Blockchain-Based Information Sharing Security for the Internet of Things
Abstract
:1. Introduction
1.1. Research Domain
1.2. State-of-the-Art Contribution
- The current research presents a comprehensive framework for IoT security using BCT technology.
- Specifically, the global reputation value is computed for every IoT node to estimate the current state.
- The reputation measure is utilized to adjust the weighing measure of the vulnerable node using the equilibrium technique.
- Moreover, a BCT-based decentralized database is presented for storing the locations of IoT devices for collective utilization.
- The proposed technique is validated in several experimental simulations in which enhanced results were registered in comparison to the state-of-the-art techniques.
Paper Organization
2. Related Work
2.1. BCT-Based Solutions for IoT Security
2.2. Ubiquitous Security Framework
3. Proposed Method
- The area of application is limited, as they only focus on one part of the information transmission chain or one perspective of an application situation
- In the face of an enormous IoT infrastructure, there is no efficient technique to certify the legitimacy of wireless technology. IoT network leads to large data, expensive investment and maintenance costs for centralized data processing infrastructure, and a challenge in keeping up with the exponential increase of data.
- IoT computing, transmission, and other resources for information like Actuators, location sensors, and geo-sensors, RFID, both time and resources are finite.
3.1. Dual Mode of BCT Technology
3.2. BCT Structure Based on Time Stamp
3.3. BCT-IoT Information Security
4. Proposed BCT-Inspired Approach
4.1. Enhancing Consensus Algorithm
4.2. Formulating Data Protection Technique
- Stability of the structure: When considering the significance of BCT bearer services, the breadth of subsystems, the level of openness of information systems, and the security of subsystems after the implementation of BCT technology in the future of the IoT, one can look at the experience of network security protection in the power industry. Firewalls and other access control devices at each communication border and fortified BCTs via virtual private networks are two ways to safeguard hosts and network devices in the BCT IoT system.
- Protection of Ontologies: Before sending out transaction data to the whole network, the trading node in the BCT should evaluate its importance and security. The desensitization algorithm library should be developed in a targeted manner to anonymize transaction data between nodes, and a risk model of user privacy data leakage risk should be constructed to subjectively and quantitatively evaluate the threat of data leaking. The approval system for privacy data is combined with BCT’s user authentication system, a rights management system, and a rights management system with varying degrees of protection of privacy data to actualize the data access mechanism based on the approval system. The upper-layer applications of a BCT IoT are not guaranteed to be secure by the security of the BCT IoT itself. Existing attack techniques for application systems are complex and often rely on exploiting pre-existing vulnerabilities or malicious code in the source code, weak authentication, and data transport in plaintext. To catch malicious code before it can cause any harm, it’s best to use data mining and machine learning techniques, build malicious code feature extraction methods that take advantage of multi-dimensional features like the PE file header and the machine code byte sequence, and combine these with effective feature selection methods before putting the application system online. Furthermore, classifiers, which speed up the discovery of previously undiscovered dangerous code and boost its detection accuracy and generalizability. To actively investigate and patch the current flaws and prevent security risks, pre-built vulnerability mining is performed before the BCT IoT is launched using a variety of vulnerability mining methods such as fuzzing, binary comparison, static analysis, and dynamic analysis. Hackers may easily take control of a user’s data or assets if they steal the user’s private key, which is a security problem in the BCT IoT due to the storing and transfer of keys. Private key replacement and management mechanisms are not included in the BCT, despite its centrality-eliminating design. Users may safeguard their private keys by using either a secret-sharing-based private key protection method or a hardware storage strategy based on physical security.
- Safety in Management: All devices and systems on the BCT should be included in the audit, as should the reading and writing of data as well as any anomalous use of system resources. Consequently, multi-source logs, correlation analysis, fusion analysis, and situational factor analysis of multi-source logs are used to evaluate the networked network security status, and abnormal events and overall security postures in the system are sensed in time to make early warning and risk control measures. These are achieved through the application of data fusion and smart analysis techniques for network security. The BCT-IoT application scenarios need to be clarified to effectively avoid, promptly control, and mitigate the risks and repercussions of different forms of unexpected network security events including cyber attacks and malicious code infections. Take part in frequent emergency exercises, investigate the cause of network security issues and system vulnerabilities, fortify defenses, and forestall new attacks; these are different responsibilities as a network participant.
5. Experimental Results and Discussions
5.1. Defense against Attack
5.2. The Efficiency of Data BCTs
5.2.1. Transmission Rate
5.2.2. Delay
5.2.3. BCT Trading Efficiency
5.3. Reliability Efficiency
5.4. Stability Efficiency
5.5. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Hasan, H.R.; Salah, K. Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts. IEEE Access 2018, 6, 65439–65448. [Google Scholar] [CrossRef]
- Ajgaonkar, A.; Raghani, A.; Sheth, B.; Shukla, D.; Patel, D.; Shanbhag, S. A Blockchain Approach for Exchanging Machine Learning Solutions Over Smart Contracts. In Proceedings of the Science and Information Conference, Trier, Germany, 19–23 September 2022; Springer: Berlin, Germany, 2022; pp. 470–482. [Google Scholar]
- Bommu, S.; Babburu, K.; Thalluri, L.N.; Gopalan, A.; Mallapati, P.; Guha, K.; Mohammad, H. Smart City IoT System Network Level Routing Analysis and Blockchain Security Based Implementation. J. Electr. Eng. Technol. 2023, 18, 1351–1368. [Google Scholar] [CrossRef]
- Alshudukhi, K.; Khemakhem, M.; Eassa, F.; Jambi, K. An Interoperable Blockchain Security Frameworks Based on Microservices and Smart Contract in IoT Environment. Electronics 2023, 12, 776. [Google Scholar] [CrossRef]
- Zhao, Y.; Li, Q.; Yi, W.; Xiong, H. Agricultural IoT Data Storage Optimization and Information Security Method Based on Blockchain. Agriculture 2023, 13, 274. [Google Scholar] [CrossRef]
- Sharadqh, A.; Hatamleh, H.; Alnaser, A.; Saloum, S.; Alawneh, T. Hybrid Chain: Blockchain Enabled Framework for Bi-Level Intrusion Detection and Graph-based Mitigation for Security Provisioning in Edge Assisted IoT Environment. IEEE Access 2023, 11, 27433–27449. [Google Scholar] [CrossRef]
- Kumar, S.; Vidhate, A. Issues and Future Trends in IoT Security using Blockchain: A Review. In Proceedings of the 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, 5–7 January 2023; pp. 976–984. [Google Scholar] [CrossRef]
- Abed, S.; Jaffal, R.; Mohd, B. A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives. Wirel. Pers. Commun. 2023, 1–44. [Google Scholar] [CrossRef]
- Lhore, H.; Bousselam, K.; Elissati, O.; Chami, M. Blockchain Technology as a Possible Solution to IoT Security Issues. Int. J. Eng. Trends Technol. 2023, 71, 152–163. [Google Scholar] [CrossRef]
- Verma, R.; Dhanda, N.; Nagar, V. Analysing the Security Aspects of IoT using Blockchain and Cryptographic Algorithms. Int. J. Recent Innov. Trends Comput. Commun. 2023, 11, 13–22. [Google Scholar] [CrossRef]
- Sureshkumar, T.; Sivaraj, R.; Vijayakumar, M. Design and implementation of a framework for blockchain based security using IoT. J. Intell. Fuzzy Syst. 2023, 44, 905–918. [Google Scholar] [CrossRef]
- Prasanna Kumar, M.; Nalini, N. An Efficient Blockchain-Based Security Framework for PUF-Enabled IoT Devices in Smart Grid Infrastructure. Lect. Notes Electr. Eng. 2023, 928, 869–877. [Google Scholar] [CrossRef]
- Ganesh Babu, R.; Yuvaraj, S.; Muthu Manjula, M.; Kaviyapriya, S.; Harini, R. Performance Analysis of Data Sharing Using Blockchain Technology in IoT Security Issues. Lect. Notes Netw. Syst. 2023, 492, 507–515. [Google Scholar] [CrossRef]
- Pal, K. Security implications of IoT applications with cryptography and blockchain technology in healthcare digital twin design. In Digital Twins and Healthcare: Trends, Techniques, and Challenges; IGI Global: Hershey, PA, USA, 2022; pp. 229–252. [Google Scholar] [CrossRef]
- Na, D.; Park, S. IoT-Chain and Monitoring-Chain Using Multilevel Blockchain for IoT Security. Sensors 2022, 22, 8271. [Google Scholar] [CrossRef] [PubMed]
- Said, O. LBSS: A Lightweight Blockchain-Based Security Scheme for IoT-Enabled Healthcare Environment. Sensors 2022, 22, 7948. [Google Scholar] [CrossRef] [PubMed]
- Patan, R.; Manikandan, R.; Parameshwaran, R.; Perumal, S.; Daneshmand, M.; Gandomi, A. Blockchain Security Using Merkle Hash Zero Correlation Distinguisher for the IoT in Smart Cities. IEEE Internet Things J. 2022, 9, 19296–19306. [Google Scholar] [CrossRef]
- Hewa, T.; Braeken, A.; Liyanage, M.; Ylianttila, M. Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing. IEEE Trans. Ind. Inform. 2022, 18, 7174–7185. [Google Scholar] [CrossRef]
- Qahtan, S.; Sharif, K.; Zaidan, A.; Alsattar, H.; Albahri, O.; Zaidan, B.; Zulzalil, H.; Osman, M.; Alamoodi, A.; Mohammed, R. Novel Multi Security and Privacy Benchmarking Framework for Blockchain-Based IoT Healthcare Industry 4.0 Systems. IEEE Trans. Ind. Inform. 2022, 18, 6415–6423. [Google Scholar] [CrossRef]
- Attkan, A.; Ranga, V. Cyber-physical security for IoT networks: A comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex Intell. Syst. 2022, 8, 3559–3591. [Google Scholar] [CrossRef]
- Ren, J.; Li, J.; Liu, H.; Qin, T. Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Sci. Technol. 2022, 27, 760–776. [Google Scholar] [CrossRef]
- Janani, K.; Ramamoorthy, S. Defending IoT security infrastructure with the 6G network, and blockchain and intelligent learning models for the future research roadmap. In Challenges and Risks Involved in Deploying 6G and NextGen Networks; IGI Global: Hershey, PA, USA, 2022; pp. 177–203. [Google Scholar] [CrossRef]
- Whig, P.; Velu, A.; Nadikattu, R. Blockchain platform to resolve security issues in IoT and smart networks. In AI-Enabled Agile Internet of Things for Sustainable FinTech Ecosystems; IGI Global: Hershey, PA, USA, 2022; pp. 46–65. [Google Scholar] [CrossRef]
- Chen, B.; Liu, D.; Zhang, T. A Blockchain-Based Security Model for IoT Systems. J. Inf. Knowl. Manag. 2022, 21, 2250004. [Google Scholar] [CrossRef]
- Liao, Z.; Pang, X.; Zhang, J.; Xiong, B.; Wang, J. Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey. IEEE Trans. Netw. Serv. Manag. 2022, 19, 1159–1175. [Google Scholar] [CrossRef]
- Wang, C.; Tan, X.; Yao, C.; Gu, F.; Shi, F.; Cao, H. Trusted Blockchain-Driven IoT Security Consensus Mechanism. Sustainability 2022, 14, 5200. [Google Scholar] [CrossRef]
- Xihua, Z.; Goyal, S. Security and Privacy Challenges using IoT-Blockchain Technology in a Smart City: Critical Analysis. Int. J. Electr. Electron. Res. 2022, 10, 190–195. [Google Scholar] [CrossRef]
- Pratik, A.; Bhattacharjee, A.; Priyadarshini, R.; Divakar, S. An IoT and blockchain-based system for acute security check and analysis. In The Role of IoT and Blockchain: Techniques and Applications; CRC Press: Boca Raton, FL, USA, 2022; pp. 285–294. [Google Scholar]
- Yu, Z.; Song, L.; Jiang, L.; Khold Sharafi, O. Systematic literature review on the security challenges of blockchain in IoT-based smart cities. Kybernetes 2022, 51, 323–347. [Google Scholar] [CrossRef]
- Santra, S.; Sharma, S.; Deyasi, A. Enhanced Security and Privacy for IoT Based Locker System Operated at Low Frequency Spectrum Using Blockchain. Commun. Comput. Inf. Sci. 2022, 1695, 56–63. [Google Scholar] [CrossRef]
- Rashid, M.; Choi, P.; Lee, S.H.; Kim, K.; Kwon, K.R. Utilizing Blockchain and Distributed Storage to Enhance Security and Privacy in the IoT Ecosystem. In Proceedings of the 2022 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), Alamein New City, Egypt, 18–21 December 2022; pp. 160–165. [Google Scholar] [CrossRef]
- Vikram, A.; Kumar, S.; Mohana. Blockchain Technology and its Impact on Future of Internet of Things (IoT) and Cyber Security. In In Proceedings of the 2022 6th International Conference on Electronics, Communication and Aerospace Technology, Coimbatore, India, 1–3 December 2022; pp. 444–447. [Google Scholar] [CrossRef]
- Alrubei, S.; Ball, E.; Rigelsford, J. Adding Hardware Security into IoT-Blockchain Platforms. In Proceedings of the 2022 IEEE Latin-American Conference on Communications (LATINCOM), Rio de Janeiro, Brazil, 30 November–2 December 2022. [Google Scholar] [CrossRef]
- Alzuabi, W.; Ismail, Y.; Elmedany, W. Privacy and Security Issues in Blockchain based IoT Systems: Challenges and Opportunities. In Proceedings of the 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakheer, Bahrain, 20–21 November 2022; pp. 258–265. [Google Scholar] [CrossRef]
- Parcha, A.; Mishra, S.; Bist, A.; Agarwal, R.; Gupta, S.; Sharma, S.; Sathyaraj, R. Implementing security in IoT systems via blockchain. Int. J. Internet Technol. Secur. Trans. 2022, 13, 85–104. [Google Scholar] [CrossRef]
- Velayudham, P.; Nagaraju, V.; Masi, S.; Chandrasekaran, S.; Kulandaivel, R.; Ramachandran, M. Blockchain-Based Internet of Things (IoT) Security for Data Sharing in Smart City Environment. In The Convergence of Artificial Intelligence and Blockchain Technologies; World Scientific: Singapore, 2022; pp. 221–241. [Google Scholar] [CrossRef]
- Sille, R.; Mahdi, H.; Choudhury, T.; Sahoo, S.; Kapoor, A.; Nanda, I.; Sharma, A. Review Study on Blockchain Frameworks for Security Issues in IoT Devices. In Proceedings of the 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 20–22 October 2022; pp. 876–881. [Google Scholar] [CrossRef]
- Cabrera-Gutierrez, A.; Castillo, E.; Escobar-Molero, A.; Alvarez-Bermejo, J.; Morales, D.; Parrilla, L. Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks. IEEE Access 2022, 10, 114331–114345. [Google Scholar] [CrossRef]
- Mathur, A.; Prakash, S. Review of Security Enhancement in IoT using Blockchain. In Proceedings of the 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), Sonbhadra, India, 17–19 June 2022; pp. 396–402. [Google Scholar] [CrossRef]
- Kumaresan, M.; Gopal, R.; Mathivanan, M.; Poongodi, T. Amalgamation of blockchain, IoT, and 5G to improve security and privacy of smart healthcare systems. In Blockchain Applications for Healthcare Informatics; Academic Press: Cambridge, MA, USA, 2022; pp. 283–312. [Google Scholar] [CrossRef]
- Jain, N.; Wahid, N.; Al-Farhani, L.; Manideep, A.; Bhardwaj, V.; Sangeeth Kumar, M. A Blockchain Approach to IoT Security and Reliability Analysis. In Proceedings of the 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), London, UK, 27–29 April 2022; pp. 758–763. [Google Scholar] [CrossRef]
- Samanta, S.; Sarkar, A.; Sharma, A.; Geman, O. Security and Challenges for Blockchain Integrated Fog-Enabled IoT Applications. Lect. Notes Netw. Syst. 2022, 427, 13–24. [Google Scholar] [CrossRef]
- Chowdhury, N.; Alam, K.; Islam, M. Security and Privacy in IoT using Blockchain and Lightweight Cryptographic Protocol. In Proceedings of the 2022 IEEE 7th International conference for Convergence in Technology (I2CT), Mumbai, India, 7–9 April 2022. [Google Scholar] [CrossRef]
- Bai, X.; Tu, S.; Waqas, M.; Wu, A.; Zhang, Y.; Yang, Y. Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage. Lect. Notes Comput. Sci. 2022, 13340, 586–597. [Google Scholar] [CrossRef]
- Psathas, A.; Iliadis, L.; Papaleonidas, A.; Bountas, D. An IoT Authentication Framework for Urban Infrastructure Security Using Blockchain and Deep Learning. Commun. Comput. Inf. Sci. 2022, 1600, 284–296. [Google Scholar] [CrossRef]
- Maiti, M.; Barman, S.; Bhagat, D. LIVECHAIN: Lightweight Blockchain for IOT Devices and It’s Security. Lect. Notes Netw. Syst. 2022, 481, 265–275. [Google Scholar] [CrossRef]
- Ali, M.; Dhanaraj, R.; Sharma, V.; Balamurugan, B. IoT and Blockchain based Smart Agriculture Monitoring and Intelligence Security System. In Proceedings of the 2022 3rd International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai, United Arab Emirates, 15–17 November 2022. [Google Scholar] [CrossRef]
- Chen, Y.; Li, M.; Zhu, X.; Fang, K.; Ren, Q.; Guo, T.; Chen, X.; Li, C.; Zou, Z.; Deng, Y. An improved algorithm for practical byzantine fault tolerance to large-scale consortium chain. Inf. Process. Manag. 2022, 59, 102884. [Google Scholar] [CrossRef]
- Xu, X.; Zhu, D.; Yang, X.; Wang, S.; Qi, L.; Dou, W. Concurrent practical byzantine fault tolerance for integration of blockchain and supply chain. ACM Trans. Internet Technol. 2021, 21, 1–17. [Google Scholar] [CrossRef]
- Alfandi, O.; Otoum, S.; Jararweh, Y. Blockchain solution for iot-based critical infrastructures: Byzantine fault tolerance. In Proceedings of the NOMS 2020–2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–4. [Google Scholar]
- Li, W.; Feng, C.; Zhang, L.; Xu, H.; Cao, B.; Imran, M.A. A scalable multi-layer PBFT consensus for blockchain. IEEE Trans. Parallel Distrib. Syst. 2020, 32, 1146–1160. [Google Scholar] [CrossRef]
- Feng, L.; Zhang, H.; Chen, Y.; Lou, L. Scalable dynamic multi-agent practical byzantine fault-tolerant consensus in permissioned blockchain. Appl. Sci. 2018, 8, 1919. [Google Scholar] [CrossRef]
- Kumar, U.; Akancha; Nancy; Pathak, N. Security Amplification of IoT: Blockchain. Lect. Notes Netw. Syst. 2022, 392, 273–287. [Google Scholar] [CrossRef]
- Fasila, K.; Mathew, S. Fast and Efficient Security Scheme for Blockchain-Based IoT Networks. Comput. Mater. Contin. 2022, 73, 2097–2114. [Google Scholar] [CrossRef]
Notations | Meaning |
---|---|
BCT | BCT Technology |
AI | Artificial Intelligence |
DoS | Denial of Service |
CC | Cloud Computing |
DDoS | Distributed Denial of Service |
API | Application Programming Interface |
IoT | Internet of Things |
DS | Data Security |
QoS | Quality of Service |
PoW | Proof of Work |
Reference | Technique | Framework | Implementation | IoT-Specific | Reliable | Stable |
---|---|---|---|---|---|---|
[48] | BCT | Authentication | N | N | N | N |
[49] | SDN | NU | N | N | N | N |
[50] | BCT and SDN | Authentication Confidentiality Integrity | N | Y | N | N |
[51] | BCT | Authentication | N | Y | N | N |
[52] | BCT | Authentication/Confidentiality | Y | N | Y | N |
[53] | SDN | Authentication | Y | Y | N | N |
[54] | SDN | Authentication/Confidentiality | N | N | N | N |
This Paper | BCT | Authentication Confidentiality Integrity | Y | Y | Y | Y |
Evaluation Dimension | DPoS | PoW | PBFT | PoS |
---|---|---|---|---|
Performance efficiency | H | L | H | L |
Fault tolerance | 50% | 50% | 33.3% | 50% |
Compliance supervision | W | W | S | W |
LF | H | H | L | H |
Request Time | u = 2 | t = 6 |
---|---|---|
n = 6 | 255.2 | 285.15 |
n = 8 | 265.2 | 321.14 |
n = 10 | 268.14 | 354.3 |
n = 12 | 269.25 | 474.2 |
n = 14 | 269.14 | 595.2 |
Step 1: Initalize R = 0 |
Step 2: If the Number of existing nodes is greater than 4, |
Calculate speaker node p |
Step 3: If R = P, Then Accept the proposal, |
Broadcast verified feedback message |
Receive the correct number of feedback messages |
Step 4: Else Verify Proposal, |
Apply for change collection with Number of nodes applied to change set |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aljumah, A.; Ahanger, T.A. Blockchain-Based Information Sharing Security for the Internet of Things. Mathematics 2023, 11, 2157. https://doi.org/10.3390/math11092157
Aljumah A, Ahanger TA. Blockchain-Based Information Sharing Security for the Internet of Things. Mathematics. 2023; 11(9):2157. https://doi.org/10.3390/math11092157
Chicago/Turabian StyleAljumah, Abdullah, and Tariq Ahamed Ahanger. 2023. "Blockchain-Based Information Sharing Security for the Internet of Things" Mathematics 11, no. 9: 2157. https://doi.org/10.3390/math11092157
APA StyleAljumah, A., & Ahanger, T. A. (2023). Blockchain-Based Information Sharing Security for the Internet of Things. Mathematics, 11(9), 2157. https://doi.org/10.3390/math11092157