Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-319-94370-1_1guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Blockchain-Based Decentralized Security Architecture for IoT

Published: 25 June 2018 Publication History

Abstract

Advances in the Internet of Things (IoT) computing paradigm have made it a popular solution covering many areas such as smart cities, connected vehicles, smart farming etc. to provide major economic benefits, reduced resource consumption, smarter environments and increased sharing of resources among other advantages. However, the security issues arising from the scale of connectivity and heterogeneity of resources in IoT make it a hot target for attackers, where centralized security solutions fall short. The vulnerabilities in providing proper device authentication and data integrity in IoT networks have been shown to introduce devastating effects. This calls for designing a data security architecture for IoT, which can accurately authenticate devices by anyone in the network in a decentralized manner and prevent unauthorized modification of the stored data. In this paper, we propose a blockchain-based approach for IoT systems that introduces transparency and tamper-resistance into data storage and retrieval in IoT networks. Evaluation of a developed prototype demonstrates that the proposed solution is promising to present a unified framework for IoT data security.

References

[1]
Barcelona: Barcelona ciutat digital. http://ajuntament.barcelona.cat/digital/ca. Accessed Mar 2018
[2]
Capossele, A., Cervo, V., Cicco, G.D., Petrioli, C.: Security as a CoAP resource: an optimized DTLS implementation for the iot. In: IEEE ICC, pp. 549–554 (2015)
[3]
European Commission: IDC and TXT solutions, smart 2013/0037 cloud and iot combination, study for the european commission. http://www.telit2market.com/wp-content/uploads/2015/02/TEL_14016_P_112-114.pdf. Accessed Mar 2018
[4]
Dorri, A., Kanhere, S.S., Jurdak, R.: Towards and optimized blockchain for IoT. In: 2nd ACM/IEEE IoTDI, pp. 173–178 (2017)
[5]
Dyn: Dyn analysis summary of friday october 21 attack. https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/. Accessed Mar 2018
[6]
Eastlake, D., Hansen, T.: US Secure Hash Algorithms. RFC 6234, RFC Editor, May 2011
[7]
Gartner: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016. https://www.gartner.com/newsroom/id/3598917. Accessed Apr 2018
[8]
Globe, B.: If the CIA can compromise our gadgets, can others do the same? https://www.bostonglobe.com/business/2017/03/08/wikileaks-hits-cia-secrecy-software-spying/EQdLVwseMu70HEYlZcowOO/story.html. Accessed Mar 2018
[9]
Greenberg, A.: Hackers remotely kill a jeep on the highway with me in it. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/. Accessed Mar 2018
[10]
Gross H, Hölbl M, Slamanig D, and Spreitzer R Reiter M and Naccache D Privacy-aware authentication in the internet of things Cryptology and Network Security 2015 Cham Springer 32-39
[11]
NIST Network Working Group: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280, RFC Editor, May 2008
[12]
Kelley, M.B.: The stuxnet attack on iran’s nuclear plant was ’far more dangerous’ than previously thought. http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11. Accessed Mar 2018
[13]
Laurence, T.: Blockchain for dummies. For Dummies (2017)
[14]
Modadugu, N., Rescorla, E.: The design and implementation of datagram TLS. In: Network and Distributed System Security Symposium (NDSS) (2004)
[15]
Moinet, A., Darties, B., Baril, J.L.: Blockchain based trust & authentication for decentralized sensor networks. CoRR abs/1706.01730 (2017)
[17]
Research, F.: A Mix of New and Existing Technologies Help Secure IoT Deployments. Technical report, Forrester Research (Q1 2017)
[18]
Skarmeta, A., et al.: A decentralized approach for security and privacy challenges in the internet of things. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 67–72 (2014)
[19]
Road Traffic Technology: M42 active traffic management scheme, birmingham. http://www.roadtraffic-technology.com/projects/m42/. Accessed Mar 2018
[20]
Ukil, A., Bandyopadhyay, S., Pal, A.: Iot-privacy: to be private or not to be private. In: INFOCOM Computer Communications Workshops, pp. 123–124 (2014)

Cited By

View all
  • (2023)Information construction of construction project management based on internet of things blockchainSecurity and Privacy10.1002/spy2.2216:2Online publication date: 5-Mar-2023
  • (2020)Blockchain Federation Enabled Trustable Internet of ThingsServices – SERVICES 202010.1007/978-3-030-59595-1_5(61-76)Online publication date: 22-Jun-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Internet of Things – ICIOT 2018: Third International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
Jun 2018
192 pages
ISBN:978-3-319-94369-5
DOI:10.1007/978-3-319-94370-1

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 25 June 2018

Author Tags

  1. Data integrity
  2. Blockchain
  3. IoT security
  4. Verification

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Information construction of construction project management based on internet of things blockchainSecurity and Privacy10.1002/spy2.2216:2Online publication date: 5-Mar-2023
  • (2020)Blockchain Federation Enabled Trustable Internet of ThingsServices – SERVICES 202010.1007/978-3-030-59595-1_5(61-76)Online publication date: 22-Jun-2020

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media