Content uploaded by Raja Jurdak
Author content
All content in this area was uploaded by Raja Jurdak on May 09, 2017
Content may be subject to copyright.
www.data61.csiro.au
Towards an opmized BlockChain
for IoT
Raja Jurdak#*
*University of New South Wales
#CSIRO Data61
!"
IoT security and privacy is challenging
DDOS attack on DNS
Source: Downdetector.com.
!"
Possible Solution
!"
BlockChain Overview
•A distributed immutable time-stamped
ledger
•Creates a secure network over untrusted
users
•Changeable PKs as users identity introduce
high level privacy
•Demands for solving a puzzle to append
blocks to the BlockChain (mining)
!"
BlockChain challenges in IoT
BlockChain IoT
Resource Consuming Resource-constrained devices
Block mining is time
consuming
Demands low latency
Scales poorly with network size Very large scale
Bandwidth-inefficient Limited bandwidth and energy
resource
!"
Optimising the BlockChain for IoT
Hierarchical structure
#Private centralized BlockChain at local level
#Public distributed BlockChain at overlay
#Clustered overlay topology - limited nodes
process BlockChain
!"
IoT BlockChain Features
•Separate data and transactions
flow - decreased delay
•Distributed trust between CHs –
reduced processing
!"
Local
Immutable
Ledger
LBM
Smart Home
!"
Transactions handling
CHs
Request data
Request device data
Authorization
Request data
Request data
Forwarding
Request data
Transaction to be stored
!"
Comparison with Bitcoin Blockchain
Feature Bitcoin BlockChain Immutable Ledger Public BlockChain
$%&"' () None None
*% +', Allowed Allowed
"-% +''- Not applicable Not applicable
./ /' Symmetric /'
0-'/ ("- Private ("-
' Unicast Unicast/Mulcast
'-"'
01
None Some
!"
Performance evaluation – Processing
Simulations using NS3 to study the trust method - 50 nodes of which 13 are CHs
!"
Evaluation - Accessibility threats
DDOS attack
•Devices are not directly accessible
•Home manager controls all
incoming and outgoing
transactions
•Keylists on CHs
•Target threshold of received
transactions
!"
Accessibility threats
Dropping attack
!"
Accessibility threats
Dropping attack
.',"'
!"
Accessibility threats
Appending attack
Dropping attack
*-
*-
.',"'
!"
Accessibility threats
Appending attack
Dropping attack
*-
*-
.',"' ''-/'2
!"
•-
#$'"'/30/-1'
#%1'/"0
•$'"
#,-
#'''4,
#055,
#'"'-"''"'
•*"'"
#$6'00"
#$-
Summary
www.data61.csiro.au
!"(
('78"9'-"'%/'
/-//'(%
t:;<=>>?=@>AA
e B "CB"
wDE33BB"3
Thank you