Conference PaperPDF Available

IOT Security Issues Via Blockchain: A Review Paper

Authors:

Abstract and Figures

In the past few years block chain has gained lot of popularity because blockchain is the core technology of bitcoin. Its utilization cases are growing in number of fields such as security of Internet of Things (IoT), banking sector, industries and medical centres. Moreover, IoT has expanded its acceptance because of its deployment in smart homes and city developments round the world. Unfortunately, IoT network devices operate on limited computing power with low storage capacity and network bandwidth. Thus, they are extra close to attacks than other end-point devices such as cell phones, tablets, or PCs. This paper focus on addressing significant security issues of IoT and maps IoT security issues in contradiction of existing solutions found in the literature. Moreover issues that are not solved after implementation of blockchain are highlighted.
Content may be subject to copyright.
IOT Security Issues Via Blockchain: A Review Paper
Abid Sultan
Department of CS & IT
University of Sargodha, Sub-
Campus Bhakkar, Pakistan
+92-453-220072
Abidsultan006@gmail.com
Muhammad Azhar Mushtaq
Department of CS & IT
University of Sargodha, Sub-
Campus Bhakkar, Pakistan
+92-453-220072
Azhar.mushtaq@uos.edu.pk
Muhammad Abubakar
Department of CS & IT
University of Sargodha, Sub-
Campus Bhakkar, Pakistan
+92-453-220072
Abubakar.shibly@gmail.com
ABSTRACT
In the past few years block chain has gained lot of popularity
because blockchain is the core technology of bitcoin. Its
utilization cases are growing in number of fields such as security
of Internet of Things (IoT), banking sector, industries and
medical centres. Moreover, IoT has expanded its acceptance
because of its deployment in smart homes and city developments
round the world. Unfortunately, IoT network devices operate on
limited computing power with low storage capacity and network
bandwidth. Thus, they are extra close to attacks than other end-
point devices such as cell phones, tablets, or PCs. This paper
focus on addressing significant security issues of IoT and maps
IoT security issues in contradiction of existing solutions found in
the literature. Moreover issues that are not solved after
implementation of blockchain are highlighted.
CCS Concepts
Computer systems organization Embedded and cyber-
physical systems Embedded systems.
Networks Network properties Network reliability
Keywords
Blockchain, IoT, Network Security, Data security, LLNs &POW
1. INTRODUCTION
In today’s era, technologies have revolutionized the living
standard of our society. This is often because of innovation in
communication and semiconductor technologies, which permit
devices to be connected over a network and alter the way of
connectivity between machines and humans. Such a trend is
usually noted as Internet-of-Things (IoT) [15].
With the fast rise of brilliant devices and high-speed networks,
the IoT has gained wide acceptance and fame because it uses the
standard called low-power lossy networks (LLNs). These LLNs
have the potential to use the limited resource by consuming very
low power [1] [2]. The devices in IoT may be controlled
remotely to perform the specified function. The data sharing
among the devices takes place through the network that uses the
standard protocols of communication. The well-connected
devices or “things” vary from easy wearable accessories to huge
machines which contain detector (Sensor) chips [14].
However, as it becomes popular the connectivity between
devices is increasing, and also the computing infrastructure can
become additionally complicated. This complication can give a
rise to vulnerabilities for the cyber-attacks. In IoT, the physical
devices are placed in unsecured environments which could be
defenceless from hackers thus giving them the opportunity to
alter the information that transmits over the network. Therefore,
device authorizations and information root would be a vital issue.
In last few years blockchain has begun as the technology that
have many characteristics to solve different issues faced by IoT
network devices. Blockchain keeps a distributed database of
records. In which proof of work between the network nodes is
completely deprived of a
third party. This will help in solving the problem of single point
of failure. Network transaction records are immutable and can be
founded via the history of IoT network which finally helps to get
the attraction by trust of public in the IoT network. This Public
trust have a vital role for the public financial transactions,
introductory for a new world of distributing economy in the
Internet of Things domain [8] [14] [3] [18].
The blockchain is sequences of blocks that hold all transaction
record occuring in a blockchain network. As described in
figure.1 each block contains block header and block body/
transaction counter. Block header contains the following;
1. Block version which indicates the software version
and validation rules.
2. Merkle Tree root hash represents the hash value of
the transaction and summary of all transaction.
3. Timestamp consists of current universal time since
January 1970.
4. N-Bits define the number of bits required for
transaction verification.
5. Nonce is any 4-byte number which starts from 0 and
increases for every hash of the transaction.
6. Parent block hash holds the hash value which
indicates the previous block.
Transaction counter is capable of covering all the transaction and
a maximum number of the transaction depends upon the block
size [12].
Blockchain technology referred as a public ledger and all
completed transactions are recorded in a list of blocks. This
chain of blocks grows as new blocks are added to chain
continuously. Public key cryptography and distributed consensus
algorithms implemented for user security. The blockchain
technology has key characteristics of decentralization,
persistency, anonymity, and auditability. With these
characteristics, blockchain can save the cost and increases the
effectiveness [12].
This paper is ordered as follows. Section 2 covers the
Blockchain properties where as section 3 highlights its
characteristics. Different security necessities and issues are
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. Copyrights
for components of this work owned by others than ACM must be
honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior
specific permission and/or a fee. Request permissions from
Permissions@acm.org.
ICBCT 2019, March 1518, 2019, Honolulu, HI, USA
© 2019 Association for Computing Machinery.
ACM ISBN 978-1-4503-6268-9/19/03…$15.00
DOI: https://doi.org/10.1145/3320154.3320163
60
covered in section 4 and section 5 provides the solution of
security issues using blockchain. Section 6 describes the
problems that are not solved by blockchain. Finally in Section 7
conclusion and future work is presented.
Figure 1. Block Architecture [12].
2. BLOCKCHAIN PROPERTIES
2.1. Blockchain Working Steps
1. Nodes communicate with the blockchain network via a
combination of private & public keys. Theuserusesitsown
private key to digitally sign its own transactions and then can
access the network via the public key. Each signed transaction is
broadcast by a node that makes the transaction [3].
2. The transaction is then verified by all nodes within the
blockchain network except the node that makes the transaction.
During this step, any invalid transactions are discarded. It’s
known as verification.
3. Mining is the third step in which every legitimate transaction
is collected by the network nodes during a fixed time into a
block and implements a proof-of-work to find a nonce for its
block. Once a node finds a nonce, it broadcasts the block to all
participating nodes [4].
4. Each node collects a newly generated block and confirms
whether the block contains (a) legal transactions and (b) declares
the accuracy of parent block by utilizing the hash value. After
the completion of confirmation, nodes will add the block to the
blockchain and apply the transactions to bring the blockchain
up-to-date. In case, if the block is not confirmed, the projected
block is rejected. This ends the existing mining round [3].
2.2. Verification
Blockchain technology ensures the elimination of the duplication
issues by taking assistance from asymmetric cryptography which
contains a public and a private key. The private key is kept
secret from other nodes whereas the public key is shared among
all other nodes [5]. Moreover, the transaction (step 1) is digitally
signed by a node that creates the transaction which is
broadcasted to the entire blockchain network. All receiving
nodes will verify the transactions by decrypting the signature
with a public key of the initializing node. The transaction is
verified by the verification of signature which indicates the
initializing node is not modified.
2.3. Proof-of-Work (POW)
The proof-of-work (figure 2) contains the process of finding a
value that is hashed with Secure Hash Algorithm 256. The
typical work needed is exponential within the variety of zero bits
needed and confirmed by running the hash algorithm. In an
exceeding blockchain network, all nodes implement the proof-
of-work for every mining process by increase a nonce value
within the block till a value is founded that offers the block’s
hash desired bits. Once the system unit effort has been spent to
satisfy the proof-of-work, the block can't be modified until not
redoing the work.
Blockchain feature distributed IoT information management can
provide users the choice of sharing the information with third
party entities. The target is to supply a distributed information
access model for IoT, that ensures that user-data isn't assigned to
centralized entities or corporations [4].
Figure 2. Proof of Work.
3. CHARACTERISTICS OF BLOCKCHAIN
3.1. Decentralization
In centralized transaction processing environment, each
transaction needs to be validated through the centralized trusted
party (e.g., banking system), that result into high-cost and low
performance at the central point. With respect to the centralized
IoT model, the third party is no longer needed in the blockchain.
Consensus algorithms in blockchain are used to maintain data
integrity and consistency [12].
3.2. Persistency
Once a transaction record is validated by a miner node (special
nodes that validate the transaction) in a blockchain network its
copy is broadcast on the entire network and that record is not
deleted or rollback from entire blockchain [12].
3.3. Anonymity
In Blockchain, nodes interact with the network using a public
key that addresses the node on the entire blockchain network by
keeping the real identities of the user as a secret [12].
3.4. Security
Blockchain uses the asymmetric cryptographic technique to
secure the entire network. Asymmetric or public key
cryptography contain 2 keys one public key and second private
key. The public key is used by the node to address the
blockchain network and the private key is used by the node to
sign the transaction that it initiates. The identity of transaction
creator node is verified by using its public key.
3.5. Scalability or More Addressing Space
AS scalability is concerned blockchain contains 160-bit address
space as compared to 128 bit in IPv6. These 160-bits are
generated by ECDSA (Elliptic Curve Digital Signature
Algorithm). Blockchain has 4.3 billion more Addresses over
IPv6 [8].
61
3.6. Resilient Backend
Every distributed node within the blockchain IOT network
maintains a replica of the whole ledger. This helps in
safeguarding the network form any potential failures and attacks
[10].
3.7. High Efficiency
Since the transaction removes the involvement of the third party
and may proceed in low-trust condition, the time spent to verify
a transaction will be decreed whereas the efficiency will be
increased [11].
3.8. Transparency
Changes made to public blockchain network are publicly
viewable by all participants in the network. Moreover, all
transactions are immutable, meaning they cannot be altered or
deleted [9].
3.9. Smart Contract
The smart contract is one of the most efficient aspects of the
Ethereum introduced by Nick Szabo in 1994 [7]. Using smart
contract programs are written in which access rights and
different policies are defined. Many programming languages are
supported by Ethereum to write smart contracts such as Solidity
[13].
4. SECURITY NECESSITIES FOR IOT
OR ISSUES
4.1. Data Privacy
Because of a diversified integration of services and network, the
data recorded on a device is vulnerable to attack by
compromising nodes existing in associate IoT network.
Moreover, an attacker can access the data without owner
permission [14].
4.2. Data Integrity
In a centralized client-server model, the attacker may gain
unauthorized access to the network and change the original data
or information and forward it. For example, X sends data to Y,
Z the middle guy might get data first and forward the data after
modification [14].
4.3. Third Party
Data collected in a centralized environment is stored and
controlled by a third centralized entity that may miss use this
data or provide it to someone else.
4.4. Trusted Data Origin
In IoT environment, it is difficult to know the origin of data and
data might be altered during the transmission by anyone.
4.5. Access Control
Access control is one off the main issue in IoT network. It is
difficult to define in IoT network that which node has the right
to access and perform a different function with data.
4.6. Single Points of Failure
Continuous growth of centralized networks for the IoT based
infrastructure could expose single-points-of-failure. As all data
of the entire network is stored and verified by a central authority
in the case, if the central point fails or goes down the whole
network is disturbed [14].
4.7. Scalability
IoT connects a large number of sensors and other devices for
information sharing and a large number of applications via the
internet. It challenges the structure and the rapid growth of the
system to meet scalability.
4.8 Illegal use of Personal Data.
IoT device are basically sensors and implanted chips that gather
individual, important information and convey it through the
internet. The gathered information is stored in a central database
of any firm. This data exposes the personal performance of users;
confidentiality of users is at risk as firms might use the data
illegally [16] [6]. An example of such confidentiality misuse is
PRISM Surveillance program.
4.9 IOT Network Information Sharing.
The information gathered by IoT network devices are recorded
distinctly for the purpose of analysis. Information sets may
contain IoT devices network data load or their functioning logs.
To confirm the efficiency of tools and tests, open accessibility of
information plays a vital role. So, every time these information
sets are openly shared their integrity is significant.
5. BLOCKCHAIN SOLUTIONS FOR IOT
5.1. Data Integrity
The blockchain is a peer-to-peer network in which all nodes
have the same copy of records. When a transaction is initiated,
initiator node signs the transaction with its private key and sends
to other nodes for validation. All other miner nodes take part
invalidation process and try to find nonce. The node which finds
the nonce first has the right to validate and get a reward.
Moreover, the newly created block will be broadcasted to all
other nodes of the entire network. Once the record is loaded in
blockchain it cannot be modified or deleted [10].
5.2. Data Privacy
Consortium blockchain used to provide data privacy in a
blockchain network. As in figure.3,nodes used for a particular
purpose are combined together to form a private
network/sidechain. Each sidechain is responsible to manage its
own IoT data. Nodes that are participating in one sidechain are
not allowed to take part in the validation process of other
sidechains. In order to access the data of consortium blockchain
network the node first need to register and become part of that
sidechain network. Consortium blockchain has access control
and prevents unauthorized access [6].
Figure 3. Consortium Blockchain Network.
5.3. Addressing Space
Blockchain contains 160-bit address space as compaired to 128
bit in IPv6. These 160-bits are generated by ECDSA (Elliptic
Curve Digital Signature Algorithm). Blockchain has 4.3 billion
more addresses than IPv6 thus providing more addressing
spacing than IPV6 address [8].
62
5.4. Trusted Accountability.
Every operation record must be uploaded to the blockchain
network. This gives every operation an identity and each
operation is traceable. When an abnormal behaviour is detected
in an entity, blockchain will be used for an additional
investigation [10].
5.5. Fault Tolerance
Decentralized devices are less likely to fail accidentally because
they rely on many separate components. The blockchain is a
point to point decentralizing network, in it, every device has the
same copy of a record that’s why the failure of a single node has
no effect on the network. So, blockchain prevents from a single
point of failure.
5.6. Trusted Data Origin
In order to track data in the blockchain network, a unique id is
assigned to each IoT device. Data collected from a device is
associated with its id and after calculating a hash on data, the
data is submitted to the entire network. This becomes the basis
for trusted data origin [10].
5.7. Removing Third-Party Risks
Blockchain technology makes the devices capable of performing
operations without the intermediary or third party, thus making it
risk-free from a third party [4].
5.8. Access Control
By using smart contract, programs for blockchain can be
developed in which access rights and different policies are
defined. Example a rule is set when the meter reaches to 135
KW, devices will enter in energy saving mode [7].
5.9 Illegal Use of Personal Data.
Illegal use of personal data can be prohibited with the use of
blockchain. As Blockchain Peer to Peer (P2P) storing systems
can verify and record all actions accomplished on IoT network
data [16]. The aim is to deliver decentralized storage wherever
operators can have command over their data as an alternative of
any centralized intermediary authority. So the privacy is more
stretched to numerous levels [6] where ‘Consortium blockchain’
for IoTs is proposed.
5.10 IOT Network Information Sharing.
As the size of IOT network information sharing is increasing,
thus the fundamental storage cost will also increase. So
information sets are kept in distant origins and a centralized
server is preserved which will lonely kept the references to these
origins. Moreover Blockchain is used to keep RIM (Reference
Integrity Matrix) of information set. As the Blockchains have
Immutability feature, and accessibility of the RIM with all IoT
network devices in Blockchain, ensured the Integrity of RIM.
Every time an obligatory Information Set is taken from the
origin, its Integrity can be confirmed by comparing its RIM
being maintained on Blockchain [17].
In Table 1 characteristics of blockchain are highlighted through
which problems of IoT can be tackled.
6. BLOCKCHAIN IMPLEMENTATION
PROBLEMS.
Anonymity
Blockchain is a distributed network; anonymity is significant to
protect privacy. Appropriately, blockchain provides
pseudonymity means the users don’t have a real-world ID. The
users have a Public key which is used to achieve transactions on
this distributed network. Using this ID a user can be found via a
combination of these Ids and IP addresses related with them.
Moreover, when a user uses more than one Public key it can be
traced by checking whether the different addresses belong to the
same user. Solution to the Anonymity is a future work [16].
7. CONCLUSION
This paper aims to present the literature review on Blockchain
and Internet of Things and emphasised issues linked to an IoT
atmosphere. IoT is the next immerging technology with the rise
of high-speed network and intelligent network devices.
Unfortunately, IoT devices are more prone to attacks and unable
to protect themselves. In this paper, the different properties and
characteristics of the blockchain network are highlighted such
order to remove the issues in IoT. Moreover issues that are not
solved after implementation of blockchain are highlighted.
7.1 Future Work
We further aim to practically implement blockchain
properties on the internet of things for monitoring, error
discovery, and automatic fault correction in high critical
IoT systems. Moreover, simulation-based performance
assessment can be conduct to demonstrate the scalability
and effectiveness of the blockchain-based solutions.
Furthermore, as IoT devices are in openly reachable areas
and actually below the control of an opponent, a
blockchain based solution can be implemented that will
assure the safety and confidentiality of the information kept
in the devices. This will also address in decreasing the
option of the hardware and software of an IoT device
from being compromised if the device is accessible to
everyone.
63
Table.1 IoT issues and Blockchain characteristics that solve them
IOT
Issues
Blockchain Characteristics
Decartelization
Persistency
Scalability
or More
Addressing
Space
Resilient
Backend
High
efficiency
Transparency
Smart
contract
Data
Privacy
Data
Integrity
Third party
Trusted
Data
Origin
Access
control
Single
Points of
Failure
Scalability
Illegal use
of Personal
Data
64
8. REFERENCES
[1] L. Atzori, A. Iera and G. Morabito (2010) ‘The Internet of
Things: a survey’, Computer Networks 54 27872805.
[2] D. Giusto, A. Iera, G. Morabito and L. Atzori (2014) ‘The
Internet of Things’, 20th Tyrrhenian Workshop on Digital
Communication, Springer Publishing Company,
Incorporated.
[3] K. Christidis and M. DevetsikIoTis, (2016) ‘Blockchains
and Smart Contracts for the Internet of Things,’ IEEE
Access, vol. 4, pp. 22922303.
[4] S.Nakamoto.(2008).’Bitcoin:A.PeertoPeer.electroniccashs
ystem,’https://bitcoin.org/bitcoin.pdf.
[5] M. Pilkington. (2016).’Blockchain technology: Principle
and applications,’ Research Handbook on Digital
Transformations.
[6] M.S. Ali, K. Dolui and F. Antonelli, (2017) ‘IoT data
privacy via blockchains and IPFS’ International
Conference on the Internet of Things (ACM, New York).
[7] M. Gord,(2016), Smart Contracts Described by Nick
Szabo 20 Years ago now becoming Reality, Bitcoin
Magazine.
[8] A. M. Antonopoulos, (2014). ‘Mastering Bitcoin. First
Edition’. O’Reilly Media,USA.
[9] T. Chollet, J. Castiaux, M.Bruneton and L.
Sainlez(2013),(2015),(2016),’Continuous interconnected
supply chain using blockchain and internet of things
supply chain traceability’ , deloitte blockchain.
[10] X.Liang, J.Zhao, S.Shetty and, D.Li, (2017) ,‘Towards
data assurance and resilience in IoT using blockchain’,
Conference Paper.
[11] Yu Zhang and Jiangtao Wen (2015), ‘An IoT electric
business model based on the protocol of bitcoin’. ICIN.
IEEE, pp. 184191.
[12] Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang (2017),
An overviewof blockchain technology: Architecture,
consensus,and future trends.’,Big Data (Big DataCongress)
IEEE International.
[13] Seyoung Huh, Sangrae Cho and Soohyung Kim
(2017),’Managing IoT Devices using Blockchain
Platform’, ICACT2017 February 19 ~ 22.
[14] M.A. Khan and K. Salah (2017) ‘IoT security: Review,
blockchain solutions, and open challenges’, Future
GenerationComputer.Systems,
https://doi.org/10.1016/j.future.2017.11.022
[15] M. Banerjee, J. Lee and K.-K.R. Choo (2017),’A
blockchain future to Internet of Things security: A
position paper, Digital Communications and
Networks,doi: 10.1016/ j.dcan.2017.10.006.
[16] M. Conoscenti, D. Torino, A. Vetr, D. Torino, and J. C.
De Martin , (2016) Blockchain for the Internet of
Things : a Systematic Literature Review,’ IEEE/ACS 13th
International Conference of Computer Systems and
Applications (AICCSA)
[17] M Banerjee, J. Lee, and K. K. R. Choo (2018). A
Blockchain future for internet of things security: a
position paper,’ Digit. Commun. Networks, vol. 4, no. 3,
pp. 149160.
[18] Swan, (2015). ‘Blockchain Blue Print for a new economy.
First Edition’ O’Reilly Media,USA.
65
... With Proof of Work, centralized third parties that control the entire network in a centralized design are eliminated. It is useful in addressing the IoT security issues shown in Table 1 [8] Consequently, the purpose of this article is to propose answers for the problems of accountability, data privacy, and traceability using the blockchain. ...
... By doing this, the message is delivered only once. Table.1 IoT issues solution with Blockchain features [8]. ...
... Blockchain IoT Data Privacy[8]. ...
Article
Full-text available
The term "Internet of Things" (IoT) refers to a situation in which intelligent things are linked to a network or the internet. IoT objects have become more prevalent over the past several years in many industries, and fields, and are now used in all facets of our life. The privacy of data is a crucial problem as the number of devices rises. Researchers in this discipline have employed a variety of strategies to address this issue. Regrettably, there is less accountability, data protection, and traceability with these solutions. In this study, a blockchain-based network architecture for accountability, privacy, and traceability is designed (TDA). Blockchain technologies are referred to as a distributed ledger of transaction records, which time-stamped information about a transaction's lifetime. Persistence, decentralization, and audibility are three of blockchain's key characteristics. The budget is reduced and efficiency is increased thanks to these characteristics. This study also discusses the performance of the suggested architecture in order to strengthen the TDA architecture.
... Data exchange between devices is facilitated by the network through the use of standard communication protocols. According to Sultan et al. [32] , the networked "things" come in a variety of sizes, from tiny wearables to large machines equipped with detector (Sensor) chips. Data from IoT devices are processed by a gateway before being sent over the internet to remote servers, clouds, or data centres for software applications. ...
... The functioning of blockchain technology and smart contracts in the IoT has been studied by Sultan et al. [32] They have given a comprehensive explanation of the operation of a blockchain network, including the interactions between transacting parties. Furthermore, writers have demonstrated how the blockchain with IoT might facilitate service sharing among users, perhaps leading to the creation of a device-to-device marketplace. ...
Article
Full-text available
Given that they are employed in several services, wearable technology is growing in popularity. The wristwatch gathers several types of personal information. Consumers may find gadgets convenient, but there are also security dangers that alert users to the possibility of cybersecurity breaches, device intrusions, and vulnerability-exploiting. Hacking may make the collected data visible since devices are vulnerable to assault. Issues with these devices include security flaws, Bluetooth troubles, and the absence of authentication and location tracking. The Internet of Things (IoT) includes wearable gadgets as cogs in the wheel that might have an effect on the banking and financial industries. Therefore, since blockchain technology has gained a lot of attention recently and is now one of the most popular ways to securely transfer data through decentralised peer-to-peer systems, it is imperative to employ its security capabilities on the existing IoT-based wearable payment system. A secure, decentralised transaction execution process is made possible by blockchain, an unchangeable ledger. It has a great reputation and more customers thanks to its complex yet safe technique. Based on blockchain technology, this research suggested a secure wearable device payment system.
... Data exchange between devices is facilitated by the network through the use of standard communication protocols. According to Sultan et al. [30] , the networked "things" come in a variety of sizes, from tiny wearables to large machines equipped with detector (Sensor) chips. Data from IoT devices are processed by a gateway before being sent over the internet to remote servers, clouds, or data centres for software applications. ...
... The functioning of blockchain technology and smart contracts in the IoT has been studied by Sultan et al. [30] They have given a comprehensive explanation of the operation of a blockchain network, including the interactions between transacting parties. Furthermore, writers have demonstrated how the blockchain with IoT might facilitate service sharing among users, perhaps leading to the creation of a device-to-device marketplace. ...
Preprint
Full-text available
Given that they are employed in several services, wearable technology is growing in popularity. The wristwatch gathers several types of personal information. Consumers may find gadgets convenient, but there are also security dangers that alert users to the possibility of cybersecurity breaches, device intrusions, and vulnerability-exploiting. Hacking may make the collected data visible since devices are vulnerable to assault. Issues with these devices include security flaws, Bluetooth troubles, and the absence of authentication and location tracking. The Internet of Things (IoT) includes wearable gadgets as cogs in the wheel that might have an effect on the banking and financial industries. Therefore, since blockchain technology has gained a lot of attention recently and is now one of the most popular ways to securely transfer data through decentralised peer-to-peer systems, it is imperative to employ its security capabilities on the existing IoT-based wearable payment system. A secure, decentralised transaction execution process is made possible by blockchain, an unchangeable ledger. It has a great reputation and more customers thanks to its complex yet safe technique. Based on blockchain technology, this research suggested a secure wearable device payment system.
... Overviews and reviews of IoT-BC integration and use-cases can be found in [27][28][29]. Sultan et al. [29] and Kumar et al. [30] additionally investigated issues encountered after IoT blockchain integration, focusing on aspects like system efficiency in terms of resource limitations and scalability. Chowdhury et al. [27] reviewed blockchain-based platforms from the perspective of IoT use cases. ...
... Overviews and reviews of IoT-BC integration and use-cases can be found in [27][28][29]. Sultan et al. [29] and Kumar et al. [30] additionally investigated issues encountered after IoT blockchain integration, focusing on aspects like system efficiency in terms of resource limitations and scalability. Chowdhury et al. [27] reviewed blockchain-based platforms from the perspective of IoT use cases. ...
Article
Full-text available
The adoption of blockchain platforms to bolster the security of Internet of Things (IoT) systems has attracted significant attention in recent years. Currently, there is a lack of comprehensive and systematic survey papers in the literature addressing these platforms. This paper discusses six of the most popular emerging blockchain platforms adopted by IoT systems and analyses their usage in state-of-the-art works to solve security problems. The platform was compared in terms of security features and other requirements. Findings from the study reveal that most blockchain components contribute directly or indirectly to IoT security. Blockchain platform components such as cryptography, consensus mechanism, and hashing are common ways that security is achieved in all blockchain platform for IoT. Technologies like Interplanetary File System (IPFS) and Transport Layer Security (TLS) can further enhance data and communication security when used alongside blockchain. To enhance the applicability of blockchain in resource-constrained IoT environments, future research should focus on refining cryptographic algorithms and consensus mechanisms to optimise performance and security.
... For example, [35] discusses the need to incorporate cryptographic blockchain technology to improve IoT security. According to [29], unauthorized use of public keys might lead to data compromise. Similarly, [13] and [23] investigate the vulnerability of small IoT devices to external attacks due to their low processing capabilities. ...
Article
Full-text available
Integrating blockchain technology with Internet of Things (IoT) devices has great potential for a variety of applications, however, guaranteeing energy efficiency remains a significant challenge. This study aims to explore the development of energy-efficient strategies for the seamless integration of blockchain and IoT devices. This research focuses on lowering computational overhead and energy-intensive consensus procedures in order to enable a sustainable and optimal union of two potential technologies. This study introduces a new energy-efficient technique for ensuring the security of IoT devices. This newly presented approach combines blockchain with the code division multiple access (CDMA) algorithm to securely transfer IoT messages while consuming less energy. At the transmission end, data from many IoT devices are multiplexed using orthogonal codes that are distinct for each IoT device. The multiplexed data is then sent and fed into a blockchain network, which improves data security and integrity. The blockchain transfers the data to the CDMA receiver after completing tasks including validation, block generation, and transaction completion. For verification, the entire blockchain and CDMA-based IoT network is constructed. Experimental results indicate a significant reduction of up to 90% in energy consumption and up to 80% reduction in time latency.
... Highly secure: Transactionsontheblockchainarehighlysecuredasthey are cryptographically secured and encrypted using a combination of private and public keys to maintain integrity [2]. Furthermore, All the transactions are first verifiedbasedonsomesetofrules,andafterverification,itis included in ablock [3] [12] [13]. ...
Article
Full-text available
Traditional Banking networks have been implemented worldwide. However, there are numerous security threats to these banking networks. Due to these threats, many banks have not been able to establish a sense of security among their customers. Every bank has different threats based on multiple factors such as network configuration, region, customer base, etc. Improving the security of banking networks worldwide is the need of the hour. For this purpose, the best solution to overcome all the existing security challenges of the banking networks worldwide is to upgrade them to blockchain networks. As of today, Blockchain is the best alternative to conventional banking networks. Despite its security challenges, it can be considered the best solution to overcome this global issue. This paper, first of all, highlights the significant issues in transactions in the banking sector. These issues include security and attack risks, and the involvement of multiple stakeholders. Then further, this paper proposes a new algorithm based on blockchain technology to overcome these issues. Additionally, the simulation results showing the transaction between 2 nodes are mentioned.
... • Address Space: Blockchain uses a 160-bit address space, as compared to IPv6, which uses a 128-bit address space [169]. A public key obtained using the ECDSA (Elliptic Curve Digital Signature Algorithm) is hashed into a 20-byte (160-bit) address on the blockchain. ...
Article
Full-text available
Over the past decade, an abundance of research has been conducted in the area of agricultural technology and innovations. The Internet of Things (IoT) has demonstrated its ability to connect numerous agricultural equipment, sensors, and specialists, boosting agricultural procedures in off-the-grid regions. Agriculture has experienced considerable improvements in production, cost reductions, service accessibility, and operational efficiency. With an emphasis on security, developments and trends in the sector, and technological implementation, this research paper offers an up-to-date analysis of existing and projected IoT applications in agriculture. In this article, enabling technologies, agricultural applications based on cutting-edge machine learning models, and services are all examined in relation to the development of IoT deployment in tackling diverse agricultural concerns. In the IoT-based agriculture system, potential challenges and limitations are also addressed. In its conclusion, this research provides an extensive review of the various aspects of IoT in agriculture, with the goal of empowering future researchers enthusiastic to make contributions to and advancement in their quest for a more in-depth comprehension of this field of study. A total of 96 papers were chosen for the selection from 2018 to 2023, and each was categorized using predetermined standards. The research’s results have been thoroughly examined, providing an overview of IoT in agriculture.
Article
Full-text available
Background The massive expansion of the Internet of medical things (IoMT) technology brings many opportunities for improving healthcare. At the same time, their use increases security risks, brings security and privacy concerns, and threatens the functioning of healthcare facilities or healthcare provision. Purpose This scoping review aims to identify progress in designing risk assessment and management frameworks for IoMT security. The frameworks found are divided into two groups according to whether frameworks address the technological design of risk management or assess technological measures to ensure the security of the IoMT environment. Furthermore, the article intends to find out whether frameworks also include an assessment of organisational measures related to IoMT security. Methods This review was prepared using PRISMA ScR guidelines. Relevant studies were searched in the citation databases Web of Science and Scopus. The search was limited to articles published in English between 2018 and 17 September 2023. The initial search yielded 1341 articles, of which 44 (3.3%) were included in the scoping review. A qualitative content analysis focused on selected security perspectives and progress in the given area was carried out. Results Thirty-two articles describe the design of risk assessment and management frameworks. Twelve articles describe the design of frameworks for assessing the security of IoMT devices and possibly offer a comparison of different IoMT alternatives. A description of the included articles was prepared from the selected security perspectives. Conclusion The review shows the need to create comprehensive or holistic frameworks for operational security and privacy risk management at all layers of the IoMT architecture. It includes the design of specific technological solutions and frameworks for continuously assessing the overall level of information security and privacy of the IoMT environment. Unfortunately, none of the found frameworks offer an assessment of organizational measures even though the importance of the organization measures was highlighted in articles. Another area of interest for researchers could be the design of a general risk management database for IoMT, which would include potential IoMT-related risks connected to a particular device.
Article
Full-text available
With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security.
Conference Paper
Full-text available
Blockchain, the underlying technology of cryptocurrency networks like Bitcoin, can prove to be essential towards realizing the vision of a decentralized, secure, and open Internet of Things (IoT) revolution. There is a growing interest in many research groups towards leveraging blockchains to provide IoT data privacy without the need for a centralized data access model. This paper aims to propose a decentralized access model for IoT data, using a network architecture that we call a modular consortium architecture for IoT and blockchains. The proposed architecture facilitates IoT communications on top of a software stack of blockchains and peer-to-peer data storage mechanisms. The architecture is aimed to have privacy built into it, and to be adaptable for various IoT use cases. To understand the feasibility and deployment considerations for implementing the proposed architecture, we conduct performance analysis of existing blockchain development platforms, Ethereum and Monax.
Article
Full-text available
Internet-of-Things (IoT) are increasingly found in civilian and military contexts, ranging from Smart Cities to Smart Grids to Internet-of-Medical-Things to Internet-of-Vehicles to Internet-of-Military-Things to Internet-of-Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a number of observations, include the lack of publicly available IoT datasets that can be used by the research and practitioner communities. Given the potential sensitive nature of IoT datasets, there is a need to develop a standard for the sharing of IoT datasets among the research and practitioner communities and other relevant stakeholders. We then posit the potential for blockchain technology in facilitating secure sharing of IoT datasets (e.g. using blockchain to ensure the integrity of shared datasets) and securing IoT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions.
Conference Paper
Full-text available
Data assurance and resilience are crucial security issues in cloud-based IoT applications. With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and delivery, effective solutions to protect data integrity and communications between drones and the control system have been in urgent demand to prevent potential vulnerabilities that may cause heavy losses. To secure drone communication during data collection and transmission, as well as preserve the integrity of collected data, we propose a distributed solution by utilizing blockchain technology along with the traditional cloud server. Instead of registering the drone itself to the blockchain, we anchor the hashed data records collected from drones to the blockchain network and generate a blockchain receipt for each data record stored in the cloud, reducing the burden of moving drones with the limit of battery and process capability while gaining enhanced security guarantee of the data. This paper presents the idea of securing drone data collection and communication in combination with a public blockchain for provisioning data integrity and cloud auditing. The evaluation shows that our system is a reliable and distributed system for drone data assurance and resilience with acceptable overhead and scalability for a large number of drones.
Conference Paper
Full-text available
Blockchain, the foundation of Bitcoin, has received extensive attentions recently. Blockchain serves as an immutable ledger which allows transactions take place in a decentralized manner. Blockchain-based applications are springing up, covering numerous fields including financial services, reputation system and Internet of Things (IoT), and so on. However, there are still many challenges of blockchain technology such as scalability and security problems waiting to be overcome. This paper presents a comprehensive overview on blockchain technology. We provide an overview of blockchain architechture firstly and compare some typical consensus algorithms used in different blockchains. Furthermore, technical challenges and recent advances are briefly listed. We also lay out possible future trends for blockchain.
Conference Paper
Full-text available
In the Internet of Things (IoT) scenario, the block-chain and, in general, Peer-to-Peer approaches could play an important role in the development of decentralized and data-intensive applications running on billion of devices, preserving the privacy of the users. Our research goal is to understand whether the blockchain and Peer-to-Peer approaches can be employed to foster a decentralized and private-by-design IoT. As a first step in our research process, we conducted a Systematic Literature Review on the blockchain to gather knowledge on the current uses of this technology and to document its current degree of integrity, anonymity and adaptability. We found 18 use cases of blockchain in the literature. Four of these use cases are explicitly designed for IoT. We also found some use cases that are designed for a private-by-design data management. We also found several issues in the integrity, anonymity and adaptability. Regarding anonymity, we found that in the blockchain only pseudonymity is guaranteed. Regarding adaptability and integrity, we discovered that the integrity of the blockchain largely depends on the high difficulty of the Proof-of-Work and on the large number of honest miners, but at the same time a difficult Proof-of-Work limits the adaptability. We documented and categorized the current uses of the blockchain, and provided a few recommendations for future work to address the above-mentioned issues.
Article
Full-text available
Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner. We review how this mechanism works and also look into smart contracts-scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows. We also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network. Wherever applicable, we identify solutions and workarounds. Our conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Book
This book presents a selection of papers submitted to the 20th Tyrrhenian Workshop, which took place in September 2009 in Sardinia, Italy. The workshop focused on the "Internet of Things." This subject is quickly emerging in the wireless technology arena. It describes the pervasive presence of a variety of devices—such as sensors, actuators, and mobile phones—which, through unique addressing schemes, are able to interact and cooperate with each other to reach common goals. This novel paradigm, which originated from the idea of "smart" environments, will be sure to impact the future of logistics, Intelligent Transportation Systems, business and process management, assisted living, E-health, and other applications. The Internet of Things covers a wide array of essential topics related to this emerging paradigm, including infrastructures and applications, communication systems and network architectures, embedded systems, and location and tracking through navigation sensors. It also addresses the technological and social implications of this technology, as well as challenges that may arise.
Conference Paper
Since the start of Bitcoin in 2008[1], blockchain technology emerged as the next revolutionary technology. Though blockchain started off as a core technology of Bitcoin, its use cases are expanding to many other areas including finances, Internet of Things (IoT), security and such[2]. Currently, many private and public sectors are diving into the technology[3]. Aside from that, as software and hardware improve, we would see the beginning of IoT. And those IoT devices need to communicate and synchronize with each other. But in situations where more than thousands or tens of thousands of IoT devices connected, we expect that using current model of server-client may have some limitations and issues while in synchronization. So, we propose using blockchain to build IoT system. Using blockchain, we can control and configure IoT devices. We manage keys using RSA public key cryptosystems where public keys are stored in Ethereum and private keys are saved on individual devices. Specifically, we choose Ethereum as our blockchain platform because using its smart contract, we can write our own Turing-complete code to run on top of Ethereum. Thus, we can easily manage configuration of IoT devices and build key management system. Even though we can simply use account as a key management system, which most of blockchain platform supports, we decide to use Ethereum because we can manage the system in a more fine-grained way. For the proof of a concept, we use a few IoT devices instead of a full system of IoT system, which consists of thousands of IoT devices. But in our later study, we would like to build a fully scaled IoT system using blockchain.
Book
Handbook of Research on Digital Transformations edited by F. Xavier Olleros, and Majlinda ZheguA paraitre