ArticlePublisher preview available
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

Industrial IoT in the advancement of organizations consigns to the next level in order to trace and manage every single activity of their entities. However, the interdependence, implementation and communication among such wireless devices also known as IoT devices that lead to various secrecy and personnel concerns. Even though the use of smart sensors in industries assists and reduces human efforts with the increased quality besides of enhanced production cost. Several attacks may further encountered by various attackers by hacking several sensors/objects/devices activities. In this paper, in order to preserve transparency and secure each and every activity of smart sensors, we have proposed a secure wireless mechanism using Blockchain technology that stores extorted proceedings of each record into number of blocks. Further, the simulation results of proposed blockchain mechanism are executed against various security transmission processes. In addition, the simulated results are scrutinized besides traditional mechanism and verified over certain metrics such as Probability of attack success, ease of attack detection by the system, falsification attack, authentication delay and probabilistic scenarios to appraise the authenticity of IoT devices.
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
1 3
Journal of Ambient Intelligence and Humanized Computing (2021) 12:533–545
https://doi.org/10.1007/s12652-020-02017-8
ORIGINAL RESEARCH
A secure IoT sensors communication inindustry 4.0 using blockchain
technology
GeetanjaliRathee1· M.Balasaraswathi2· K.PrabhuChandran3· SharmiDevGupta4· C.S.Boopathi5
Received: 19 November 2019 / Accepted: 17 April 2020 / Published online: 28 April 2020
© Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract
Industrial IoT in the advancement of organizations consigns to the next level in order to trace and manage every single
activity of their entities. However, the interdependence, implementation and communication among such wireless devices
also known as IoT devices that lead to various secrecy and personnel concerns. Even though the use of smart sensors in
industries assists and reduces human efforts with the increased quality besides of enhanced production cost. Several attacks
may further encountered by various attackers by hacking several sensors/objects/devices activities. In this paper, in order to
preserve transparency and secure each and every activity of smart sensors, we have proposed a secure wireless mechanism
using Blockchain technology that stores extorted proceedings of each record into number of blocks. Further, the simula-
tion results of proposed blockchain mechanism are executed against various security transmission processes. In addition,
the simulated results are scrutinized besides traditional mechanism and verified over certain metrics such as Probability of
attack success, ease of attack detection by the system, falsification attack, authentication delay and probabilistic scenarios
to appraise the authenticity of IoT devices.
Keywords Industrial IoT· Blockchain· Industry 4.0· Sensors security· IoT devices· Security· Wireless sensors
1 Introduction
Traditionally, the monitoring and controlling system in
industries which oversees product manufacturing details,
records of product (selling or consuming information),
workers information that acts on the value chain, is usually
time consuming, inefficient and slow. The Facilities Manager
has to physically concentrate to the entire control system
that regularly leads to impediment in action (Al-Fuqaha
etal. 2015; Rathee etal. 2019a, b, c, 2020). Further, it is
very difficult to trace the industry’s products and its work-
ers’ locations in real time scenarios. Sometimes, the lack of
traceability in real time derives into inefficiency and dearth
of knowledge about the performance, record of the prod-
uct and workers’ activity may lead to a great loss to the
industry’s growth. Now days, Industry 4.0 (Lee etal. 2015;
Rathee etal. 2019a, b, c, 2020) consigns to the next phase
in the advancement of the organizations to trace and manage
each activity of their individuals. Industry IoT principle is to
gather, analyze, record the information and control the entire
activities of individuals with computerized machine in real
time with abridged production cost and enhanced quality. It
is in a straight line related to the expansion of smart sensors
* Geetanjali Rathee
geetanjali.rathee123@gmail.com
M. Balasaraswathi
balameau2005@gmail.com
K. Prabhu Chandran
prabhuchandran24@gmail.com
Sharmi Dev Gupta
sharmidevgupta@gmail.com
C. S. Boopathi
csbsrm@gmail.com
1 Department ofComputer Science andEngineering, Jaypee
University ofInformation Technology, Waknaghat,Solan,
India
2 Department ofECE, Saveetha School ofEngineering,
Saveetha Institute ofMedical andTechnical Sciences,
Chennai, India
3 Department ofECE, Sreenivasa Institute ofTechnology
andManagement Studies (Autonomous), Chittoor, India
4 AIG PPS AVM, Cognizant Technology Solutions Private
Limited, Unitech, NewTown, Kolkata700156, India
5 Department ofEEE, SRM University, Chennai, India
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
... However, a malicious intermediary node adds incorrect data to the event, which results in the failure of authentication process. The mechanism for trust factor evaluation is not added in the proposed framework of [23]. Only the registration of users and sensors is done. ...
... Current IIoTs rely on the centralized architecture and leads to single point of failure and privacy issues [23]. ...
Article
Full-text available
A blockchain based scheme is proposed in the underlying work for performing registration, mutual authentication, data sharing and nonrepudiation in internet of wireless sensor things. The nodes are divided into three types in the proposed scheme: sensor nodes, cluster heads and coordinators. Moreover, a consortium blockchain, deployed on the coordinators, is employed for storing the legitimate nodes' identities. Furthermore, coordinators also help in the execution of smart contracts, which facilitate the sensor nodes in authentication, data sharing and nonrepudia-tion processes. Additionally, for storing the nodes' ambient data, artificial intelligence based interplanetary file system (IPFS) is used. Furthermore, to increase the transaction throughput and efficiency of the network, a stellar consensus protocol is used. From the simulation results, the transaction latency of the proposed model is approximately 81.82% lower than the proof of work based model. Moreover, the gas consumption of data request and provisioning is 0.10 US Dollars.
... Rathee et al. [31] An IIoT framework based on BC for sensor authentication is proposed by the authors. ...
... The authors in [31] propose an IIoT framework based on BC for sensors authentication. Therefore, a performance analysis is performed by measuring the probability of attack success, a created hazard by the intruder and authentication accuracy metrics versus the number of IoT devices via an NS2 simulator. ...
Article
Full-text available
In this paper, a layered architecture incorporating Blockchain technology (BCT) and Machine Learning (ML) is proposed in the context of the Industrial Internet-of-Things (IIoT) for smart manufacturing applications. The proposed architecture is composed of five layers covering sensing, network/protocol, transport enforced with BCT components, application and advanced services (i.e., BCT data, ML and cloud) layers. BCT enables gathering sensor access control information, while ML brings its effectivity in attack detection such as DoS (Denial of Service), DDoS (Distributed Denial of Service), injection, man in the middle (MitM), brute force, cross-site scripting (XSS) and scanning attacks by employing classifiers differentiating between normal and malicious activity. The design of our architecture is compared to similar ones in the literature to point out potential benefits. Experiments, based on the IIoT dataset, have been conducted to evaluate our contribution, using four metrics: Accuracy, Precision, Sensitivity and Matthews Correlation Coefficient (MCC). Artificial Neural Network (ANN), Decision Tree (DT), Random Forest, Naive Bayes, AdaBoost and Support Vector Machine (SVM) classifiers are evaluated regarding these four metrics. Even if more experiments are required, it is illustrated that the proposed architecture can reduce significantly the number of DDoS, injection, brute force and XSS attacks and threats within an advanced framework for sensor access control in IIoT networks based on a smart contract along with ML classifiers.
... It was reported that cybersecurity issues are still a challenge for adopting smart manufacturing. Rathee et al. [27] presented a framework for securing the use of wireless IoT devices in industrial environment by utilizing blockchain. The proposed methodology was tested against security threats through simulation, and it was reported that the developed method performed efficiently. ...
Article
Full-text available
In modern scenarios, Industry 4.0 entails invention with various advanced technology, and blockchain is one among them. Blockchains are incorporated to enhance privacy, data transparency as well as security for both large and small scale enterprises. Industry 4.0 is considered as a new synthesis fabrication technique that permits the manufacturers to attain their target effectively. However, because numerous devices and machines are involved, data security and privacy are always concerns. To achieve intelligence in Industry 4.0, blockchain technologies can overcome potential cybersecurity constraints. Nowadays, the blockchain and internet of things (IoT) are gaining more attention because of their favorable outcome in several applications. Though they generate massive data that need to be effectively optimized and in this research work, deep learning-based techniques are employed for this. This paper proposes a novel mutated leader sine cosine algorithm-based deep convolutional neural network (MLSC-DCNN) in order to attain a secure and optimized IoT blockchain for Industry 4.0. Here, an MLSC is hybridized using a mutated leader and sine cosine algorithm to enhance the weight function and minimize the loss factor of DCNN. Finally, the experimentation is carried out for various simulation measures. The comparative analysis is made for Best Tip Selection Method (BTSM), Smart Block-Software Defined Networking (SDN), and the proposed approach. The evaluation results show that the proposed approach attains better performances than BTSM and SDN.
Article
Missing data is universal complexity for most part of the research fields which introduces the part of uncertainty into data analysis. We can take place due to many types of motives such as samples mishandling, unable to collect an observation, measurement errors, aberrant value deleted, or merely be short of study. The nourishment area is not an exemption to the difficulty of data missing. Most frequently, this difficulty is determined by manipulative means or medians from the existing datasets which need improvements. The paper proposed hybrid schemes of MICE and ANN known as extended ANN to search and analyze the missing values and perform imputations in the given dataset. The proposed mechanism is efficiently able to analyze the blank entries and fill them with proper examining their neighboring records in order to improve the accuracy of the dataset. In order to validate the proposed scheme, the extended ANN is further compared against various recent algorithms or mechanisms to analyze the efficiency as well as the accuracy of the results.
Chapter
The pervasive adoption of digitalized systems along with evolving security threats has led to major security concerns. Digitalization enablers, such as Internet of Things (IoT) and Cyber-Physical Systems (CPS) are complex and fuzzy concepts. They are exposed to the outside world due to their physical nature while having cyber vulnerabilities. It is due to the interconnections and the interdependencies in the physical and the cyber world, any exploitation in one section of the system can form a cascading threat to other sections. Consequently, process system's reliability, availability, and integrity (data provenance, immutability, and confidentiality) are hard to be assured which lead to concerns of loss of critical infrastructure, compromised safety of processes and breaches on critical information. To address security of digitalized process systems, this chapter is structured under the following key headings: Review of physical and cyber threats in digitalized process systems, Review of physical and cyber defense/protection measures, and Approaches for intrusion modeling.
Article
Full-text available
This paper aims to comprehensively review 891 documents in the Scopus database about Internet of Things (IoT) in Ind 4.0 to understand the historical growth, current state, and potential expansion trend. From 2014 to 2020, a systematic methodology gathered information on IoT in Ind 4.0 documents in various Scopus databases. The relevant IoT research in Ind 4.0 documents is provided, and their types, publications, citations, and predictions are discussed. The VOSviewer 1.16.6 and Biblioshiny 2.0 applications display IoT status in Ind 4.0 publications for visualization research. The citation review aims to find the most prominent and influential authors, sources, papers, countries, and organizations. For citation analysis and ranking, document selection criteria were well defined. The author keywords, index keywords, and text data content analysis were used to identify the hotspots and development trends. The yearly IoT in Ind 4.0 article publications presented a speedily increasing trend, and a curve was fitted employing an exponential function. The paper “Intelligent manufacturing in the context of Industry 4.0: a review” was rated first with 754 citations. With 1629 citations, the “International Journal of Production Research” was ranked #1 along with Wan J. The South China University of Technology in Guangzhou, China, was placed first along with the United States as the most prolific and influential country. ‘Industry 4.0’ appeared the first time in 2014 with an application of IoT in Ind 4.0 with an overall appearance of 528, followed by the ‘internet of things’ in 2015, three times with a total count of 220 up to 2020. The IoT in Ind 4.0 assessment and bibliometric analysis intended to provide intellectuals a broad perspective working in IoT in Ind 4.0. Scholars should understand the hotspots in this area as soon as possible. This is also the first paper to thoroughly use bibliometric research to examine the IoT in Ind 4.0 literature. It will assist researchers of IoT in Ind 4.0 in expanding their knowledge and quickly comprehending the development status and pattern.
Article
Blockchain technology comprises security algorithms that work efficiently on battery powered devices. Low energy and delay indicate the effectiveness of any security mechanism. However, it is challenging for the algorithms to achieve low energy and delay because of various attacks. To identify and protect against various kinds of IoT attacks, a light‐weighted trust, and blockchain‐powered PoW framework are proposed in this article. A proof of work (PoW) consensus is utilized on the router side to validate the block before the blockchain accepts it. The flexibility of block design is the main benefit of PoW powered blockchain, so it can modify based on IoT applications. Moreover, trust is one of the major issues in IoT networks. Trust can be established among users during node processing and communication between nodes. This trust is significant for transferring the data from source to destination and the uncertainty of service availability in IoT applications. A trust evaluation between participating nodes and the blockchain mechanism are integrated into this work to cover authorization and authentication. The efficiency of the proposed trust model is evaluated in terms of trust evolution and trustworthy network and compared with the existing trust models. In the experimental analysis, the efficiency of the proposed blockchain‐powered network is analyzed in terms of energy, delay and processing time. The experimental outcomes proved that the proposed lightweight trust and blockchain‐powered PoW are more efficient than other approaches.
Article
Full-text available
In this paper, we have demoralized the transmission processing concerns of fog nodes and IoT device layer attack during the handoff (mobility) of IoT devices in the fog environment. A secure routed and handoff mechanism is proposed in order to avoid the attack by exploring the trust value and rating of each fog IoT and fog nodes/devices based on their communication behaviour. A trust manager is established between fog layer and IoT layer that keeps the record of all fog nodes in its look-up table and detects the malicious fog and IoT nodes. Further, the fog nodes computes rating of their service requested IoT layer and routed the services through highly trusted possible path. The proposed mechanism is validated against conventional security approaches over certain networking parameters.
Article
Full-text available
Recently, connected vehicles (CV) are becoming a promising research area leading to the concept of CV as a Service (CVaaS). With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of vehicular networks are emerging. In this context, the original concept of vehicular networks is being transformed into a new concept known as connected and autonomous vehicles. Autonomous vehicular use yields a better experience and helps in reducing congestion by allowing current information to be obtained by the vehicles instantly. However, malicious users in the internet of vehicles may mislead the whole communication where intruders may compromise smart devices with the purpose of executing a malicious ploy. In order to prevent these issues, a blockchain technique is considered the best technique that provides secrecy and protection to the control system in real time conditions. In this paper, the issue of security in smart sensors of connected vehicles that can be compromised by expert intruders is addressed by proposing a blockchain framework. This study has further identified and validated the proposed mechanism based on various security criteria, such as fake requests of the user, compromise of smart devices, probabilistic authentication scenarios and alteration in stored user’s ratings. The results have been analyzed against some existing approach and validated with improved simulated results that offer 79% success rate over the above-mentioned issues.
Article
Full-text available
Communicating Things Network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is dependent on human interference. Interconnected physical objects in the network communicate with each other and facilitate intelligent decision-making by monitoring and analyzing their surroundings. In today's era, CTNs are playing a significant role in daily activities by providing a substantial reduction in costs with increased visibility and efficiency in all aspects of businesses and individuals. In this manuscript, we have considered an important application of CTNs (i.e., IoT) and have proposed a secure hybrid industrial IoT framework using the Blockchain technique. We have used a hybrid industrial architecture where different branches of a company are located in more than one country. Although IoT devices are used in many organizations and assist in reducing their production costs along with improving quality, several threats can occur in IoT devices initiated by various intruders. Intruders may compromise IoT devices with the purpose of performing malicious activities. For example, a company's employee may steal some product or may rest during working hours. To prevent these issues, the Blockchain technology is considered as the best technique that provides secrecy and protects the control system in real-time conditions. In this manuscript, we have used a Blockchain mechanism to extract information from IoT devices and store extracted records into Blockchain to maintain transparency among various users located at different places. Furthermore, the experimentation of the proposed framework has been performed against the internal communication of Blockchain where IoT devices are compromised by several intruders. Results have been analyzed against the conventional approach and validated with improved simulated results that offer an 89% success rate over user request time, falsification attack, black hole attack, and probabilistic authentication scenarios because of the Blockchain technology.
Article
Full-text available
Through the propagation of technology in recent years, people communicate in a range of ways via multimedia. The use of multimedia technique in healthcare system also makes it possible to store, process and transfer the patient's data presented in variety of forms such as images, text and audio through online using various smart objects. Healthcare organizations around the world are transforming themselves into more efficient, coordinated and user-centered systems through various multimedia techniques. However, the management of huge amount data such as reports and images of every person leads to increase the human efforts and security risks. In order to overcome these issues, IoT in healthcare enhances the quality of patients care and reduce the cost by allocating the medical resources in an efficient way. However, a number of threats can occur in IoT devices initiated by various intruders. Sometimes, in order to make their personal profit, even though the medical shop or pathology labs are not of good reputation, the doctors forced the patients to do the lab tests, or buy the medicines from those organizations only. Therefore, security should be at the staple of outlook in IoT elucidations. In order to prevent these issues, Blockchain technology has been encountered as the best technique that provides the secrecy and protection of control system in real time conditions. In this manuscript, we will provide a security framework of healthcare multimedia data through blockchain technique by generating the hash of each data so that any change or alteration in data or breaching of medicines may be reflected in entire blockchain network users. The results have been analyzed against conventional approach and validated with improved simulated results that offer 86% success rate over product drop ratio, falsification attack, worm hole attack and probabilistic authentication scenarios because of Blockchain technique.
Article
Full-text available
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructure. However, UAV networks raise security challenges because of its dynamic topology. This paper proposes a technique for maintaining security in UAV networks in the context of surveillance, by corroborating information about events from different sources. In this way, UAV networks can conform peer-to-peer information inspired by the principles of blockchain, and detect compromised UAVs based on trust policies. The proposed technique uses a secure asymmetric encryption with a pre-shared list of official UAVs. Using this technique, the wrong information can be detected when an official UAV is physically hijacked. The novel agent based simulator ABS-SecurityUAV is used to validate the proposed approach. In our experiments, around 90% of UAVs were able to corroborate information about a person walking in a controlled area, while none of the UAVs corroborated fake information coming from a hijacked UAV.
Chapter
This chapter discusses the data processing models which are applicable in the blockchain technology. It also allows providing the distributed ledger technology for handling data. By exercising this chapter, one can create the own methodology for blockchain without hopping onto preexisting knowledge on it. This chapter also provides the underpinnings and practical aspects of blockchain implementation on platforms like Ethereum and Hyperledger Fabric.
Chapter
Blockchain is a database of records, which tracks Querythe history of all transactions and communications between different nodes of a network. It provides a decentralized platform to execute transactions with mutual trust among the participants, while at the same time, eliminating the presence of a central mediating authority. Record of every transaction is stored in the Blockchain and is entirely tamper-proof. Blockchain creates a peer-to-peer network where all nodes get to verify transactions occurring in the network, through a consensus-based governance system. It has been used to implement the world’s most popular cryptocurrency Bitcoin. This is a highly promised technology, which is being adopted and implemented in several domains, such as Internet-of-Things-based systems, health care, energy systems, education systems, banking, and many more.
Article
The invention of blockchain technology has paved the way for the decentralization of existing systems. Blockchains have consistently delivered prominent applications, particularly in the finance sector. The most popular application of blockchain is cryptocurrency. Blockchain technology however has a variety of applications beyond cryptocurrencies. This article discusses the basics of blockchain technology along with some of its potential applications. With the rising use of this technology, the security of these systems is a major concern. The security threats and risks to blockchain systems are also reviewed along with the tools and methodologies to prevent and handle it in more sophisticated manner.
Article
The Internet of Things (IoT) contains a diverse set of sensors, actuators and other Internet-connected devices communicating, processing data and performing a multitude of functions. It is emerging as an integral part of societal infrastructure enabling smart services. However, these connected objects might have various vulnerabilities that can lead to serious security compromises and breaches. Securing and hardening of IoT systems is thus of vital importance. In that regard, attack graphs provide analytical support to prevent multistep network attacks by showing all possible sequences of vulnerabilities and their interactions. Since attack graphs generally consist of a very large number of nodes, it is computationally challenging to analyze them for network hardening. In this paper, we propose a greedy algorithm using compact attack graphs to find a cost-effective solution to protect IoT systems. First, we extract all possible attack paths which reach predetermined critical resources embedded in the network. Then, exploit or initial condition with minimum effective cost is selected to be removed. This cost is calculated as a function of contribution to attack paths (the higher, the better) and removal cost (the lower, the better). This process continues iteratively until the total cost exceeds the allocated budget. The experimental results show that our algorithm scales almost linearly with the network size and it can be applied to large-scale graphs with a very large number of IoT nodes. In addition to network-hardening, our proposal measures the security level of the network in every step to demonstrate the vulnerability grade of the system.