Conference PaperPDF Available

A Blockchain-based Secure Data Storage and Trading Model for Wireless Sensor Networks

Authors:

Abstract and Figures

Data storage on local devices provides fast, secure and complete access to the users. However, it needs sufficient storage, which is not feasible for lightweight clients' environments. In such scenarios, the usage of external devices makes the system vulnerable to data tampering, privacy leakage, and other data security issues. Wireless Sensor Networks (WSNs) consist of resource constrained devices, where external storage is preferred due to the lack of storage capacity in local devices. Therefore, using a centralized storage mechanism in WSNs causes slow data retrieval, which affects further operations on data. Relying on trusted parties also cause certain privacy and trust issues. Various data trading mechanisms are introduced to efficiently utilize the stored data. However, they still lack in certain aspects as discussed above. Therefore, we propose and implement a Secure Incentive-based Data Storage and Trading Model (SIDSTM), which provides a secure and efficient distributed storage mechanism. The proposed scheme uses AES-128 encrytpion scheme to encrypt the data for privacy purposes. An elliptic curve Diffie-Hellman key exchange is used for securely exchanging the private keys among the network peers. In WSNs, there are fewer data trading models so far. Anyone can access the data if he has access to the hash provided by the IPFS in the InterPlanetary File System (IPFS). Thus, IPFS provides efficient data access and storage mechanism. However, it deletes the data after a certain time interval due to the limited storage. Therefore, the proposed model provides incentives to motivate IPFS's peers for data storage. It also eliminates the need for the third-party involvement in data trading. The simulations are conducted to prove the effectiveness of the proposed model by evaluating its efficiency and scalability.
Content may be subject to copyright.
A Blockchain-based Secure Data Storage and
Trading Model for Wireless Sensor Networks
Shahab Ali, Nadeem Javaid, Danish Javeed, Ijaz Ahmad, Anwar Ali, and Umar
Mohammed Badamasi
Abstract Data storage on local devices provides fast, secure and complete access to
the users. However, it needs sufficient storage, which is not feasible for light-weight
clients’ environments. In such scenarios, the usage of external devices makes the
system vulnerable to data tampering, privacy leakage, and other data security is-
sues. Wireless Sensor Networks (WSNs) consist of resource constrained devices,
where external storage is preferred due to the lack of storage capacity in local de-
vices. Therefore, using a centralized storage mechanism in WSNs causes slow data
retrieval, which affects further operations on data. Relying on trusted parties also
cause certain privacy and trust issues. Various data trading mechanisms are intro-
duced to efficiently utilize the stored data. However, they still lack in certain aspects
as discussed above. Therefore, we propose and implement a Secure Incentive-based
Data Storage and Trading Model (SIDSTM), which provides a secure and efficient
distributed storage mechanism. The proposed scheme uses AES-128 encrytpion
scheme to encrypt the data for privacy purposes. An elliptic curve Diffie-Hellman
key exchange is used for securely exchanging the private keys among the network
peers. In WSNs, there are fewer data trading models so far. Anyone can access the
data if he has access to the hash provided by the IPFS in the InterPlanetary File
System (IPFS). Thus, IPFS provides efficient data access and storage mechanism.
However, it deletes the data after a certain time interval due to the limited storage.
Therefore, the proposed model provides incentives to motivate IPFS’s peers for data
storage. It also eliminates the need for the third-party involvement in data trading.
The simulations are conducted to prove the effectiveness of the proposed model by
evaluating its efficiency and scalability.
Shahab Ali and Nadeem Javaid (Corresponding Author)
COMSATS University Islamabad, Pakistan; email: nadeemjavaid@comsats.edu.pk
Danish Javeed, Ijaz Ahmad, Anwar Ali, and Umar Mohammed Badamasi
Changchun University of Science and Technology, Changchun , China
1
2 Shahab et al.
1 Introduction
Wireless Sensor Networks (WSNs) play an important role in terms of collecting
data from various sensitive and high-risk remote areas, such as monitoring areas,
battlefields, and other areas. A large number of light-weight sensor nodes are used
to gather the information that is used for various purposes, like data trading, weather
forecasting, and for many other applications. WSNs are used as a key technology
in the Internet of Things (IoTs). IoTs have unavoidable significance in real-time
environments as well as in research areas [1]. These devices are resource constrained
and perform a limited number of operations. Therefore, the third-party is used to
provide the required functionalities. The usage of third-party resources provides
high computational complexity, such as cloud storage. However, these devices suffer
from high dependencies, as they need high storage space to operate on data in cloud
computing.
Storage is the main concern in WSNs as data is used as a key resource. From
users’ perspective, the essential asset is the data itself, rather than how to get it,
the type of network configuration or source of the data gathering used [2]. WSNs
support efficient data storage and data access mechanisms in heterogeneous environ-
ments. The storage of data on the WSNs’ nodes is not feasible due to the continuous
generation of sensed data against limited storage space in the resource constrained
devices. So, the data must be stored on some other devices to effectively use it for the
required purposes. In such scenarios, the network should be properly organized to
effectively transfer the data to a sink node or Base Station (BS). Using cloud storage
in such scenarios is not efficient due to inefficient data retrieval and access opera-
tions. The data storage on third-party resources causes some serious threats such as
privacy leakage and illegal use of sensitive data. Further, there is a possibility of
data loss in case of any system failure or external interference.
WSNs gather data from the surrounding and store the data in the respected stor-
age systems (i.e., cloud, peer devices, etc). There is a specific goal behind the collec-
tion and storage of the sensors’ data. The data can be traded and utilized for research
or some other scenarios like predictions for any future events or anomalies. Trading
in the Internet paradigm scales the significance of traders to get the best return value
of their property. Moreover, from buyers’ perspective, it provides ease of access and
variety of choices to the best of their requirements. Trading can be of various types,
such as energy trading, data trading, and other types of trading. The focus of the
presented work is on data trading. The traditional data trading mechanisms in the
Internet infrastructure use a trusted intermediary to exchange the assets between en-
tities. However, external intermediary involvement makes the system vulnerable to
sensitive information leakage or asset misuse.
To overcome the limitations due to third-party involvement and centralized sys-
tems, blockchain is introduced. Blockchain is a distributed ledger and a decen-
tralized Peer-to-Peer (P2P) network that provides secure, immutable and tamper-
resistant services. In 2008, Nakamoto introduced the concept of a blockchain-based
cryptocurrency for the first time [3]. The first implementation of blockchain was in
Bitcoins. Afterwards, it is adopted by many domains (i.e., IoTs [4], energy sector
Secure Data Storage and Trading Model for WSNs 3
[5], internet of vehicles [6], etc). After introducing the concept of smart contracts in
blockchain, it becomes more adaptable. IoT devices lack of data privacy and data
protection. While, blockchain causes high latency, low throughput and is computa-
tionally expensive. Therefore, blockchain is not suitable for IoT scenarios. In [7],
the authors proposed a secure service provisioning mechanism for IoT with fair
payments system. Further an incentive mechanism is provided based on reputation
given to each entity. In order to tackle the above limitations in IoT scenario, au-
thors in [8] propose an efficient blockchain-based model that supports security and
privacy in lightweight clients. An overlay network is generated and combined with
blockchain in order to verify the security and privacy issues. To ensure security,
authors in [8] use Certificateless Cryptography (CC) and ensures low processing
time, less energy consumption and overhead. The authors claims that the propose
scheme reduces about 50% of processing time in different environments. However,
the proposed scheme was vulnerable to forking.
Further, for centralized server elimination a CC based scheme for record audit-
ing and transaction verification through blockchain in the IoT environment [9]. The
solution was proposed to provide secure and protected data storage and trading to
IoT devices using PKI. IoT device was assigned a pair of keys to be publically
identified and communicate in a secure way. The security of the system was kept
high and accountability of the data was achieved. However, the model did not con-
sider the feasibility of computationally expensive schemes in a resource-restricted
environment. Proof of Work was used as a consensus mechanism, and asymmetric
encryption was performed by resource constrained IoT devices. Further, privacy of
storage data and utilization of data was not mentioned.
A blockchain-based data sharing and access control mechanism is proposed in
[10]. The intentions of the author is to provide a secure authentication and trusted
framework for access control IoT networks. Similarly, another blockchain-based
model is presented in smart grid [11]. The author presents an access control mech-
anism with compensation to the customers that participate in data sharing. Further,
the differential privacy is used to stimulate customers for data sharing. Further, a
blockchain-based mechanism that provide a data sharing platform for a real-time
scenarios [12]. Authorization of data is provided to users-based on RSA-based digi-
tal signatures. The model also, provides IPFS-based storage to efficiently share data
among entities. Recently, a blockchain-based storage system is introduced, where
data is stored on wireless sensor nodes [2]. The incentive mechanism is used to
overcome the selfish behavior of the node for data storage. The distinct data is only
stored on each sensor; however, there is a possibility of data loss in case of any node
failure. Further, a node storing other sensors’ data is not able to store its own data
because of the limited storage capabilities.
Moreover, an edge computing-based mechanism, where secure service are pro-
vided to IoT devices [13]. The system calculates reputations for each edge server,
and it incentivizes high reputation edge servers for their honest contributions in
the system. Cloud nodes are utilized to store the reputation and incetivization data.
Some cloud-based storage systems are presented to overcome the limitations of tra-
ditional data storage mechanisms in cloud server [14]. Cloud infrastructure pro-
4 Shahab et al.
vides huge data storage capabilities; while communication time to access data and
data manipulation is very high. Thus, such systems in real-time environment create
slow processing and high computational time. In this article, we present SIDSTM; a
blockchain-based solution for WSNs, that is capable to be implemented in real-time
WSNs. To the best of our knowledge, this is a first blockchain-based solution for
WSNs, where data storage and trading mechanism take place side by side.
Our main contribution is mainly two-fold. The first is to provide an incentive-
based secure distributed storage mechanism for blockchain-based WSNs using de-
centralized storage. Secondly, the system utilizes the stored data, such as providing
a smart contract-based single auction mechanism for data trading in WSNs, which
eliminates third-party involvement in data trading. The presented model uses a dis-
tributed P2P network-based IPFS for storage. The stored data is efficiently retrieved
as IPFS provides faster and safer storage and sharing of data than other storage
mechanisms.
2 Proposed System Model
The proposed model provides a secure mechanism to store the WSNs’ data in a
decentralized file system using blockchain technology and trades the data between
BS and buyers on the basis of smart contracts. In the first step, data is collected
from the surrounding environment by various sensor nodes (i.e., SN1,SN2, ..., SNn)
deployed in WSNs. The data from sensor nodes is transferred to the BS for further
computations. The BS, such as BSA,BSB,BSCand BSD, uses IPFS private key KI
Pr
to encrypt the data. The data, which is represented as M=m1+m2+... +mnis
encrypted using private key of IPFS. It creates a cipher stream (C=c1+c2+... +
cn), that is given by Ci=EKI
Pr (M)isend to the blockchain. IPFS decrypts the data
using its private key by general encryption equation as,
M=C1=E1
KIPF S
Pr
(c1+c2+... +cn)
Afterwards, it stores the data and generates a hash for each stored data. The IPFS
sent the hash back to the corresponding BS using its private key KBSi
Pr via blockchain.
When a buyer needs data, he registers himself with Certification Authority (CA),
and adds his bid for the requested data. CA assigns keys to the buyer and the bidding
ethers are added to the smart contract. The smart contract requests the data owner
(i.e., BS) for the hash of the required data. Thus, the single auction is performed
and the buyer with maximum bidding value is selected as a winner. The hash is
transmitted to the winner in returns to the coins given. While transferring the amount
to respected BS, 5% of the revenue is provided to IPFS as an incentive to motivate
it for efficient data storage.
Secure Data Storage and Trading Model for WSNs 5
Fig. 1: Secure Incentive-based Data Storage and Trading Model
2.1 System Components
The proposed system consists of various sensor nodes, CA, BS, IPFS, and buyers as
shown in Fig. 1.
2.1.1 Certification Authority
CA is responsible for providing the digital key to each entity, which is a private
key in our case. Wireless sensor nodes are resource-constraint; therefore, it is not
feasible to perform encryption on sensor nodes that cause extra energy consump-
tion of light-weight devices. Also, the subkey generation and key whitening energy
consumption reduce the lifetime of WSNs sensor nodes.
6 Shahab et al.
2.1.2 Sensor Nodes
The sensor nodes sense the surrounding data and extract the corresponding data.
The sensor nodes are resource-restricted; therefore, it is difficult for them to store
the data. There are three types of data: temperature data, pressure data and humidity
data, which are used in proposed SIDSTM model. The sensor nodes forward the
sensed data to the BS, where further computations are performed.
2.1.3 Base Station
BS contains sufficient resources and performs computations for the network. It is
capable to perform validation for the blockchain transactions. The sensor nodes’
data is transmitted to the BS, where it is stored in encrypted form. Data trading uses
this hash as an asset of BS, in return to the payment provided by buyers. The hash
is first decrypted by BS and then sent to the smart contract. Buyers that have access
to the hash are able to access the data.
2.1.4 InterPlanetary File System
IPFS is a distributed P2P network used for efficient decentralized data storage. It
stores the data and provides a hash of 32-bytes. In order to preserves the privacy
of required data, the hash is then encrypted with the corresponding BS private key
(i.e., KBSA
Pr ,KBSB
Pr , etc.,) and transferred to the blockchain. Each node in IPFS stores
the data of its interest. As shown in Fig. 2, the different colors of nodes indicate their
interest in type of data. The data stored in IPFS is only accessed by its hash, which
is only available to the authenticated buyers.
Fig. 2: Structure of IPFS
Secure Data Storage and Trading Model for WSNs 7
2.1.5 Buyer
A buyer is an entity that buys data for his personal use. The buyer registers himself
with CA and gets a private key. A smart contract takes place between buyer and
BS through blockchain. The buyer requests for data and transfers ether to the smart
contract. After performing auction on the bidding values, the winner gets hash of the
requested data. The ethers are transferred to the data owners’ account, and the rest
of the entities get their credit back. The buyer gets the data by providing the hash. In
the end, BS gets incentives according to the specified percentage of the total earning
amount.
Fig. 3: AES Encryption
2.2 Encryption Scheme
The implementation of encryption schemes on light-weight wireless sensor nodes is
not a good idea due to their less computational power and limited resources. There-
fore, this work does not perform encryption on wireless sensor nodes and assigns BS
to perform the encryption task. So, for this purpose, the proposed model uses AES
128-bit encryption scheme that facilitates efficient, fast encryption and decryption
of data. The abstract view of AES is provided in Fig. 3. In AES 128-bit of data is
taken as an input I, with a key K of 128-bit length that performs encryption on data
to obtain cipher-text of size 128-bit. The AES key size varies with the number of
rounds taken to perform encryption and decryption. AES takes 10-rounds to com-
plete each (i.e., encryption, and decryption). While AES-192 takes 12-rounds and
AES-256 takes 14-rounds for each operation. Each round consists of four layers, as
given below. The last round, which is 14th in AES-256, 12th in AES-192 and 10th in
AES-128, does not contain the mixColumn layer that makes the scheme symmetric.
The internal structure of AES is shown in Fig. 4. AES encryption scheme consists of
four layers, which are; Key Addition Layer (KAL), Byte Substitution Layer (BSL),
ShiftRow Layer (SRL) and MixColumn Layer (MCL) [15].
8 Shahab et al.
Key Addition Layer
Plaintext
I
Byte Substitution Layer
ShiftRow Layer
MixColumn Layer
Key Addition Layer
Diffusion Layer
Confusion Layer
Round 0
Transform 1
Transform 0
Key K
Fig. 4: S-box Internal Structure
2.2.1 Key Addition Layer
Unlike DES, AES encrypts all 128-bits of the data path in one round. A 128-bit
subkey is generated from the main key, which is XORed to each output of 1 byte
accordingly.
2.2.2 Byte Substitution Layer
A data path of 128-bit is split into 16-bytes. Where each byte passes through an
S-box providing confusion to data. BSL is also known as Confusion Layer, where
data is divided into 16 bytes. Each byte is taken as input to an S-box, where confu-
sion is created as 50% possibility of bit conversion. The equation given for BSL is
represented as S, and an input polynomial represented as Ii, which belongs to Galois
Field represented by GF. The given Equation 1 is taken from [15].
S(Ii) = Oi,where,IiGF (1)
Fig. 5: S-box Internal Structure
Secure Data Storage and Trading Model for WSNs 9
2.2.3 ShiftRow Layer
The SRL is explicitly elaborated in Fig. 6, where data is arranged in a 4x4 matrix.
The input matrix indicates the input values to the SRL. The first row of the output
matrix does not shift the values in the given input table. While the second row shifts
one value to the left. Third row shifts two values to the left and fourth row shifts three
values. Elements in the starting row a11,a12,a13 ,a14 are in the same manner as in
input matrix as shown in Fig. 6. The second output row that holds a22,a23,a24 ,a21
is obtained through single element shift to the left operation. While two values shift
for row three a33,a34,a31 ,a32 and three elements shift for row four of the output
matrix a44,a41 ,a42,a43 .
Fig. 6: AES ShiftRow Mechanism
Fig. 7: MixColumn Layer
2.2.4 MixColumn Layer
After performing the ShiftRow operation, an output matrix is obtained which con-
tains the shifted rows. Each output matrix column is then multiplied with a 4x4
matrix, which contains polynomials represented in bytes. As given in Fig. 7, matrix
Z represents the output matrix after performing mixColumn operation. Matrix Y
represents the 4x4 matrix consisting polynomial value represented in hexadecimal
and matrix X shows the input column to the operation. AES schemes vary due to
change in a number of rounds as AES-128 contains 10-rounds. Each round contains
10 Shahab et al.
all of the above four steps except last round, which skips the MCL that makes this
encryption symmetric. The decryption of the schemes involve the inverse of each
step mentioned above. The discussion and figures of AES are taken and discussed
in more details in [15].
Fig. 8: The Gas Consumption of Data Storage
3 Simulations and Results
WSNs’ sensors are not capable to perform encryption due to the limited computa-
tional and storage resources. Therefore, external storage is used to store the data.
The proposed SIDSTM system uses a distributed P2P storage network (i.e., IPFS),
that stores the data in an efficient manner. The BS collects data from sensor nodes
and encrpts the data with the IPFS private key (i.e., KIPFS
Pr ) through AES-128. Each
BS has its own type of data and the encrypted data is sent to IPFS for storage. More-
over, the system compares AES-128 with two other symmetric schemes, which are:
3-DES and AES-256. Moreover, the BS is considered as a blockchain node, which
is authorized to perform validations of blockchain transactions. As shown in Fig.
8, gas consumption increases linearly with the increase in data storage. Storage of
data ranges from 100 Bytes to 1 kBytes and there is no diversion in increase of gas
consumption with the increase in data storage.
It indicates the scalability of the model in terms of data storage. Also, the usage
of IPFS makes the system reliable and compatible for efficient data trading. While
storing data in IPFS, it returns a 128-bit hash to the data provider that is used to
access the data. The AES-128, a symmetric encryption used to encrypt the hash is
Secure Data Storage and Trading Model for WSNs 11
Fig. 9: Comparison of Encryption Schemes
a faster and light-weight scheme and performs encryption in an efficient time as
clearly seen in Fig. 9.
Fig. 10: Gas Consumption of the Proposed Smart Contracts
The 3-DES algorithm is worst in terms of time complexity (i.e., it takes 56.96464
milliseconds to encrypt a hash of 128-bit size). AES-256 performs better than 3-
DES in terms of computational time. While AES-128 performs better than AES-
256, as it takes 31.98123 milliseconds time for encryption. Therefore, AES-128
performs better than other symmetric schemes. The symmetric schemes are more
12 Shahab et al.
suitable for our scenarios as they are faster than asymmetric and are capable of large
data encryption in an efficient way. In our two-fold SIDSTM, storage and trading of
data work side by side. The deployment cost of our systems’ smart contracts regard-
ing gas consumption is 799274 gas for storage and 1067982 gas for trading which
are acceptable and given in Fig. 10. Gas consumption highlights the resources used
when deploying in real environments. Therefore, the resource utilization of our pro-
posed solution is low and is applicable in real-time environments. The gas consump-
tion of our trading system that uses the single auction mechanism to trade and the
incentives for IPFS to motivate for data storage is manageable. Trading events are
shown in Fig. 11. After registering with CA, the buyer requests for the type of data;
he needs and adds his bid. The results indicate very low gas consumption for the
buyer to request the data (i.e., 88163). The single auction is performed on the bids,
the bidder that bids maximum is selected as a winner. Afterward, a smart contract
takes place between the auction winner and the data owner. The gas consumption
of auction event in the presence of 10 participants is quite low (i.e., 305188 gas).
The above plots are taken after performing experiments on Remix-IDE with system
specification as Inspiron Dell-3420 Core i-3, having 2.4 GHz processor with main
memory 8.0 GB and 160 GB SSD.
Fig. 11: Gas Consumption of Trading Events
4 Conclusion
WSN consists of resource-constraint devices that cannot perform high computa-
tions on data. The proposed model SIDSTM provides an efficient and secure data
storage mechanism that offloads the data storage from wireless sensor nodes to a
distributed storage network (i.e., IPFS). The IPFS is a content-based storage system
Secure Data Storage and Trading Model for WSNs 13
that provides fast and efficient data retrieval. This technology lacks in data privacy,
which is solved by encryption of the hash with a fast symmetric encryption scheme.
Moreover, the encryption scheme used in the system is compared to other schemes
and the obtained results clearly demonstrate the efficiency of the proposed scheme.
PoA is used as a consensus mechanism which provides better performance than
other consensus mechanisms as PoS, PoW, etc. PoS is not suitable for the scenarios
that manage multiple organizations’ data requiring multiple authorized entities for
validation. PoW is computationally complex and causes high resource utilization.
Further, the trading model presented by our scheme eliminates the third party com-
putations for auction-based data trading mechanism in WSN. The trading model
presented is single auction.
References
1. She, W., Liu, Q., Tian, Z., Chen, J.S., Wang, B. and Liu, W., 2019. Blockchain Trust Model for
Malicious Node Detection in Wireless Sensor Networks. IEEE Access, 7, pp.38947-38956.
2. Ren, Y., Liu, Y., Ji, S., Sangaiah, A.K. and Wang, J., 2018. Incentive mechanism of data
storage based on blockchain for wireless sensor networks. Mobile Information Systems, 2018,
pp.1-10.
3. Nakamoto, S., 2008. Bitcoin: A peer-to-peer electronic cash system.. [online]. Available at:
https://bitcoin.org/bitcoin.pdf, pp.1-9.
4. Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q. and Zhang, Y., 2017. Consortium blockchain for
secure energy trading in industrial internet of things. IEEE transactions on industrial infor-
matics, 14(8), pp.3690-3700.
5. Mengelkamp, E., Notheisen, B., Beer, C., Dauer, D. and Weinhardt, C., 2018. A blockchain-
based smart grid: towards sustainable local energy markets. Computer Science-Research and
Development, 33(1-2), pp.207-214.
6. Huang, X., Zhang, Y., Li, D. and Han, L., 2019. An optimal scheduling algorithm for hybrid
EV charging scenario using consortium blockchains. Future Generation Computer Systems,
91, pp.555-562.
7. Alghamdi, T.A., Ali, I., Javaid, N. and Shafiq, M., 2019. Secure Service Provisioning Scheme
for Lightweight IoT Devices with a Fair Payment System and an Incentive Mechanism based
on Blockchain. IEEE Access, pp.1-14.
8. Mohanty, S.N., Ramya, K.C., Rani, S.S., Gupta, D., Shankar, K., Lakshmanaprabu, S.K. and
Khanna, A., 2020. An efficient Lightweight integrated Blockchain (ELIB) model for IoT
security and privacy. Future Generation Computer Systems, 102, pp.1027-1037.
9. Li, R., Song, T., Mei, B., Li, H., Cheng, X. and Sun, L., 2018. Blockchain for large-scale
internet of things data storage and protection. IEEE Transactions on Services Computing,
pp.1-14.
10. Sultana, T., Almogren, A., Akbar, M., Zuair, M., Ullah, I. and Javaid, N., 2020. Data Sharing
System Integrating Access Control Mechanism using Blockchain-Based Smart Contracts for
IoT Devices. Applied Sciences, 10(2), p.488.
11. Samuel, O., Javaid, N., Awais, M., Ahmed, Z., Imran, M. and Guizani, M., 2019, July. A
blockchain model for fair data sharing in deregulated smart grids. In IEEE Global Communi-
cations Conference (GLOBCOM 2019).
12. Naz, M., Al-zahrani, F.A., Khalid, R., Javaid, N., Qamar, A.M., Afzal, M.A., and Shafiq,
M., 2019. A Secure Data Sharing Platform Using Blockchain and Interplanetary File System.
Sustainability, 11(24), pp.1-24.
14 Shahab et al.
13. Rehman, M., Javaid, N., Awais, M., Imran, M. and Naseer, N., 2019. Cloud based secure
service providing for IoTs using blockchain. In IEEE Global Communications Conference
(GLOBCOM 2019), pp.1-7.
14. Saad, M., 2018. Fog Computing and Its Role in the Internet of Things: Concept, Security and
Privacy Issues. International Journal ofF Computer Applications, 975, p.8887-8889.
15. Paar, C. and Pelzl, J., 2009. Understanding cryptography: a textbook for students and practi-
tioners. Springer Science & Business Media.
... A wide selection of open-source HAS is available [43][44][45][46][47][48][49][50]. Home Assistant [46] and OpenHAB [43] are the most powerful participants in the community of open-source HAS. ...
... The objective of this research is to represent HAS; this system has been designed and developed for multiple building/home automation such as security and access control [47], appliances control including thermostats, lights, AC, etc.), energy and power management [48,49]. This is very applicable in sustainability fields such as Environmental Sustainability (energy management technologies) [50], Economic sustainability (Cost-effective smart home design technologies) [51], Sustainability from smart homes automation system to smart space [52][53][54][55][56]. ...
Article
Full-text available
Recently, home automation system has getting significant attention because of the fast and advanced technology, making daily living more convenient. Almost everything has been digi-talized and automated. The development of home automation will become easier and more popular because of the use of the Internet of Things (IoT). This paper described various interconnection systems of actuators, sensors to enable multiple home automation implementations. The system is known as HAS (Home automation system). It operates by connecting the robust Application Programming Interface (API), which is the key to a universal communication method. The HAS used devices, often implemented the actuators or sensors that have an upwards communication network followed by HAS (API). Most of the devices of the HAS (home automation system) used Raspberry Pi boards and ESP8285 chips. A smartphone application has been developed that allows users to control a wide range of home appliances and sensors from their smartphones. The application is user-friendly, adaptable, and beneficial for consumers and disabled people. It has the potential to be further extended via the use of various devices. The main objectives of this work are to make our home automation system, more secure and intelligent. HAS is a highly effective and efficient computational system that may be enhanced with a variety of devices and add-ons.
... Several benefits [16] can be observed by combining these two paradigms, including improved and integrated healthcare services. For a cyberphysical system, a privacy-preserving scheme has been proposed for advanced obstinate threads [34][35][36][37]. Here the authors check the level of data privacy preserved by calculating the differences between original and transferred data using an index level of privacy. ...
... We used analytical calculations for the sensor with concentric electrodes to determine the optimal geometric dimensions, which were conducted in [37]. Using the mathematical relationship from and Equation (1), the sensor response function was calculated as: ...
Article
Full-text available
Nowadays, in a world full of uncertainties and the threat of digital and cyber-attacks, blockchain technology is one of the major critical developments playing a vital role in the creative professional world. Along with energy, finance, governance, etc., the healthcare sector is one of the most prominent areas where blockchain technology is being used. We all are aware that data constitute our wealth and our currency; vulnerability and security become even more significant and a vital point of concern for healthcare. Recent cyberattacks have raised the questions of planning, requirement, and implementation to develop more cyber-secure models. This paper is based on a blockchain that classifies network participants into clusters and preserves a single copy of the block-chain for every cluster. The paper introduces a novel blockchain mechanism for secure healthcare sector data management, which reduces the communicational and computational overhead costs compared to the existing bitcoin network and the lightweight blockchain architecture. The paper also discusses how the proposed design can be utilized to address the recognized threats. The experimental results show that, as the number of nodes rises, the suggested architecture speeds up ledger updates by 63% and reduces network traffic by 10 times.
... This paper uses AES 128-bit encryption because it takes a short time for encryption and decryption as compared to AES 192-bit and AES 256-bit [45]. In AES 256-bit scheme, there are 14 rounds while there are 12 rounds in AES 192-bit scheme to meet the encryption and decryption processes [46,47]. Moreover, the symmetric technique takes less time to encrypt the data as compared to asymmetric encryption. ...
Article
Full-text available
This paper proposes a blockchain-based node authentication model for the Internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and residual energy-based low-energy adaptive clustering hierarchy (DDR-LEACH) protocol. DDR-LEACH is used to replace CHs with the ordinary nodes based on maximum residual energy, degree, and minimum distance from BS. Furthermore, storing a huge amount of data in the blockchain is very costly. To tackle this issue, an external data storage, named as interplanetary file system (IPFS), is used. Furthermore, for ensuring data security in IPFS, AES 128-bit is used, which performs better than the existing encryption schemes. Moreover, a huge computational cost is required using a proof of work consensus mechanism to validate transactions. To solve this issue, proof of authority (PoA) consensus mechanism is used in the proposed model. The simulation results are carried out, which show the efficiency and effectiveness of the proposed system model. The DDR-LEACH is compared with LEACH and the simulation results show that DDR-LEACH outperforms LEACH in terms of energy consumption, throughput, and improvement in network lifetime with CH selection mechanism. Moreover, transaction cost is computed, which is reduced by PoA during data storage on IPFS and service provisioning. Furthermore, the time is calculated in the comparison of AES 128-bit scheme with existing scheme. The formal security analysis is performed to check the effectiveness of smart contract against attacks. Additionally, two different attacks, MITM and Sybil, are induced in our system to show our system model’s resilience against cyber attacks.
... e SDN blockchain integration is shown, which addresses all of the critical security apprehensions of IoT from an ultramodern standpoint. e primary ability of that amalgamation is the protection from DoS attacks, impersonating attacks, and routing attacks [29][30][31][32]. ...
... e SDN blockchain integration is shown, which addresses all of the critical security apprehensions of IoT from an ultramodern standpoint. e primary ability of that amalgamation is the protection from DoS attacks, impersonating attacks, and routing attacks [29][30][31][32]. ...
Article
Full-text available
E-health has grown into a billion-dollar industry in the last decade. Its device’s high throughput makes it an obvious target for cyberattacks, and these environments desperately need protection. In this scientific study, we presented an artificial intelligence (AI)-driven software-defined networking (SDN)-enabled intrusion detection system (IDS) to address increasing cyber threats in the E-health and internet of medical things (IoMT) environments. AI’s success in various fields, including big data and intrusion detection systems, has prompted us to develop a flexible and cost-effective approach to protect such critical environments from cyberattacks. We present a hybrid model consisting of long short-term memory (LSTM) and gated recurrent unit (GRU). The proposed model was thoroughly evaluated using the publicly available CICDDoS2019 dataset and conventional evaluation measures. Furthermore, for proper validation, the proposed framework is compared with relevant classifiers, such as cu-GRU+ DNN and cu-BLSTM. We have further compared the proposed model with existing literature to prove its efficacy. Lastly, 10-fold cross-validation is also used to verify that our results are unbiased. The proposed approach has bypassed the current literature with extraordinary performance ramifications such as 99.01% accuracy, 99.04% precision, 98.80 percent recall, and 99.12% F1-score.
... Here comes the concept of cryptography in which the data is stored in an encrypted form. This thing hinder the attacker to manipulate the data facts [4]. The spreading quantity of smart nodes enhances the chances of architectural attacks. ...
Article
Full-text available
Internet of things (IoT) is an emerging technology in the present era. The term IoT refers to as an interconnection of several smart nodes through some heterogeneous link for the purpose of data communication. Some particular protocols control the entire communication in IoT. Due to plenitude of devices, it becomes a huge task to check the loyalty status of each node which is going to be a part of IoT environment. These nodes sometimes get involved in some malicious activities which may cause critical threats to this environment. These anonymous activities may include some attack on the working or security of IoT. In this uncongenial circumstance we need a strong security measurement to countermeasure these attacks. Innumerable efforts have been made to improve the security of IoT. This paper is an effort to make a glance of some of these security schemes.
Article
Full-text available
Cyberattacks can trigger power outages, military equipment problems, and breaches theof con-fidential information, i.e., medical records could be stolen if they get into the wrong hands. Because ofDue to the great monetary worth of the data it holds, the banking industry is particularly at risk. As the number of digital footprints of banks grows, so does the attack surface that hackers can exploit. This paper aims to detectdistributeddetect distributed denial-of-service (DDOS) attacks on financial organizations using the Banking Dataset. In this research, we have used multiple classi-fication models for the prediction of DDOS attacks. We have added some complexity to the ar-chitecture of generic models to enable them to perform them well. We have further applied a support vector machine (SVM), K-Nearest Neighbors (KNN) and random forest algorithms (RF). The SVM shows an accuracy of 99.5%, Whilewhile KNN and RF scored an accuracy of 97.5% and 98.74%%, respectively, for the detection of (DDoS) attacks. Upon comparison, it has been concluded that the SVM is more robust as compared to KNN, RF and existing machine learning (ML) and deep learning (DL) approaches.
Chapter
Full-text available
This paper presents a usage-based insurance (UBI) platform that incorporates Internet of Vehicles (IoV) and blockchain technologies, discussing the potential stakeholders, business models, and interaction modes involved in this platform. Existing UBI products mostly use data on the driver’s mileage, driving period, or driving region for more accurate insurance calculations. Automobile UBI encourages customers to continue improving their ability to drive safety and provides a means to smoothly, transparently, and rationally calculate insurance pricing and payout. This paper proposes blockchain architecture to remedy management problems in a UBI environment. A bidding mechanism suitable for the blockchain-based UBI platform was designed to close the information gap between the insurance company and consumer, thus increasing consumer trust in the platform.
Chapter
Biodiversity data (e.g., for aquatic organisms, marine creatures and terrestrial animals) and environmental data (e.g., air pollution statistics, water supply and sanitation information, soil contamination data) are examples of big data. Embedded in these big data are implicit, previously unknown and potentially useful information and knowledge that could help improve the ecosystem. As such, data science solutions for big data analytics and mining are in demand. In this paper, we present a data science solution for biodiversity informatics, environmental analytics and sustainability analysis. Specifically, our solution analyzes and mines both biodiversity data and environmental data to examine the impacts of pollution to moving objects. The convex-hull-based method in our solution estimates the pollution exposure to these objects. For evaluation, we conducted case studies on analyzing, mining and visualizing both marine biodiversity data and plastic exposure data to examine the impacts of the plastic exposure to marine creatures. Knowledge discovered by our solution help decision and policy makers to take appropriate actions in building and maintaining a sustainable environment.
Chapter
Deep learning technology is widely used in medicine. The automation of medical image classification and segmentation is essential and inevitable. This study proposes a transfer learning–based kidney segmentation model with an encoder–decoder architecture. Transfer learning was introduced through the utilization of the parameters from other organ segmentation models as the initial input parameters. The results indicated that the transfer learning–based method outperforms the single-organ segmentation model. Experiments with different encoders, such as ResNet-50 and VGG-16, were implemented under the same Unet structure. The proposed method using transfer learning under the ResNet-50 encoder achieved the best Dice score of 0.9689. The proposed model’s use of two public data sets from online competitions means that it requires fewer computing resources. The difference in Dice scores between our model and 3D Unet (Isensee) was less than 1%. The average difference between the estimated kidney volume and the ground truth was only 1.4%, reflecting a seven times higher accuracy than that of conventional kidney volume estimation in clinical medicine.
Article
Full-text available
In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed system is intended to overcome the issues related to trust and authentication for access control in IoT networks. Moreover, the objectives of the system are to achieve trustfulness, authorization, and authentication for data sharing in IoT networks. Multiple smart contracts such as Access Control Contract (ACC), Register Contract (RC), and Judge Contract (JC) are used to provide efficient access control management. Where ACC manages overall access control of the system, and RC is used to authenticate users in the system, JC implements the behavior judging method for detecting misbehavior of a subject (i.e., user). After the misbehavior detection, a penalty is defined for that subject. Several permission levels are set for IoT devices' users to share services with others. In the end, performance of the proposed system is analyzed by calculating cost consumption rate of smart contracts and their functions. A comparison is made between existing and proposed systems. Results show that the proposed system is efficient in terms of cost. The overall execution cost of the system is 6,900,000 gas units and the transaction cost is 5,200,000 gas units.
Article
Full-text available
The Internet of Things (IoT) industry is growing very fast to transform factories, homes, farms and practically everything else to make them efficient and intelligent. IoT is applied in different resilient scenarios and applications. IoT faces lots of challenges due to lack of computational power, battery and storage resources. Fortunately, the rise of blockchain technology facilitates IoT in many security solutions. Using blockchain, communication between IoT and emerging computing technologies is made efficient. In this work, we propose a secure service provisioning scheme with a fair payment system for Lightweight Clients (LCs) based on blockchain. Furthermore, an incentive mechanism based on reputation is proposed. We use consortium blockchain with the Proof of Authority (PoA) consensus mechanism. Furthermore, we use Smart Contracts (SCs) to validate the services provided by the Service Providers (SPs) to the LCs, transfer cryptocurrency to the SPs and maintain the reputation of the SPs. Moreover, the Keccak256 hashing algorithm is used for converting the data of arbitrary size to the hash of fixed size. AES128 encryption technique is used to encrypt service codes before sending to the LCs. The simulation results show that the LCs receive validated services from the SPs at an affordable cost. The results also depict that the participation rate of SPs is increased because of the incentive mechanism.
Article
Full-text available
In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to the involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access roles written in smart contract by owner. Users are first authenticated through RSA signatures and then submit the requested amount as a price of digital content. After the successful delivery of data, the user is encouraged to register the reviews about data. These reviews are validated through Watson analyzer to filter out the fake reviews. The customers registering valid reviews are given incentives. In this way, maximum reviews are submitted against every file. In this scenario, decentralized storage, Ethereum blockchain, encryption, and incentive mechanism are combined. To implement the proposed scenario, smart contracts are written in solidity and deployed on local Ethereum test network. The proposed scheme achieves transparency, security, access control, authenticity of owner, and quality of data. In simulation results, an analysis is performed on gas consumption and actual cost required in terms of USD, so that a good price estimate can be done while deploying the implemented scenario in real set-up. Moreover, computational time for different encryption schemes are plotted to represent the performance of implemented scheme, which is shamir secret sharing (SSS). Results show that SSS shows the least computational time as compared to advanced encryption standard (AES) 128 and 256.
Conference Paper
Full-text available
Internet of Things (IoTs) is widely growing domain of the modern era. With the advancement in technologies, the use of IoTs devices also increases. However, security risks regarding service provisioning and data sharing also increases. There are many existing security approaches, although these approaches are not suitable for IoT devices due to their limited storage and limited computation resources. These secure approaches also require a specific hardware. With the invention of blockchain technologies, many security risks are eliminated. With the help of blockchain, data sharing mechanism is also possible. In this paper, we proposed a novel secure service providing mechanism for IoTs by using blockchain. We introduced cloud nodes for maintaining the validity states of edge service providers. The rating and cryptocurrency is given to edge servers. Given rating and incentive is stored in cloud node and updated with respect to time. The smart contract is proposed to check the validity state of the edge server as well as compare and verify the service provided by edge servers. In our proposed system we perform service authentication at cloud layer as well as edge server layer. Moreover, by using Proof of Authority (PoA) consensus mechanism overall performance of our proposed system also enhanced.By experimental analysis it is shown, our proposed model is suitable for resource constrained devices.
Conference Paper
Full-text available
The emergence of smart homes appliances has generated a high volume of data on smart meters belonging to different customers which, however, can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage customers participation, this paper proposes an access control mechanism by fairly compensating customers for their participation in data sharing via blockchain and the concept of differential privacy. We addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores. Experimental results show the efficiency of the proposed model to minimize privacy risk, maximize aggregator profit. In addition, gas consumption, as well as the cost of the computational resources, is reduced. Index Terms-Blockchain, consensus mechanism, proof of authority, privacy preserving and smart grid. I. INTRODUCTION Presently, because of the rapid growth of the world population and the technological innovations, a lot of energy is needed in a short period of time and during peak hours, and its effect increases the cost of production. Customers can, therefore, optimize their utilization based on the current energy demand and supply. As a result, demand response and dynamic pricing proposal are subject to privacy issues. In a smart grid, customers will share their hourly information load profile with a service provider only to allow a certain level of privacy to be maintained, which is a major barrier for customer participation. In order to efficiently aggregate customer data, while preserving their privacy, Liu et al. [1] propose a privacy-preserving mechanism for data aggregation. The proposed solution minimizes the cost of communication and computational overhead. However, a trusted environment is not considered. To achieve a trusted environment, several studies in [2]-[8] used blockchain as privacy-preserving mechanism for data aggregation; privacy protection and energy storage; secure classification of multiple data; incentive announcement network for smart vehicle; crowdsensing applications; dynamic tariff decision and payment mechanism for vehicle-to-grid. A survey concerning privacy protection using blockchain is discussed in [9]. The survey highlights all the existing
Article
Full-text available
The Internet of things (IoT) has been widely used since its high efficiency and real-time collaboration. Wireless sensor network as the core technology to support the operation of the IoT, the security problem is becoming more and more serious. Aiming at the problem that the existing malicious node detection methods in wireless sensor networks can not be guarantee by fairness and traceability of detection process, in this paper, it presents a blockchain trust model (BTM) for malicious node detection in wireless sensor networks. Firstly, it gives the whole framework of the trust model. Then it constructs the blockchain data structure which is used to detect malicious nodes. Finally, it realizes the detection of malicious nodes in 3D space by using the blockchain smart contract and WSNs quadrilateral measurement localization method, and the voting consensus results are distributed recorded in the blockchain. The simulation results show that the model can effectively detect malicious nodes in WSNs and it can also ensure the traceability of the detection process.
Article
Full-text available
In this paper, the blockchain technology is utilized to build the first incentive mechanism of nodes as per data storage for wireless sensor networks (WSNs). In our system, the nodes storing the data are rewarded with digital money. The more the data stored by the node, the more the reward it achieves. Moreover, two blockchains are constructed. One is utilized to store data of each node and another is to control the access of data. In addition, our proposal adopts the provable data possession to replace the proof of work (PoW) in original bitcoins to carry out the mining and storage of new data blocks, which greatly reduces the computing power comparing to the PoW mechanism. Furthermore, the preserving hash functions are used to compare the stored data and the new data block. The new data can be stored in the node which is closest to the existing data, and only the different subblocks are stored. Thus, it can greatly save the storage space of network nodes.
Article
Presently, BlockChain (BC) gained significant interest because of its undeniable nature and related advantages of security and privacy, BC has the power to resolve the limitations of Internet of Things (IoT) such as data protection and privacy. At the same time, BC has high computation complexity, restricted scalability, high bandwidth overhead and latency that is unsuitable to IoT. In this paper, efficient Lightweight integrated Blockchain (ELIB) model is developed to meet necessitates of IoT. The presented model is deployed in a smart home environment as an important illustration to verify its applicability in various IoT scenarios. The resource constrained resources in a smart home takes the advantages from a centralized manager which generates shared keys to transmit data, process every incoming and outgoing requests. The presented ELIB model generates an overlay network where highly equipped resources can merges to a public BC which verifies dedicated security and privacy. A set of three optimizations are carried out in the presented ELIB model include lightweight consensus algorithm, certificateless (CC) cryptography and Distributed Throughput Management (DTM) scheme. A detailed simulation takes place under different scenarios in terms of processing time, energy usage and overhead. The ELIB attains a total of 50% saving in processing time on comparing to baseline method with the minimum energy consumption of 0.07mJ. The obtained experimental outcome indicated that the ELIB shows maximum performance under several evaluation parameters.
Article
In this paper, we propose an optimal charging scheduling algorithm for hybrid vehicle charging scenarios. Unlike traditional charging scheduling algorithms, which only consider the vehicle-to-vehicle (V2V) and grid-to-vehicle (G2V) scenarios, the new and hybrid charging scenario including the emerging mobile charging vehicles (MCV), i.e. mobile charging vehicle-to-vehicle (MCV2V), G2V and V2V is considered in this paper. Moreover, the proposed optimal charging scheduling framework based on consortium blockchains ensures the security and privacy of electricity trading. The proposed scheduling algorithm is based on a double-objective optimization model aiming at maximizing user's satisfaction and minimizing users’ cost, while considering diverse metrics like location of charging and discharging entities, the time of waiting, and driving speed of EVs, etc. In order to solve the optimization model, an improved Non-dominated Sorting Genetic Algorithm (NSGA) is proposed. Experiments based on the real map of Beijing is done to evaluate the performance of proposed scheduling algorithm. The results show that the proposed algorithm can achieve better performance in terms of user's satisfaction and user's cost comparing with V2V based algorithm and G2V based algorithm.
Article
With the dramatically increasing deployment of IoT devices, storing and protecting the large volume of IoT data has become a significant issue. Traditional cloud-based IoT structures impose extremely high computation and storage demands on the cloud servers. Meanwhile, the strong dependencies on the centralized servers bring significant trust issues. To mitigate these problems, we propose a distributed data storage scheme employing blockchain and cetrificateless cryptography. Our scheme eliminates the traditional centralized servers by leveraging the blockchain miners who perform "transaction" verifications and records audit with the help of certificateless cryptography. We present a clear definition of the transactions in a non-cryptocurrency system and illustrate how the transactions are processed. To the best of our knowledge, this is the first work designing a secure and accountable IoT storage system using blockchain. Additionally, we extend our scheme to enable data trading and elaborate how data trading can be efficiently and effectively achieved.