature Algorithm (ECDSA) [70]. The is generated by the follows equation:
- Step 3.
- Participant X gets and saves the unique parameters , , and for future transactions.
Algorithm 1. Chaincode function of registration and add IoT. |
var UserList []User_Information func Registration (var user User_Information) (User_ID string) { User_ID = GenerateUniqueID() user.User_ID = User_ID UserList = append (UserList, user) return User_ID } func Add_IoT(User_ID string, IoT IoT_Information) (IoT_ID string, d string, Q string) { index: = SearchUID(User_ID) IoT.IoT_ID = GenerateUniqueIoTID() UserList[index].IoTs = append(UserList[index].IoTs, IoT) d = GenerateECDSAPrivateKey() Q = d * G return (IoT.IoT_ID, d, Q) } |
- Step 1.
- Firstly, user X generates a random number , then generates the message with a sender ID, receiver ID, IoT’s information, and timestamp.
- Step 2.
- After CA receives the message from X, CA decrypts the cipher message with its private key and gets the decrypted messages.
- Step 3.
- User X receives the response message from CA. Then, user X decrypts the cipher message with his/her private key and gets the decrypted messages.
3.4. Authentication Phase
- Step 1.
- User X generates a random number and generates a message with a timestamp, sender ID, and receiver ID.
- Step 2.
- User Y receives the message from user X. Then, user Y decrypts the cipher message with his/her private key and gets the decrypted messages.
- Step 3.
- User X receives the response message from Y. Then, user X decrypts the cipher message with his/her private key and gets the decrypted messages.
Algorithm 2. The function of authentication with the sign and verify. |
func Sign (h string, k string, d string) (r string, s string) { (x, y) = k * G; r = x % n s = (h + r * d)/x % n return r, s } func Verify (h string, r string, s string) (result string) { u1 = h/s % n u2 = r/s % n (x, y) = u1 * G + u2 * Q if x = r { return “valid” }else{ return “invalid” } } |
3.5. Alarm Triggered Phase
- Step 1.
- IoT generates a random number , then invokes the chaincode function “Event_Trigger” as shown in Algorithm 3. This will send a transaction and update the information to the BC’s ledger. The function also returns an event’s ID, and the IoT generates a message and adds with the event’s ID and a timestamp.
- Step 2.
- After LS receives the message from IoT, LS decrypts the cipher message with its private key and gets the decrypted messages.
- Step 3.
- IoT receives the response message from LS. Then, IoT decrypts the cipher message with its private key and gets the decrypted messages.
Algorithm 3. Chaincode function of alarm triggered phase. |
var EventLog []Event_Information func Event_Trigger (OPID string, IoTID string, type IoTType, signature string) (EventID string) { EventID = GenerateUniqueEventID() EventLog = append (EventLog, new Event_Information{ Event_ID:EventID, IoT_ID: IoTID, User_ID: OPID, IoT_Type: type, Triggered_Datetime: time.Now(), IoT_Triggered_Signature: signature }) return EventID } func Event_Received_LS (Event_ID string, signature string) { index: = SearchEventID(Event_ID) EventLog[index].LS_Received_Datetime = time.Now() EventLog[index].LS_Received_Signature = signature } |
3.6. Notification Phase
- Step 1.
- Firstly, IoT generates a random number and a message with IoT’s ID, security guard/occupant’s ID, IoT occupant’s ID, event’s ID, and send timestamp.
- Step 2.
- After SO receives the message from IoT, SO decrypts the cipher message with his/her private key and gets the decrypted messages.
- Step 3.
- IoT receives the response message from SO. Then, IoT decrypts the cipher message with its private key and gets the decrypted messages.
Algorithm 4. Chaincode function of notification phase. |
func Event_Update_Notification (Event_ID string) { index := SearchEventID(Event_ID) EventLog[index].Notify_Datetime = time.Now() } func Event_Received_User (Event_ID string, signature string) { index := SearchEventID(Event_ID) EventLog[index].User_Received_Datetime = time.Now() EventLog[index].User_Received_Signature = signature } |
3.7. Response Phase (Security Guard with Public Domain IoT)
- Step 1.
- Initially, SG generates a random number and a message with the event’s ID and a timestamp.
- Step 2.
- LS receives the message from SG and decrypts the cipher message with its private key and gets the decrypted messages.
- Step 3.
- SG receives the message from LS. Then, SG decrypts the cipher message with his/her private key and gets the decrypted messages.
Algorithm 5. Chaincode function of response phase from security guard. |
func Event_Update_Response (Event_ID string, signature string, message string) { index: = SearchEventID(Event_ID) EventLog[index].User_Response_Datetime = time.Now() EventLog[index].User_Response_Signature = signature EventLog[index].ResponseMessage = message } func Event_Received_Response (Event_ID string, signature string) { index: = SearchEventID(Event_ID) EventLog[index].LS_Received_Datetime = time.Now() EventLog[index].LS_Received_Signature = signature } |
3.8. Response Phase (Occupant with Private Domain IoT)
- Step 1.
- Firstly, OP generates a random number and a message with the event’s ID, a timestamp, and the option of self or permitting guard to solve .
- Step 2.
- LS receives the message from OP. LS decrypts the cipher message with its private key and gets the decrypted messages.
- Step 3.
- OP receives the message from LS. Then, OP decrypts the cipher message with his/her private key.
- Step 1.
- If the OP permits the security guard in the community to solve the situation, then LS will send the notification to the security guard as provided in the following step. LS generates a random number and a response message .
- Step 2.
- SG received the message from LS. Then, SG decrypts the cipher message with his/her private key.
- Step 3.
- LS receives the message from SG, LS decrypts the cipher message with its private key and gets the decrypted messages.
Algorithm 6. Chaincode function of response phase from an occupant. |
func Event_Update_Response (Event_ID string, signature string, message string) { index: = SearchEventID(Event_ID) EventLog[index].User_Response_Datetime = time.Now() EventLog[index].User_Response_Signature = signature EventLog[index].ResponseMessage = message } func Event_Received_Response (Event_ID string, signature string) { index: = SearchEventID(Event_ID) EventLog[index].LS_Received_Datetime = time.Now() EventLog[index].LS_Received_Signature = signature } func Event_Update_Recieved_SG (Event_ID string, signature string) { index: = SearchEventID(Event_ID) EventLog[index].SG_Received_Datetime = time.Now() EventLog[index].SG_Received_Signature = signature } func Event_Received_Response_SG (Event_ID string, signature string) { index: = SearchEventID(Event_ID) EventLog[index].SG_Response_Datetime = time.Now() EventLog[index].SG_Response_Signature = signature } |
3.9. Check for History Records Phase
- Step 1.
- OP requests for viewing the private domain IoT devices videos or records from SG face to face.
- Step 2.
- The SG sends his/her encryption key and request information (such as start date and time, end date and time, and name or ID of private domain IoT device(s)) to LS. Then, the LS sends that information to BC for verification.
- Step 3.
- BC notifies the related occupant’s mobile device and asks for permission to let SG and OP view the related records.
- Step 4.
- The related occupant replies to the permission request back to BC by mobile device.
- Step 5.
- If the related occupant accepts the request, then BC shows the history videos or records in the security system. Otherwise, BC responds to the SG and OP that the request is not permitted.
- Step 1.
- SG requests for viewing the public domain IoT devices’ videos or records. The SG sends his/her encryption key and request information (such as start date and time, end date and time, and name or ID of private domain IoT device(s)) to LS.
- Step 2.
- Then, the LS sends that information to BC for verification.
- Step 3.
- BC notifies SG’s supervisor (SP) and asks for permission to let SG view the related records.
- Step 4.
- The SP replies to the permission request back to BC by mobile device.
- Step 5.
- If the related occupant accepts the request, then BC shows the history videos or records in the security system to SG. Otherwise, BC responds to the SG that request is not permitted.
3.10. Clarification Phase
- Step 1.
- The participant (such as security guard or occupant, SO) sends a clarifying request with the specified event ID and signatures to a third party (TP).
- Step 2.
- TP sends the request message and his/her signature to BC.
- Step 3.
- The signatures are checked by the BC, then the event’s information are sent to TP.
- Step 4.
- The TP checks the validity of every signature in the event’s information.
- Check if the event is triggered from a public domain IoT: go to step 4b if it is “no”, else go to step 4d.
- If the SG response signature is not valid, then the information is forged by LS.
- If the SG received signature is not valid, then the information is forged by SG.
- If the LS response signature is not valid, then the information is forged by LS.
- If the SO response signature is not valid, then the information is forged by SO.
- If the SO received signature is not valid, then the information is forged by SO.
- If the LS received signature is not valid, then the information is forged by LS.
- If the IoT triggered signature is not valid, then the information is forged by IoT.
- The specified event information is valid if all the signatures are legal.
4. Security Analysis
4.1. Data Integrity
4.2. Non-Repudiation
4.3. Unforgeable Data and Traceability
4.4. Man-in-the-Middle Attack
4.5. Replay Attack
5. Discussion
5.1. Computation Cost
5.2. Communication Cost
5.3. Comparison
5.4. Limitations
6. Conclusions
- (1)
- Blockchain decentralization and authentication to ensure the privacy and anonymity of participants.
- (2)
- Unforgeable and traceability of data by the blockchain characteristic.
- (3)
- The privacy protection when grabbing a history records from Log Server.
- (4)
- Designed a clarifying phase for clarifying the safety system process.
- (5)
- Signature mechanism to ensure message repudiation during communication.
- (6)
- Asymmetrical encryption/decryption to ensure data integrity during communication.
- (7)
- Transmission intercept prevention, prevent replay attacks from cyberattacks.
- (8)
- Multiple security analyses have also been presented to prove the system’s security.
- (9)
- The features of other works and our proposed scheme are also compared and concluded in Table 8.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Yahoo News: Taiwan’s ‘Ghost Building’ Fire: A Death Trap for Dozens of Elderly. Available online: https://news.yahoo.com/taiwans-ghost-building-fire-death-122230630.html (accessed on 1 November 2021).
- The New York Times: Taiwan Couple Are Suspected of Negligent Homicide in Building Fire. Available online: https://www.nytimes.com/2021/10/18/world/asia/taiwan-building-fire.html (accessed on 1 November 2021).
- Kammersgaard, T. Private security guards policing public space: Using soft power in place of legal authority. Polic. Soc. 2019, 31, 117–130. [Google Scholar] [CrossRef]
- Nalla, M.K.; Crichlow, V.J. Have the standards for private security guards become more stringent in the post 9/11 era? An assessment of security guard regulations in the US from 1982 to 2010. Secur. J. 2017, 30, 523–537. [Google Scholar] [CrossRef]
- Gurinskaya, A.L.; Nalla, M.K.; Rafailova, D.K. Are Private Security Guards Capable of Protecting Life and Property? Exploring Russian Youth’s Perceptions. Russ. J. Criminol. 2018, 12, 338–348. [Google Scholar] [CrossRef]
- Van Steden, R.; Nalla, M.K. Citizen satisfaction with private security guards in the Netherlands: Perceptions of an ambiguous occupation. Eur. J. Criminol. 2010, 7, 214–234. [Google Scholar] [CrossRef] [Green Version]
- Smart Buildings Market by Component (Solution (Safety and Security Management, Energy Management, Building Infrastructure Management, Network Management, IWMS), Services), Building Type (Residential, Commercial, Industrial), Region—Global Forecast to 2025. Available online: https://www.marketsandmarkets.com/Market-Reports/smart-building-market-1169.html#:~:text=According%20to%20MarketsandMarkets%2C%20the%20global,14.2%25%20during%20the%20forecast%20period (accessed on 1 November 2021).
- Medical Alert Systems Market by Type (Personal Emergency Response System (PERS) [Home-based/Landline-based System, Mobile PERS], Nurse Calling System (NCS) [Button-Based Systems, Integrated Communication Systems, Mobile Systems, Intercom Systems] and Smart Belt) by Offering (Hardware, Services and Software), by Connection Type (Wired, Wireless), by End, and by Region, Forecast to 2028. Available online: https://www.reportsanddata.com/report-detail/medical-alert-systems-market (accessed on 1 November 2021).
- Dutta, J.; Wang, Y.; Maitra, T.; Islam, S.H.; Rawal, B.S.; Giri, D. ES3B: Enhanced Security System for Smart Building Using IoT. In Proceedings of the 2018 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA, 21–23 September 2018; pp. 158–165. [Google Scholar]
- Prasetyo, T.F.; Zaliluddin, D.; Iqbal, M. Prototype of smart office system using based security system. J. Phys. Conf. Ser. 2018, 1013, 012189. [Google Scholar] [CrossRef]
- Saeed, F.; Paul, A.; Rehman, A.; Hong, W.H.; Seo, H. IoT-Based Intelligent Modeling of Smart Home Environment for Fire Prevention and Safety. J. Sens. Actuator Netw. 2018, 7, 11. [Google Scholar] [CrossRef] [Green Version]
- Taryudi; Adriano, D.B.; Ciptoning Budi, W.A. Iot-based Integrated Home Security and Monitoring System. J. Phys. Conf. Ser. 2018, 1140, 012006. [Google Scholar] [CrossRef]
- Al-Hudhud, G.; AlSaeed, D.; Al-Baity, H.; Al-Humaimeedy, A.; Al-Turaiki, I. iGuard: Mobile security guard system with infrared biosensor and google glass article information. Biosci. Biotechnol. Res. Commun. 2019, 12, 333–337. [Google Scholar] [CrossRef]
- Ray, A.K.; Bagwari, A. IoT based Smart home: Security Aspects and security architecture. In Proceedings of the 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, 10–12 April 2020; pp. 218–222. [Google Scholar]
- Khan, P.W.; Byun, Y.C.; Park, N. A Data Verification System for CCTV Surveillance Cameras Using Blockchain Technology in Smart Cities. Electronics 2020, 9, 484. [Google Scholar] [CrossRef] [Green Version]
- Rahman, A.; Islam, M.J.; Rahman, Z.; Reza, M.M.; Anwar, A.; Mahmud, M.A.P.; Nasir, M.K.; Noor, R.M. DistB-Condo: Distributed Blockchain-Based IoT-SDN Model for Smart Condominium. IEEE Access 2020, 8, 209594–209609. [Google Scholar] [CrossRef]
- Khalid, U.; Asim, M.; Baker, T.; Hung, P.C.K.; Tariq, M.A.; Rafferty, L. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Comput. 2020, 23, 2067–2087. [Google Scholar] [CrossRef]
- Van Wassenaer, L.; Verdouw, C.; Wolfert, S. What Blockchain Are We Talking About? An Analytical Framework for Understanding Blockchain Applications in Agriculture and Food. Front. Blockchain 2021, 4, 20. [Google Scholar] [CrossRef]
- Johar, S.; Ahmad, N.; Asher, W.; Cruickshank, H.; Durrani, A. Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey. Appl. Sci. 2021, 11, 6252. [Google Scholar] [CrossRef]
- Hyperledger Fabric. Available online: https://www.hyperledger.org/use/fabric (accessed on 1 November 2021).
- Leng, Z.; Tan, Z.; Wang, K. Application of Hyperledger in the Hospital Information Systems: A Survey. IEEE Access 2021, 9, 128965–128987. [Google Scholar] [CrossRef]
- Iftekhar, A.; Cui, X.; Tao, Q.; Zheng, C. Hyperledger Fabric Access Control System for Internet of Things Layer in Blockchain-Based Applications. Entropy 2021, 23, 1054. [Google Scholar] [CrossRef] [PubMed]
- Kamilaris, A.; Fonts, A.; Prenafeta-Boldύ, F.X. The rise of blockchain technology in agriculture and food supply chains. Trends Food Sci. Technol. 2019, 91, 640–652. [Google Scholar] [CrossRef] [Green Version]
- Chen, C.-L.; Shang, X.; Tsaur, W.-J.; Weng, W.; Deng, Y.-Y.; Wu, C.-M.; Cui, J. An Anti-Counterfeit and Traceable Management System for Brand Clothing with Hyperledger Fabric Framework. Symmetry 2021, 13, 2048. [Google Scholar] [CrossRef]
- Chen, C.-L.; Deng, Y.-Y.; Tsaur, W.-J.; Li, C.-T.; Lee, C.-C.; Wu, C.-M. A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology. Sustainability 2021, 13, 9386. [Google Scholar] [CrossRef]
- Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Chen, S.J.; Hovde, D.C.; Peterson, K.A.; Marshall, A.W. Fire detection using smoke and gas sensors. Fire Saf. J. 2007, 42, 507–515. [Google Scholar] [CrossRef]
- Maguluri, L.P.; Srinivasarao, T.; Ragupathy, R.; Syamala, M.; Nalini, N.J. Efficient Smart Emergency Response System for Fire Hazards using IoT. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 314–320. [Google Scholar]
- Jacob, T.P.; Pravin, A. Environmental Pollution Alerting System Using IOT. Res. J. Pharm. Biol. Chem. Sci. 2018, 9, 403–406. [Google Scholar]
- Lee, J.; Kim, J.; Im, J.P.; Lim, S.Y.; Kwon, J.Y.; Lee, S.M.; Moon, S.E. MEMS-Based NO2 Gas Sensor Using ZnO Nano-Rods for Low-Power IoT Application. J. Korean Phys. Soc. 2017, 70, 924–928. [Google Scholar] [CrossRef]
- Suh, J.H.; Cho, I.; Kang, K.; Kweon, S.J.; Lee, M.; Yoo, H.J.; Park, I. Fully integrated and portable semiconductor-type multi-gas sensing module for IoT applications. Sens. Actuator B Chem. 2018, 265, 660–667. [Google Scholar] [CrossRef]
- Gu, Z.M. Home smart motion system assisted by multi-sensor. Microprocess. Microsyst. 2021, 80. [Google Scholar] [CrossRef]
- Choo, K.D.; Xu, L.; Kim, Y.; Seol, J.H.; Wu, X.; Sylvester, D.; Blaauw, D. Energy-Efficient Motion-Triggered IoT CMOS Image Sensor With Capacitor Array-Assisted Charge-Injection SAR ADC. IEEE J. Solid State Circuit 2019, 54, 2921–2931. [Google Scholar] [CrossRef]
- Kim, J.W.; Sul, S.H.; Choi, J.B. Development of real-time Internet of Things motion detection platform applying non-contact sensor based on open source hardware. Int. J. Distrib. Sens. Netw. 2020, 16, 20. [Google Scholar] [CrossRef]
- McCay, K.D.; Ho, E.S.L.; Shum, H.P.H.; Fehringer, G.; Marcroft, C.; Embleton, N.D. Abnormal Infant Movements Classification With Deep Learning on Pose-Based Features. IEEE Access 2020, 8, 51582–51592. [Google Scholar] [CrossRef]
- Shehzed, A.; Jalal, A.; Kim, K. Multi-Person Tracking in Smart Surveillance System for Crowd Counting and Normal/Abnormal Events Detection. In Proceedings of the 2019 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan, 27–29 August 2019; pp. 163–168. [Google Scholar]
- Sreenu, G.; Saleem Durai, M.A. Intelligent video surveillance: A review through deep learning techniques for crowd analysis. J. Big Data 2019, 6, 48. [Google Scholar] [CrossRef]
- Zhou, S.; Shen, W.; Zeng, D.; Fang, M.; Wei, Y.; Zhang, Z. Spatial–temporal convolutional neural networks for anomaly detection and localization in crowded scenes. Signal Process. Image Commun. 2016, 47, 358–368. [Google Scholar] [CrossRef]
- Ermis, A.; Yurttadur, A.A.; Karacay, T. Human Intruder Detection by Measuring and Analysing Ground Vibrations. J. Fac. Eng. Archit. Gazi Univ. 2015, 30, 207–215. [Google Scholar]
- Auvinet, E.; Multon, F.; Saint-Arnaud, A.; Rousseau, J.; Meunier, J. Fall Detection With Multiple Cameras: An Occlusion-Resistant Method Based on 3-D Silhouette Vertical Distribution. IEEE Trans. Inf. Technol. Biomed. 2011, 15, 290–300. [Google Scholar] [CrossRef]
- Kong, X.; Meng, Z.; Meng, L.; Tomiyama, H. A Privacy Protected Fall Detection IoT System for Elderly Persons Using Depth Camera. In Proceedings of the 2018 International Conference on Advanced Mechatronic Systems (ICAMechS), Zhengzhou, China, 30 August–2 September 2018; pp. 31–35. [Google Scholar]
- Leone, A.; Diraco, G.; Siciliano, P. Detecting falls with 3D range camera in ambient assisted living applications: A preliminary study. Med. Eng. Phys. 2011, 33, 770–781. [Google Scholar] [CrossRef] [PubMed]
- Shojaei-Hashemi, A.; Nasiopoulos, P.; Little, J.J.; Pourazad, M.T. Video-based Human Fall Detection in Smart Homes Using Deep Learning. In Proceedings of the 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy, 27–30 May 2018; pp. 1–5. [Google Scholar]
- Gia, T.N.; Sarker, V.K.; Tcarenko, I.; Rahmani, A.M.; Westerlund, T.; Liljeberg, P.; Tenhunen, H. Energy efficient wearable sensor node for IoT-based fall detection systems. Microprocess. Microsyst. 2018, 56, 34–46. [Google Scholar] [CrossRef]
- Kim, T.; Park, H.; Hong, S.H.; Chung, Y. Integrated System of Face Recognition and Sound Localization for a Smart Door Phone. IEEE Trans. Consum. Electron. 2013, 59, 598–603. [Google Scholar] [CrossRef]
- Huang, Z.G.; Zhang, L.; Meng, X.Y.; Choo, K.K.R. Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home. IEEE Internet Things J. 2020, 7, 1039–1047. [Google Scholar] [CrossRef]
- Song, S.J.; Nam, H. Visible light Identification System for Smart Door Lock Application with Small Area Outdoor Interface. Curr. Opt. Photonics 2017, 1, 90–94. [Google Scholar] [CrossRef] [Green Version]
- Won, J.; Park, J.; Park, J.W.; Kim, I.H. BLESeis: Low-Cost IoT Sensor for Smart Earthquake Detection and Notification. Sensors 2020, 20, 13. [Google Scholar] [CrossRef]
- Taale, A.; Ventura, C.E.; Marti, J. On the feasibility of IoT-based smart meters for earthquake early warning. Earthq. Spectra 2021, 37, 2066–2083. [Google Scholar] [CrossRef]
- Khan, I.; Choi, S.; Kwon, Y.W. Earthquake Detection in a Static and Dynamic Environment Using Supervised Machine Learning and a Novel Feature Extraction Method. Sensors 2020, 20, 21. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Popper, N. Decoding the enigma of Satoshi Nakamoto and the birth of Bitcoin. New York Times, 15 May 2015. [Google Scholar]
- Peck, M.E. The cryptoanarchists’ answer to cash. IEEE Spectrum 2012, 49, 50–56. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 29 December 2020).
- Buterin, V. A next-generation smart contract and decentralized application platform. Ethereum White Pap. 2014, 3, 36. [Google Scholar]
- Corda. Available online: https://www.corda.net/ (accessed on 1 November 2021).
- Azure Blockchain. Available online: https://azure.microsoft.com/en-us/solutions/blockchain/ (accessed on 1 November 2021).
- Nasir, Q.; Qasse, I.A.; Abu Talib, M.; Nassif, A.B. Performance Analysis of Hyperledger Fabric Platforms. Secur. Commun. Netw. 2018, 2018, 3976093. [Google Scholar] [CrossRef] [Green Version]
- Chen, C.-L.; Lim, Z.-Y.; Liao, H.-C.; Deng, Y.-Y.; Chen, P. A Traceable and Verifiable Tobacco Products Logistics System with GPS and RFID Technologies. Appl. Sci. 2021, 11, 4939. [Google Scholar] [CrossRef]
- Iftekhar, A.; Cui, X.H. Blockchain-Based Traceability System That Ensures Food Safety Measures to Protect Consumer Safety and COVID-19 Free Supply Chains. Foods 2021, 10, 12. [Google Scholar] [CrossRef] [PubMed]
- Zhang, Y.; Wang, Z.; Deng, J.; Gong, Z.; Flood, I.; Wang, Y. Framework for a Blockchain-Based Infrastructure Project Financing System. IEEE Access 2021, 9, 141555–141570. [Google Scholar] [CrossRef]
- Xiao, Z.; Li, Z.; Yang, Y.; Chen, P.; Liu, R.W.; Jing, W.; Pyrloh, Y.; Sotthiwat, E.; Goh, R.S.M. Blockchain and IoT for Insurance: A Case Study and Cyberinfrastructure Solution on Fine-Grained Transportation Insurance. IEEE Trans. Comput. Soc. Syst. 2020, 7, 1409–1422. [Google Scholar] [CrossRef]
- Tanwar, S.; Parekh, K.; Evans, R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur. Appl. 2020, 50, 102407. [Google Scholar] [CrossRef]
- Jayaraman, R.; Salah, K.; King, N. Improving Opportunities in Healthcare Supply Chain Processes via the Internet of Things and Blockchain Technology. Int. J. Healthc. Inf. Syst. Inf. 2019, 14, 49–65. [Google Scholar] [CrossRef] [Green Version]
- Mohamed, K.S. Cryptography Concepts: Integrity, Authentication, Availability, Access Control, and Non-repudiation. In New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA; Mohamed, K.S., Ed.; Springer International Publishing: Cham, Switzerland, 2020; pp. 41–63. [Google Scholar] [CrossRef]
- Yuan, H.; Chen, X.; Wang, J.; Yuan, J.; Yan, H.; Susilo, W. Blockchain-based public auditing and secure deduplication with fair arbitration. Inf. Sci. 2020, 541, 409–425. [Google Scholar] [CrossRef]
- Conti, M.; Dragoni, N.; Lesyk, V. A Survey of Man In The Middle Attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
- Zhao, Y.; Li, Y.; Mu, Q.; Yang, B.; Yu, Y. Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems. IEEE Access 2018, 6, 12295–12303. [Google Scholar] [CrossRef]
- Feng, Y.; Wang, W.; Weng, Y.; Zhang, H. A Replay-Attack Resistant Authentication Scheme for the Internet of Things. In Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 21–24 July 2017; pp. 541–547. [Google Scholar]
- Zaman, A.; Safarinejadian, B.; Birk, W. Security analysis and fault detection against stealthy replay attacks. Int. J. Control. 2020, 1–14. [Google Scholar] [CrossRef]
- Johnson, D.; Menezes, A.; Vanstone, S. The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inf. Secur. 2001, 1, 36–63. [Google Scholar] [CrossRef]
- Khairuddin, M.H.; Shahbudin, S.; Kassim, M. A smart building security system with intelligent face detection and recognition. IOP Conf. Ser. Mater. Sci. Eng. 2021, 1176, 012030. [Google Scholar] [CrossRef]
Notations | Description |
---|---|
X is the identity of the participant (such as IoT devices and occupants), issued by the blockchain center. | |
The event ID that generated by IoT devices, included the ID of IoT and User. The format is [UserID + IoTID + timestamp] | |
A k-bit of prime number | |
Finite group of | |
The elliptic curve defined on finite group | |
A generating point based on the elliptic curve | |
The ith random value on the elliptic curve | |
Elliptic curve signature value of X | |
The ECDSA signature value of X | |
The ECDSA’s private key of participant X | |
The ECDSA’s public key of participant X | |
The public key of party X, issued by the BC’s CA | |
The private key of party X, issued by the BC’s CA | |
The ith ciphertext of X | |
One way hash function | |
The ith hash value of X | |
The ith timestamp | |
The threshold for checking the validity of a timestamp | |
The ith message from a sender | |
Encrypt or decrypt message M with a public key or private key of participant X |
Phase | Party | Message | Hash Value | Verification | |
---|---|---|---|---|---|
Sender | Receiver | ||||
Registration of IoT | X | CA | |||
CA | X | ||||
Authentication | X | Y | |||
Y | X | ||||
Alarm triggered | IoT | LS | |||
LS | IoT | ||||
Notification | IoT | SG/OP | |||
SG/OP | IoT | ||||
Response (Public IoT) | SG | LS | |||
LS | SG | ||||
Response (Private IoT) | OP | LS | |||
LS | OP | ||||
LS | SG | ||||
SG | LS |
Phase | Party | Signature | Verification | |
---|---|---|---|---|
Sender | Receiver | |||
Registration of IoT | X | CA | ||
CA | X | |||
Authentication | X | Y | ||
Y | X | |||
Alarm triggered | IoT | LS | ||
LS | IoT | |||
Notification | IoT | SG/OP | ||
SG/OP | IoT | |||
Response (Public IoT) | SG | LS | ||
LS | SG | |||
Response (Private IoT) | OP | LS | ||
LS | OP | |||
LS | SG | |||
SG | LS |
Phase | Party | Encryption | Decryption | |
---|---|---|---|---|
Sender | Receiver | |||
Registration of IoT | X | CA | ||
CA | X | |||
Authentication | X | Y | ||
Y | X | |||
Alarm triggered | IoT | LS | ||
LS | IoT | |||
Notification | IoT | SG/OP | ||
SG/OP | IoT | |||
Response (Public IoT) | SG | LS | ||
LS | SG | |||
Response (Private IoT) | OP | LS | ||
LS | OP | |||
LS | SG | |||
SG | LS |
Phase | Party | Send Time | Receive Time | Validation | |
---|---|---|---|---|---|
Sender | Receiver | ||||
Registration of IoT | X | CA | |||
CA | X | ||||
Authentication | X | Y | |||
Y | X | ||||
Alarm triggered | IoT | LS | |||
LS | IoT | ||||
Notification | IoT | SG/OP | |||
SG/OP | IoT | ||||
Response (Public IoT) | SG | LS | |||
LS | SG | ||||
Response (Private IoT) | OP | LS | |||
LS | OP | ||||
LS | SG | ||||
SG | LS |
Phase | Participant 1 | Participant 2 |
---|---|---|
Registration of IoT | User X: 2Th + 2Tadd + 1Tsub + 4Tmul + 3Tdiv + 2Tasy | Certificate Authority: 2Th + 2Tadd + 1Tsub + 3Tmul + 3Tdiv + 2Tasy |
Authentication | User X: 2Th + 2Tadd + 1Tsub + 4Tmul + 3Tdiv + 2Tasy | User Y: 2Th + 2Tadd + 1Tsub + 3Tmul + 3Tdiv + 2Tasy |
Alarm triggered | Internet of Things: 2Th + 2Tadd + 1Tsub + 4Tmul + 3Tdiv + 2Tasy | Log Server: 2Th + 2Tadd + 1Tsub + 3Tmul + 3Tdiv + 2Tasy |
Notification | Internet of Things: 2Th + 2Tadd + 1Tsub + 4Tmul + 3Tdiv + 2Tasy | Security Guard/Occupant: 2Th + 2Tadd + 1Tsub + 3Tmul + 3Tdiv + 2Tasy |
Response (Public IoT) | Security Guard: 2Th + 2Tadd + 1Tsub + 4Tmul + 3Tdiv + 2Tasy | Log Server: 2Th + 2Tadd + 1Tsub + 3Tmul + 3Tdiv + 2Tasy |
Response (Private IoT) | Occupant: 2Th + 2Tadd + 1Tsub + 4Tmul + 3Tdiv + 2Tasy | Log Server: 2Th + 2Tadd + 1Tsub + 3Tmul + 3Tdiv + 2Tasy |
Log Server: 2Th + 2Tadd + 1Tsub + 4Tmul + 3Tdiv + 2Tasy | Security Guard: 2Th + 2Tadd + 1Tsub + 3Tmul + 3Tdiv + 2Tasy |
Phase | Message Length | 4G (100 Mbps) | 5G (20 Gbps) |
---|---|---|---|
Registration of IoT | 3648 bits | 35 ms | 0.17 ms |
Authentication | 3648 bits | 35 ms | 0.17 ms |
Alarm triggered | 3648 bits | 35 ms | 0.17 ms |
Notification | 3648 bits | 35 ms | 0.17 ms |
Response (Public IoT) | 3648 bits | 35 ms | 0.17 ms |
Response (Private IoT) | 7296 bits | 70 ms | 0.34 ms |
Authors | Year | Objective | Technologies | 1 | 2 | 3 | 4 | 5 | 6 |
---|---|---|---|---|---|---|---|---|---|
Dutta et al. [9] | 2018 | IoT security system | IoT, Arduino | Y | N | Y | N | N | N |
Prasetyo et al. [10] | 2018 | Smart office system with threat detection | IoT, Arduino, Raspberry Pi | Y | N | Y | Y | N | N |
Saeed et al. [11] | 2018 | Smart home environment for fire prevention | ZigBee | Y | N | Y | N | Y | N |
Taryudi et al. [12] | 2018 | Home security and monitoring system with various types of sensor, such as PIR, DHT-22, rain, fire, LDR sensors. | Arduino-nano, NodeMCU ESP8266 | Y | N | Y | N | N | N |
Al-Hudhud et al. [13] | 2019 | Security guard system with augmented reality to monitor IoT status | Infrared biosensor, google glass | Y | N | Y | Y | Y | N |
Ray et al. [14] | 2020 | The security issues of smart home network | Information security, networking | Y | N | Y | Y | Y | N |
Khan et al. [15] | 2020 | Data verification system for surveillance cameras | Blockchain, IoT | Y | Y | Y | Y | Y | N |
Rahman et al. [16] | 2020 | Distributed IoT-SDN Model for condominium | Blockchain, IoT-SDN | Y | Y | Y | N | Y | N |
Khairuddin et al. [71] | 2021 | Smart building system with face detection and recognition | Image processing, Raspberry Pi | Y | N | Y | Y | Y | N |
Our proposed method | 2021 | A Blockchain-based community safety security system with IoT secure devices | Blockchain, IoT | Y | Y | Y | Y | Y | Y |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, C.-L.; Lim, Z.-Y.; Liao, H.-C. Blockchain-Based Community Safety Security System with IoT Secure Devices. Sustainability 2021, 13, 13994. https://doi.org/10.3390/su132413994
Chen C-L, Lim Z-Y, Liao H-C. Blockchain-Based Community Safety Security System with IoT Secure Devices. Sustainability. 2021; 13(24):13994. https://doi.org/10.3390/su132413994
Chicago/Turabian StyleChen, Chin-Ling, Zi-Yi Lim, and Hsien-Chou Liao. 2021. "Blockchain-Based Community Safety Security System with IoT Secure Devices" Sustainability 13, no. 24: 13994. https://doi.org/10.3390/su132413994
APA StyleChen, C. -L., Lim, Z. -Y., & Liao, H. -C. (2021). Blockchain-Based Community Safety Security System with IoT Secure Devices. Sustainability, 13(24), 13994. https://doi.org/10.3390/su132413994