DataPDF Available
www.data61.csiro.au
Towards an opmized BlockChain
for IoT
Raja Jurdak#*
*University of New South Wales
#CSIRO Data61
 !"
IoT security and privacy is challenging
DDOS attack on DNS
Source: Downdetector.com.
 !"
Possible Solution
 !"
BlockChain Overview
A distributed immutable time-stamped
ledger
Creates a secure network over untrusted
users
Changeable PKs as users identity introduce
high level privacy
Demands for solving a puzzle to append
blocks to the BlockChain (mining)
 !"
BlockChain challenges in IoT
BlockChain IoT
Resource Consuming Resource-constrained devices
Block mining is time
consuming
Demands low latency
Scales poorly with network size Very large scale
Bandwidth-inefficient Limited bandwidth and energy
resource
 !"
Optimising the BlockChain for IoT
Hierarchical structure
#Private centralized BlockChain at local level
#Public distributed BlockChain at overlay
#Clustered overlay topology - limited nodes
process BlockChain
 !"
IoT BlockChain Features
Separate data and transactions
flow - decreased delay
Distributed trust between CHs
reduced processing
 !"
Local
Immutable
Ledger
LBM
Smart Home
 !"
Transactions handling
CHs
Request data
Request device data
Authorization
Request data
Request data
Forwarding
Request data
Transaction to be stored
 !"
Comparison with Bitcoin Blockchain
Feature Bitcoin BlockChain Immutable Ledger Public BlockChain
$%&"' () None None
*% +', Allowed Allowed
"-% +''- Not applicable Not applicable
./ /' Symmetric /'
0-'/ ("- Private ("-


' Unicast Unicast/Mulcast
'-"'
01
 None Some
 !"
Performance evaluation – Processing
Simulations using NS3 to study the trust method - 50 nodes of which 13 are CHs
 !"
Evaluation - Accessibility threats
DDOS attack
Devices are not directly accessible
Home manager controls all
incoming and outgoing
transactions
Keylists on CHs
Target threshold of received
transactions
 !"
Accessibility threats
Dropping attack
 !"
Accessibility threats
Dropping attack
.',"'
 !"
Accessibility threats
Appending attack
Dropping attack
*-
*-
.',"'
 !"
Accessibility threats
Appending attack
Dropping attack
*-
*-
.',"' ''-/'2
 !"
-
#$'"'/30/-1'
#%1'/"0
$'"
#,-
#'''4,
#055,
#'"'-"''"'
*"'"
#$6'00"
#$-
Summary
www.data61.csiro.au
 !"(
('78"9'-"'%/'
/-//'(%
t:;<=>>?=@>AA
e B "CB"
wDE33BB"3
Thank you

File (1)

Content uploaded by Raja Jurdak
Author content
ResearchGate has not been able to resolve any citations for this publication.
ResearchGate has not been able to resolve any references for this publication.