ArticlePDF Available

Abstract and Figures

The blockchain is emerging as one of the most propitious and ingenious technologies of cybersecurity. In its germinal state, the technology has successfully replaced economic transaction systems in various organizations and has the potential to revamp heterogeneous business models in different industries. Although it promises a secure distributed framework to facilitate sharing, exchanging, and the integration of information across all users and third parties, it is important for the planners and decision makers to analyze it in depth for its suitability in their industry and business applications. The blockchain should be deployed only if it is applicable and provides security with better opportunities for obtaining increased revenue and reductions in cost. This article presents an overview of this technology for the realization of security across distributed parties in an impregnable and transparent way.
Content may be subject to copyright.
1
The Blockchain as a Decentralized Security Framework
By Deepak Puthal, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, and Chi Yang
The blockchain is emerging as one of the most propitious and ingenious technologies of cybersecurity. In its germinal
state itself, the technology has successfully replaced economic transaction systems in various organizations and has
the potential to revamp heterogeneous business models in different industries. Although it promises a secure
distributed framework to facilitate sharing, exchanging and integration of information across all the users and third
parties, it is important for the planners and decision-makers to analyse it in-depth for its suitability in their industry
and business applications. The blockchain should be deployed only if it is applicable and provides security with better
opportunities in obtaining increased revenue and reductions in cost. This article presents an overview of this
technology for realization of security across distributed parties in an impregnable and transparent way.
THE BLOCKCHAIN - DEFINED
After the Internet, the blockchain is considered to be the next big revolutionizing technology, as it is reinventing the
way we work and live. In 2008, the idea of blockchain was first introduced by a researcher who implemented the
digital cryptocurrency known as bitcoin, where the
blockchain is an integral part of its working [1]. Numerous
cryptocurrencies with much advanced features have come
into existence since then, such as the Ethereum which
introduces smart contracts [2]. The fundamental
characteristics of the blockchain are illustrated in Figure 1.
For several decades, we have been dealing with
information exchange, and transferral of money and other
assets through online transactions via the Internet, where
each of these transactions involved a trusted intermediary.
These intermediaries are responsible to guarantee a secure
exchange and are accountable in case of any failures or
security breaches. In a paradigm shift, the blockchain
eliminates the need of any central authority between
multiple parties executing financial and data transactions
by using an incorruptible, immutable and decentralized
public ledger. This public ledger is a distributed database
that is shared across all the network participants. It is a tamper-proof, cryptographically secured, and permanent record
of all the transactions that ever took place among the participants. They can view the transactions related to them
anytime they want, but once validated and added to the blockchain, the transactions can neither be deleted nor
modified, which makes the blockchain immutable and irreversible. Each transaction is verified by the participants by
means of pre-defined validation and consensus mechanisms without affirmation or authentication by any central
authority. This not only reduces the cost but also eliminates the chances of information loss due to a single point of
failure, since ledger copies are synchronized across all the
participants. Thus, in addition to its salient features which
include immutability, validation, decentralization and
transparency, the blockchain promises to provide privacy
and security at all points in time. Figure 2 demonstrates the
difference between centralized execution of transactions and
the decentralized blockchain system.
The concept of Software Defined Perimeter is also
receiving a lot of attention by establishing a secure channel
before communication [3], where it also works with a
centralized controler [4, 5]. There is a large number of
current research areas, such as the Cloud [6], the Internet of
Things (IoT) [7], Edge Computing [5] and Bigdata [7],
which can directly apply the blockchain to eliminate centralized controller entities. Consequently, the blockchain will
benifit several emerging applications including smart cities, banking, and the Internet of Vehicles (IoV) [8, 9].
FIGURE 1. Pivotal characteristics of blockchain.
FIGURE 2. Centralized systems with intermediaries
versus decentralized blockchain systems.
2
THE BLOCKCHAIN - HOW DOES IT WORK?
Consider a system of ‘Nusers across a network sharing information and performing exchange of assets. Instead of
relying on an intermediary among them, they agree on a protocol called a consensus algorithm, which enables them
to establish mutual trust and allows for validating the transactions on a peer-to-peer basis. Thus, the building blocks
of a blockchain-based system include the network participants, a consensus protocol such as proof-of-work,
cryptographic hashes and digital signatures.
The network participants can be individuals, organizations or institutions sharing a copy of the ledger containing
their valid transactions in a sequential order. The ledger is composed of a sequence of blocks as shown in Figure 3,
linked together by their hash values in
chronological order to maintain data integrity and
timeliness. Each block consists of a set of
transactions digitally signed by the owner and
verified by the rest of the participants before
being added to the block. Some features of the
blockchain are now discussed.
Digital Signatures: Participants wishing to
execute a transaction, broadcast it across the
network. This transaction is digitally signed by
the owner by repeated hashing of the public key
for source authentication and then broadcast for verification by other nodes.
Consensus: Since the blockchain revolves completely around decentralization, there is no trusted third party
responsible for secure storage and management of data or accountability in case of any security breaches. All
participants collect these transactions into a new block and start working on the consensus protocol to identify the
validation of the transaction. If the consensus is based on proof-of-work, each participant starts finding the appropriate
proof-of-work.
Proof-of-work: It is the value searched from a pool of values making the cryptographic hash value of the block begin
with N number of zeros. This is to render greater security plus an opportunity to win some reward points thus
providing an incentive for a participant to perform this proof-of-work calculation.
Cryptographic Hashes: When a proof-of-work is found by a participant, the block is broadcast to all participants,
which accept it by adding to their blockchain after computing a cryptographic hash such as SHA-256 for the block, to
be used as the ‘Hash_Previous’ for the next block (Figure 3). The longest chain is the trusted one and added to the
blockchain when participants receive multiple blocks simultaneously.
With the above intrinsic features as an integral part of the blockchain’s working, it promises data immutability, data
integrity, data authentication and validation, decentralization and data transparency, thus guarantying data security
across distributed systems. The blockchain is immutable. The records can be altered only if more than 51% of the
nodes are under the control of hackers, which is unsustainable. The technology is autonomous, and it maintains the
anonymity of the sender and receiver in the transaction by utilizing public and private keys of the nodes.
APPLICATIONS OF THE BLOCKCHAIN
The promising features of blockchain are disrupting multiple industries attracted towards this technology, but it is
important to analyse their suitability to the needs of each industry. It is a revolution but not a panacea for all the
business needs. If only the following situations arise, can organizations consider deploying a blockchain oriented
security solution:
(1) A group of people or multiple parties frequently generate transactions dependent on a third party.
(2) The third party cannot be trusted, and the authenticity of transactions is questionable.
(3) The validation of transactions is a priority and thus an enhanced system rendering data authenticity and integrity
is important.
(4) Data integrity over confidentiality and processing performance is important. For time-sensitive applications, the
blockchain is not appropriate as it takes time for a block to be accepted in the chain. In the case of bitcoin, this
time is approximately 10 minutes.
FIGURE 3. Structure of the chained blocks.
3
Data in the distributed public ledger is immune to any tampering as it is highly encrypted using advanced
cryptography, hence the technology finds applications in cyber security. It eliminates the usage of centralized devices
in the IoT and other forms of networking. Therefore, devices connected could update software, manage bugs and
communicated directly. The technology provides a new way of managing trust and can be effectively applied in
insurance and domains like finance, as presented in Figure 4 [10]. It eliminates the involvement of a third party; hence
it is finding effective utilization in private transport and
ride-sharing. It is envisioned that the blockchain can
have significant applications in smart healthcare with
the Internet of Medical Things (IoMT) or the Internet of
Health Things (IoHT) to provide security, privacy, and
effective insurance processing [11].
CONCLUSIONS
The blockchain is an effective solution of the centuries-
old consensus problem. Using cryptography (hashes and
digital signatures) and a system that rewards
participants, the winner of a “cryptographic lottery”
reaps the rewards while, at the same time, ensures the validity of the entire ledger. At the same time, the blockchain
is not a universal solution to any problem having to do with transaction verification and security: its implementation
must be adopted only after careful examination of the requirements of the application. The impact of the blockchain
in modern society is disruptive and the consequences of its widespread adoption are still unknown.
ABOUT THE AUTHORS
Deepak Puthal (deepak.puthal@uts.edu.au) is a Lecturer (Assistant Professor) in the Faculty of Engineering and IT
at University of Technology Sydney (UTS), Australia. His research interests include cyber security, Internet of Things,
distributed computing, and Big Data Analytics. He has a Ph.D. degree in Computer Science and Information Systems
from UTS, Australia. He received IEEE Distinguished Doctoral Dissertation Award for Excellence in STC on Smart
Computing for the year 2017. He is an author of 30 peer reviewed research articles. He is serving as an associate editor
of IEEE Consumer Electronics Magazine.
Nisha Malik (nisha.malik@student.uts.edu.au) is a Ph.D. student in the Faculty of Engineering and IT at
University of Technology Sydney, Australia. Her research interest includes Vehicular networks, Information security
and cloud computing.
Saraju P. Mohanty (saraju.mohanty@unt.edu) is a Professor at the University of North Texas. Prof. Mohanty’s
research is in Smart Electronic Systems which has been funded by National Science Foundations, Semiconductor
Corporation, and US Air Force. He authored 220 research articles, 3 books, and invented 4 US patents. His Google
Scholar h-index is 28 and i10-index is 82. He is the EiC of the IEEE Consumer Electronics Magazine. He serves as
the Chair of Technical Committee on VLSI, IEEE Computer Society. More about him is available at:
http://www.smohanty.org.
Elias Kougianos (eliask@unt.edu) is Professor in Engineering Technology at the University of North Texas. He
obtained his Ph.D. in electrical engineering from Louisiana State University in 1997. He is author or co-author of over
120 peer-reviewed journal and conference publications. He is a senior member of IEEE.
Chi Yang (chiyangit@gmail.com) received his Ph.D. in computer science at the University of Technology,
Sydney (UTS), Australia. He is a research Fellow in the Unitec Institution of Technology, Auckland, New Zealand.
His major research interests include WSN, IoT, Big Data Processing, Could Computing, parallel & distributed
computing, privacy & security and XML data streams.
REFERENCES
[1] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system.”, https://bitcoin.org/bitcoin.pdf, Last visited 11 Nov 2017.
[2] P. Bailis, A. Narayanan, A. Miller, and S. Han, Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep
learning, Communications of the ACM, Vol. 60, No. 5, 2017, pp. 48-51.
[3] D. Puthal, S. P. Mohanty, P. Nanda, and U. Choppali, Building Security Perimeters to Protect Network Systems Against Cyber Threats,
IEEE Consumer Electronics Magazine, Vol. 6, No. 4, 2017, pp. 24-27.
[4] D. Puthal, S. Nepal, R. Ranjan, and J. Chen, Threats to networking cloud and edge datacenters in the Internet of Things, IEEE Cloud
Computing, Vol. 3, No. 3, 2016, pp. 64-71.
FIGURE 4. Potential applications of the blockchain.
4
[5] D. Puthal, X. Wu, S. Nepal, R. Ranjan, and J. Chen, SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data
Streams, IEEE Transactions on Big Data, 2017, In Press.
[6] C. Yang, D. Puthal, S. P. Mohanty, and E. Kougianos, Big-Sensing-Data Curation for the Cloud is Coming, IEEE Consumer Electronics
Magazine, Vol. 6, No. 4, 2017, pp. 48-56.
[7] D. Puthal, R. Ranjan, S. Nepal, and J. Chen, IoT and Big Data: An Architecture with Data Flow and Security Issues, in Proc. of the Cloud
Infrastructures, Services, and IoT Systems for Smart Cities, 2017, pp. 243-252.
[8] S. P. Mohanty, U. Choppali, and E. Kougianos, Everything you wanted to know about smart cities, IEEE Consumer Electronics Magazine,
Vol. 5, No. 3, 2016. pp. 60-70.
[9] D. Puthal, Z. H. Mir, F. Filali, and H. Menouar, “Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks, in Proc. of
the International Conference on Connected Vehicles and Expo, 2013, pp. 887-892.
[10] Elio-David Di Iorio, 17 Blockchain Applications That Are Transforming Society, https://blockgeeks.com/guides/blockchain-applications/,
Last visited 3rd November, 2017.
[11] P. Sundaravadivel, E. Kougianos, S. P. Mohanty, and M. Ganapathiraju, “Everything You Wanted to Know about Smart Healthcare”, IEEE
Consumer Electronics Magazine (CEM), Volume 8, Issue 1, January 2018, pp. xx-yy.
... IoT has brought a new trend in networked technology that interconnects gadgets and sensors and shares information to optimize applications in urbanization, industries, and people's gadgets [1][2][3]. To a large extent, these networks are built around efficient and highly reliable means of conveying massive volumes of information to exhibit the necessary degrees of coordination and control in large, complex, and often geographically dispersed environments [4][5][6]. ...
... The importance of blockchain in distributed networks lies in its ability to provide a trustless environment where nodes can interact without relying on intermediaries. This feature is particularly valuable for peer-to-peer transactions, ensuring security, transparency, and accountability [2], [3]. ...
Article
Full-text available
Blockchain technology has emerged as a transformative solution for securing distributed networks, offering decentralized and immutable data management. However, the resilience of blockchain systems faces challenges from various security threats, including double-spending, Sybil attacks, and vulnerabilities in smart contracts. This paper explores the effectiveness of various blockchain security protocols in enhancing the security and stability of distributed networks. The study provides a comprehensive review of cryptographic techniques, consensus algorithms, and privacy-enhancing technologies, such as Zero-Knowledge Proofs and Multi-Party Computation. Through a detailed analysis of case studies involving Bitcoin, Ethereum, and Hyperledger Fabric, the paper highlights the strengths and limitations of different security protocols. Additionally, the paper discusses the future direction of blockchain security, including the impact of emerging threats such as quantum computing on current security measures. The findings emphasize the need for ongoing innovation in security protocols to ensure the long-term resilience of blockchain networks. The paper concludes with recommendations for improving the security frameworks in both public and permissioned blockchains, with a focus on scalability, privacy, and resistance to emerging attacks.
... Immutability: Refers to each transaction must be validated by a trusted miner and every block is connected to other blocks compactly. Only when hackers control more than 51% of the nodes can the records be changed [5]. Therefore, it is almost impossible to tamper with or delete the records in blockchain since these operations would destroy the consistency of blockchain system. ...
Article
Full-text available
Today, blockchain technology is no longer confined to the financial sector for which it was originally designed, but has been integrated across diverse fields, achieving noteworthy advancements. Researchers have endeavored to demonstrate the feasibility and potential of blockchain applications beyond finance. This paper introduces the characteristics and workflow of blockchain technology. It provides an overview of the current state of blockchain applications in healthcare, logistics management, and transportation, analyzing several specific examples and presenting their corresponding simplified frameworks. These frameworks are conductive to traditional sectors by offering additional functionalities. In healthcare, blockchain is utilized to enhance the security and integrity of the sensitive health data records, as well as to facilitate remote patient monitoring. In logistics management, blockchain is employed to effectively enhance data security and ensure cold chain traceability, thereby improving the transparency and reliability of supply chain operations. In transportation, blockchain supports the development of intelligent transportation systems. Due to the inherent limitations of blockchain technology, such as issues with scalability, and the specific deficiencies of certain proposed frameworks, including the inaccuracies of Body Area Sensor Networks (BSN) and the drawbacks associated with Rivest-Shamir-Adleman (RSA) encryption, these integration efforts continue to face challenges. Various approaches, such as sharding, have been proposed to address these drawbacks and improve the efficacy of blockchain implementations in these domains. Despite these challenges, the ongoing research and development efforts indicate a promising future for blockchain technology in a wide array of applications.
... One such area is homeland security, where the integration of blockchain with novel OSINT techniques, particularly through social network analysis (SNA), holds promise for enhancing security measures [13]. The emergence of blockchain technology has introduced decentralized and immutable ledgers that offer transparency, security, and trust in data transactions [14]. In the realm of homeland security, blockchain-enabled OSINT can facilitate the collection, analysis, and dissemination of intelligence data from publicly available sources. ...
Article
Full-text available
This research investigates the potential of blockchain-enabled novel open-source intelligence (OSINT) to enhance homeland security through advanced social network analysis in cyber threat intelligence (CTI). This approach aims to revolutionize intelligence gathering, analysis, and dissemination by utilizing Distributed Ledger Technology (DLT), consensus mechanisms, link prediction algorithms, clustering algorithms, zero-knowledge proofs, and intrusion detection systems.
... The most notable of attacks is the 2016 DAO attack, which resulted in more than 60 million dollars worth of Ether being stolen through a reentrancy vulnerability [14]. Prevention of these attacks is essential to the viability and confidence in a blockchain network as a secure and decentralized system [15]- [18]. ...
Article
Full-text available
In the short history of smart contracts, substantial losses have occurred due to unaccounted vulnerabilities in the smart contracts loaded onto the blockchain. Vulnerabilities in smart contracts threaten the viability and confidence of blockchain technology. Machine and deep learning architectures have been increasingly proposed to assist with writing smart contracts and detecting vulnerabilities to minimize the risks of successful attacks. This paper presents the findings of deep learning vulnerability detection in smart contracts collated from selected research papers and provides an overview of the vulnerability detection architecture. This paper assessed each component of the overall architecture, individually and in combinations, to infer potential relationships in increasing detection rates in smart contract vulnerability detection tools. This study found that the area of detecting smart contract vulnerabilities is gravitating towards deep learning models, with a particular focus on combining neural networks in serial or parallel to achieve high detection results. Feature extraction of syntax and semantic information greatly determines the detection results of a model, which suggests a strong relationship between the use of source code and neural networks. Despite this relationship, given the inaccessibility and unavailability of smart contract source code, future work should focus on efficiently extracting features and context from opcodes, which are more readily available on the blockchain. Based on these findings, the study offers an in-depth discussion of the matters arising, open issues, and key aspects such as bytecode and opcode in smart contracts, failure of attention mechanisms, the rationale of hybrid models, dataset challenges, computational complexity in a large-scale blockchain environment, optimization strategies, and interdisciplinary approaches to smart contract vulnerability detection. These discussions enhance the practical relevance of the paper, highlighting the opportunities for scaling DL models for real-world blockchain applications.
... Traditional supply chains are vulnerable to data breaches, cyber-attacks, and fraud due to centralized data storage and fragmented information sharing. Blockchain's decentralized architecture and cryptographic protocols ensure that sensitive data, such as transaction details and product specifications, are encrypted, timestamped, and shared securely among authorized parties only [62]. Smart contracts embedded within blockchain further automate and enforce contractual agreements, triggering predefined actions based on real-time IoT data inputs, such as payment releases upon successful delivery or penalties for delays [63][64]. ...
Article
Full-text available
PURPOSE: With a focus on enhancing transparency, lowering the risk of fraud, and ensuring ethical sourcing practices, this research aims to investigate how blockchain and IoT technologies can be incorporated into the diamond supply chain. This study addresses the complexities and challenges of implementing these technologies in an industry characterized by fragmented information sharing and centralized data storage. DESIGN/METHODOLOGY/APPROACH: Using both qualitative and quantitative analysis, the research uses a mixed-methods approach. While secondary data was obtained from previously published works, industry reports, and case studies, primary data was gathered through semi-structured interviews with professionals in the field. The implementation of the prototype system was carried out in three phases: Define, Operate, and Test. Ethereum was chosen for its smart contract capabilities, and various IoT sensors were deployed to monitor environmental conditions and track the real-time location of diamonds. FINDINGS: The integration of blockchain and IoT technologies significantly enhanced transparency within the diamond supply chain. The immutable nature of blockchain ensured tamper-proof records of transactions, while IoT sensors provided continuous real-time data, reinforcing transparency. The study observed a notable reduction in fraud due to the robust mechanisms of the system, which detected and prevented unauthorized alterations to the recorded data. Smart contracts automated compliance checks, ensuring adherence to ethical standards. Quantitative analysis revealed improvements in key metrics such as fraud reduction rates, transparency enhancements, and adherence to ethical sourcing standards. ORIGINALITY/VALUE: This study bridges a notable gap in existing research by focusing on the diamond supply chain. It provides comprehensive, data-driven insights and practical recommendations for industry stakeholders and policymakers. The results highlight how combining blockchain and IoT technology can improve operational efficiency, transparency, and ethical practices in the diamond business. It is also feasible and scalable. The study's methods and findings add a great deal to the body of information already in existence and provide a framework for further investigation and application in related situations.
Article
Data heterogeneity across medical centers, resulting in a coupling of universal information for classification tasks and personalized information for private dataset within local models, is still a difficult challenge in personalized federated learning (PFL). Moreover, the high interclass similarity in the private datasets affects the performance of the local models. Different from pervious works that focus on personalized aggregation or personalized adjusting the global model, we introduce the concept of decoupling universal and personalized information in local models and propose a novel PFL framework for medical image classification in this article. Specifically, we propose a decoupling strategy at the client side to efficiently utilize universal and personalized information of the local model to solve data heterogeneity. This strategy decouples the parameters of the local models into two components based on singular value decomposition (SVD), namely, the universal component (UC) and personalized component (PC). The former contains universal information for the classification task, while the latter only includes the personalized information for the client dataset. During the training process of PFL, only the UC is transmitted between the server and clients, which makes our framework has ability to save transmission resource and protect personalized information. To address the challenge of high interclass similarity in private dataset, during the network training in local clients, we apply an interclass separability (IS) loss to adaptively enlarge the angle between features of different classes in the feature space, thereby reducing the interclass similarity. Extensive experiments were conducted on a dermoscopic dataset and a glaucoma dataset, achieving accuracy rates of 87.16% and 84.64%, respectively. The results demonstrate that our proposed method outperforms nine advanced methods and achieves state-of-the-art results in the medical image classification tasks.
Chapter
In this chapter, we tackle the significant obstacles linked to closing the information gap on blockchain technology adoption, promotion, and use between small and medium-sized enterprises (SMEs), businesses, organizations, government agencies, and the general public. We specifically concentrate on the two most important issues: data privacy and cybersecurity. Through an examination of data security management systems, regulatory frameworks, and legitimate encryption techniques, we put out a strong blockchain-based storage plan. This strategy promotes confidence and accountability across multiple industries by enabling safe digital transactions when paired with smart contracts. To improve openness and efficacy in data management, our study includes components including pseudonymity, transaction traceability and data leakage and privacy enhancing techniques.
Article
Full-text available
The Internet-of-Things (IoT) has taken over the business spectrum, and its applications vary widely from agriculture and health care to transportation. A hospital environment can be very stressful, especially for senior citizens and children. With the ever-increasing world population, the conventional patient-doctor appointment has lost its effectiveness. Hence, smart health care becomes very important. Smart health care can be implemented at all levels, starting from temperature monitoring for babies to tracking vital signs in the elderly.
Article
Full-text available
Modern sensing devices play a pivotal role in achieving data acquisition, communication, and dissemination for the Internet of Things (IoT). Naturally, IoT applications and intelligent sensing systems supported by sensing devices, such as wireless sensor networks (WSNs), are closely coupled. Modern intelligent sensing systems generate huge volumes of sensing data, well beyond the processing capabilities of common techniques and tools. As a result, collecting, managing, and processing IoT big sensing data within an acceptable time duration is a new challenge for both research and industrial applications. The massive size, extreme complexity, and high speed of big sensing data bring new technical requirements including data collection, data storage, data organization, data analysis, and data publishing in real time when deploying real-world IoT applications. To better facilitate these IoT applications, the convergent research of WSNs, big data, the IoT, and cloud computing is a natural scientific development trend. In this article, we concentrate on big-sensing-data curation and preparation issues with cloud computing under the theme of the IoT. There are three especially critical issues that need to be addressed: scalable big-sensing-data cleaning, scalable big-sensing-data compression, and cloud-based data curation response for IoT device optimization. Viewed from the IoT side, all IoT sensing devices are integrated together in an adaptive solution and upload their data onto the cloud. The automatic responses from both the cloud and intelligent sensors will change the status or behavior of sensing devices and, therefore, the status of the IoT itself.
Article
Full-text available
Due to the wide variety of devices used in computer network systems, cybersecurity plays a major role in securing and improving the performance of the network or system. Although cybersecurity has received a large amount of global interest in recent years, it remains an open research space. Current security solutions in network-based cyberspace provide an open door to attackers by communicating first before authentication, thereby leaving a black hole for an attacker to enter the system before authentication. This article provides an overview of cyberthreats, traditional security solutions, and the advanced security model to overcome current security drawbacks.
Article
Full-text available
This article is a single-source introduction to the emerging concept of smart cities. It can be used for familiarizing researchers with the vast scope of research possible in this application domain. The smart city is primarily a concept, and there is still not a clear and consistent definition among practitioners and academia. As a simplistic explanation, a smart city is a place where traditional networks and services are made more flexible, efficient, and sustainable with the use of information, digital, and telecommunication technologies to improve the city's operations for the benefit of its inhabitants. Smart cities are greener, safer, faster, and friendlier. The different components of a smart city include smart infrastructure, smart transportation, smart energy, smart health care, and smart technology. These components are what make the cities smart and efficient. Information and communication technology (ICT) are enabling keys for transforming traditional cities into smart cities. Two closely related emerging technology frameworks, the Internet of Things (IoT) and big data (BD), make smart cities efficient and responsive. The technology has matured enough to allow smart cities to emerge. However, there is much needed in terms of physical infrastructure, a smart city, the digital technologies translate into better public services for inhabitants and better use of resources while reducing environmental impacts. One of the formal definitions of the smart city is the following: a city "connecting the physical infrastructure, the information-technology infrastructure, the social infrastructure, and the business infrastructure to leverage the collective intelligence of the city" [4]. Another formal and comprehensive definition is "a smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operations and services, and competitiveness, while ensuring tha- it meets the needs of present and future generations with respect to economic, social and environmental aspects" [12]. A broad overview of various components needed in a smart city is depicted in Figure 1. Any combination of various smart components can make cities smart. A city need not have all the components to be labeled as smart. The number of smart components depends on the cost and available technology.
Conference Paper
The Internet of Things (IoT) introduces a future vision where users, computer, computing devices and daily objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and benefits. We are moving towards IoT trend, where the number of smart sensing devices deployed around the world is growing at a rapid speed. With considering the number of sources and types of data from smart sources, the sensed data tends to new trend of research i.e. big data. Security will be a fundamental enabling factor of most IoT applications and big data, mechanisms must also be designed to protect communications enabled by such technologies. This paper analyses existing protocols and mechanisms to secure the IoT and big data, as well as security threats in the domain. We have broadly divided the IoT architecture into several layers to define properties, security issues and related works to solve the security concerns.
Article
Resource constrained sensing devices are being used widely to build and deploy self-organizing wireless sensor networks for a variety of critical applications such as smart cities, smart health, precision agriculture and industrial control systems. Many such devices sense the deployed environment and generate a variety of data and send them to the server for analysis as data streams. A Data Stream Manager (DSM) at the server collects the data streams (often called big data) to perform real time analysis and decision-making for these critical applications. A malicious adversary may access or tamper with the data in transit. One of the challenging tasks in such applications is to assure the trustworthiness of the collected data so that any decisions are made on the processing of correct data. Assuring high data trustworthiness requires that the system satisfies two key security properties: confidentiality and integrity. To ensure the confidentiality of collected data, we need to prevent sensitive information from reaching the wrong people by ensuring that the right people are getting it. Sensed data are always associated with different sensitivity levels based on the sensitivity of emerging applications or the sensed data types or the sensing devices. For example, a temperature in a precision agriculture application may not be as sensitive as monitored data in smart health. Providing multilevel data confidentiality along with data integrity for big sensing data streams in the context of near real time analytics is a challenging problem. In this paper, we propose a Selective Encryption (SEEN) method to secure big sensing data streams that satisfies the desired multiple levels of confidentiality and data integrity. Our method is based on two key concepts: common shared keys that are initialized and updated by DSM without requiring retransmission, and a seamless key refreshment process without interrupting the data stream encryption/decryption. Theoretical analyses and experimental results of our SEEN method show that it can significantly improve the efficiency and buffer usage at DSM without compromising the confidentiality and integrity of the data streams.
Article
Several application domains are collecting data using Internet of Things sensing devices and shipping it to remote cloud datacenters for analysis (fusion, storage, and processing). Data analytics activities raise a new set of technical challenges from the perspective of ensuring end-to-end security and privacy of data as it travels from an edge datacenter (EDC) to a cloud datacenter (CDC) (or vice versa). This article discusses the security threats in EDCs and CDCs by dividing the complete network structure into three layers: perception layer, network layer, and application layer.
Conference Paper
Vehicular Ad-hoc Networks (VANETs) are special kind of Mobile Ad-hoc Networks (MANETs). The distinctive characteristics of the VANETs include high speed of vehicular nodes and high variability in node density. Congestion detection and control protocols have been proved to be an efficient method for improving network performance and are well studied for the MANET environment. However, they often result in sub-optimal network performance for the vehicular network environment due to the specialized characteristics of VANET. In this paper we present an adaptive and distributed cross-layer congestion detection and control protocol for the VANET environment. During the congestion detection phase, information from each layer of the network protocol stack is combined and mapped on to congestion levels. In the subsequent congestion control phase parameters like contention window, transmission rate and transmit power are jointly adjusted to improve on the network performance. The effectiveness of the proposed model is evaluated through mathematical analysis and simulation-based studies.