Conference PaperPDF Available

Abstract and Figures

In this paper, blockchain and InterPlanetary File System (IPFS) based service model is proposed for Internet of Things (IoT). In the IoT, nodes' credentials and generated data are stored on the IPFS in a hashed format. In order to ensure the security of data, encrypted hash is stored on the blockchain. However, blockchain is very expensive for storing the large amount of data. While, in the case of centralized database, there is a possibility of data tampering and information leakage. Moreover, a service model is proposed for sharing the services from the service providers to the consumers. In addition, a product consensus mechanism is performed between admin and user which is replaced with a blockchain service model. Due to this, consumers send the request to the service provider through blockchain for the required services. Though, peer and minor nodes' involvement in consensus mechanisms, hinder in finding the service provider. Moreover, existing scheme is computationaly expensive and delay occurs due to the lengthy procedure of verification and consensus. Here, blockchain is used to record the evidence of the services. Also, a service verification scheme is designed using the Secure Hash Algorithm-256 (SHA-256). Furthermore, the smart contract is utilized to settle disputes between consumers and service providers. The simulation results show that Proof of Authority consumes less gas and has low latency as compared to Proof of Work, which represents the efficiency and effectiveness of the proposed solution.
Content may be subject to copyright.
Blockchain and IPFS based Service Model for the
Internet of Things
Hajra Zareen1, Saba Awan1, Maimoona Bint E Sajid1, Shakira Musa Baig1, Muhammad Faisal2, Nadeem Javaid1,
1Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan
2Iqra National University, Peshawar, Hayatabad Peshawar 25000, Pakistan
Email:hajra.zareen786@gmail.com ,sabaawan046@gmail.com, maimoonasajid176@yahoo.com,
shakira.musabaig1998@gmail.com, mfaisal5751@gmail.com
Corresponding author: nadeemjavaidqau@gmail.com; www.njavaid.com
Abstract—In this paper, blockchain and InterPlanetary File
System (IPFS) based service model is proposed for Internet
of Things (IoT). In the IoT, nodes’ credentials and generated
data are stored on the IPFS in a hashed format. In order to
ensure the security of data, encrypted hash is stored on the
blockchain. However, blockchain is very expensive for storing
the large amount of data. While, in the case of centralized
database, there is a possibility of data tampering and information
leakage. Moreover, a service model is proposed for sharing the
services from the service providers to the consumers. In addition,
a product consensus mechanism is performed between admin and
user which is replaced with a blockchain service model. Due to
this, consumers send the request to the service provider through
blockchain for the required services. Though, peer and minor
nodes’ involvement in consensus mechanisms, hinder in finding
the service provider. Moreover, existing scheme is computationaly
expensive and delay occurs due to the lengthy procedure of
verification and consensus. Here, blockchain is used to record
the evidence of the services. Also, a service verification scheme
is designed using the Secure Hash Algorithm-256 (SHA-256).
Furthermore, the smart contract is utilized to settle disputes
between consumers and service providers. The simulation results
show that Proof of Authority consumes less gas and has low
latency as compared to Proof of Work, which represents the
efficiency and effectiveness of the proposed solution.
Index Terms—Internet of Things, Blockchain, InterPlanetary
File System, Smart Contract, Consensus Mechansism, Service
Model.
I. INTRODUCTION
Internet of Things (IoT) plays a significant role in today’s
world through promoting social and economic development.
A Wireless Sensor Network (WSN) is considered the key
technology in IoT architecture, which plays a significant
role in promoting IoT. The IoT is now extensively used
in various fields like smart cities, healthcare, smart power
grids, etc. As IoT consists of many devices, so the security
of IoT devices is compromised because of different kinds
of cyberattack. Therefore, several centralized and distributed
architecture have been proposed to tackle these attacks. How-
ever, the existing solutions are not suitable due to single point
of failure, high latency, storage constraints, high computa-
tional cost, big data collection and lack of privacy which
leads to inaccurate decision making [1]. The edge, cloud
and transparent computing have been developed to extend
terminals devices’ functionality with the on demand service
provisioning scheme [2]. The existing service provisioning
schemes face security challenges like a service provider may
provide nonconformance or malicious services. In addition,
the dishonest clients may deny from the correct services.
The traditional nonrepudiation mechanisms can be classified
into two categories: Trusted Third Party (TTP) and Non TTP
schemes. In the former scheme, single point of failure and
performance bottlenecks are the major issues. While in a later
scheme, high performance cost, no nonrepudiation evidence
and weak evidence are notable issues [3].
Nakamoto introduced the blockchain in 2008 which consists
of blocks that are in sequences and chained together. Each
block contains the hash of the previous block, current block
and data. Data of each block is stored in the form of a
Merkle Tree (MT). If any data tamper is performed, it can
be easily identified while comparing the data with the root
hash [6]. Blockchain is utilized to overcome the limitations
of a centralized system and involvement of a third party.
Blockchain consists of a Peer-to-Peer (P2P) network and
distributed ledger, which offers tamper resistant, secure and
immutable services. Blockchain’s first implementation was
bitcoin. Later various domains adopted it, such as the Internet
of Vehicles, IoTs, the energy sector, etc., [4].
However, blockchain is very expensive for storing a large
amount of data. As two databases (Blockchain and local
database) are considered to store each nodes’ data that require
extra maintenance cost and storage capacity. Moreover, de-
registration and re-registration of the nodes require extra
storage space. Also, there is a possibility of data tampering and
information leakage. Furthermore, product consensus among
users and admin involves minor nodes and peer nodes. In-
addition, computational cost and delay increases due to the
lengthy procedure of verification and consensus mechanism.
To overcome the issues addressed above, blockchain and
InterPlanetary File System (IPFS) based service model for IoT
is proposed.
The contributions of the paper are as follows:
the blockchain and IPFS based service model is proposed.
The blockchain is utilized to store the evidence of the
services while IPFS is used to store and share data
securely,
the service verification scheme is designed which is based
on the Secure Hashing Algorithm (SHA-256) and
the smart contract is utilized to settle service disputes
between consumers and service providers.
The remainder of the paper is organized as follows: related
studies are presented in Section II. Proposed system model is
demonstrated in Section III. Simulation Results are discussed
in Section IV and Section V presents the conclusion of this
work.
II. RE LATE D WOR K
Due to many IoT devices, security is a major concern
in IoT devices, so it is urgent to protect them from cyber
attacks. Several centralized and distributed architecture has
been proposed to tackle these attacks. Existing solutions are
not suitable due to single point of failure, high latency, storage
constraints and high computational cost. Besides this, the
traditional systems face issues like big data collection and
lack of privacy. A sufficient collection of data is not possible,
leading to inaccurate decision-making [1] .
The Industrial IoT (IIoT) is referred to as smart sensors
to enhance manufacturing and industrial processes. Network
computing technologies increase the functionalities of IIoT.
Almost all existing service-provisioning schemes face new se-
curity challenges, which causes the anxiety of stakeholders and
concern about using such provisioning technologies. A service
provider may provide nonconformance or malicious services.
In comparison, a dishonest client may deny getting the correct
services. The traditional Nonrepudiation mechanisms can be
classified into two categories: TTP and Non-TTP schemes. In
the former scheme, single point of failures and performance
bottlenecks are the major issues in centralized TTP. However,
in the later scheme high-performance cost, no nonrepudiation
evidence and provides weak evidence for any party for self-
proving [3].
WSNs consist of issues related to the privacy and security
of the data due to constraints. Besides this, authentication
of every node and managing trust are necessary. However,
previous work either handles security, privacy, or authen-
tication and trust management, but none of them handles
the trust management and authentication in WSN and IoT
[4]. The traditional IoT identity authentication protocols uses
centralized authentication methods and mostly rely on the
trusted third parties. As a result, it causes single point of failure
[7].
The WSN has a self-organizing structure where various
sensor nodes are being deployed at a random positions to
collect data from the physical environment. There are two
types of sensor nodes named beacon and unknown nodes.
Beacon nodes know their location through Global Positioning
System(GPS) or manually assigned them. At the same time,
Unknown nodes get their position through localization. As
localization has a significant impact in many WSNs applica-
tions but accurate location estimation is still a big challenge.
Localization has many problems like location estimation due
to which accuracy is affected. In contrast, energy conservation
is another issue that decreases the lifetime of a WSN. Another
concern is malicious attack or activity. In this case, false
location information is broadcasted in the network [8]. In the
routing algorithms, malicious nodes attack and compromise
the routing nodes thus they sends the wrong queue length
information to maximize the chances of getting the packets.
When it receives the packets, it does not forward them to
neighbor nodes and discard them, making the black hole in
the network. This phenomenon is called a black hole attack.
So, for trust management among routing nodes, a third party is
utilized, but it does not tackle the multi-hop distributed WSN.
Besides this, there is a possibility of attack and compromised
by malicious nodes, so the security and fairness cannot be
assured [9].
All IoT devices contain personal information and are con-
nected to the internet. So, for this reason, it requires cer-
tification. The lightweight IoT devices that perform simple
tasks have low-performance chipsets or no operating system
running. Most IoT devices do not have authentication methods
due to the limited resources. It does not support encryption
protocol or certificate and then it is vulnerable [10]. The rout-
ing protocols require CA to authenticate, identify or remove
IoT devices. There is a trust issue between the IoT vendors
in central management due to disagreement in a centralized
system. Besides this, it needs a secret key sharing mechanism,
which requires high cost for implementation [11].
In a dynamic WSNs, key management security is compro-
mised by BS, which is untrusted and easily compromised.
Also, it causes additional overhead on sensors in the key
distribution scheme. Besides this, it consists of a complex
design protocol [12]. The main issue of hierarchical sensor
networks is data transmission’s security and privacy without
high computational cost [13]. As the mobile phones consist
of sensor nodes that have limited resources. So, utilizing
blockchain requires abundant resources to perform Proof of
Work(PoW). Besides this, WSN has limited battery power, so
it drained quickly and thus the whole network is affected [14].
The authenticity of the data and user privacy in a vehicular
sensor network is the major issue [15].
Mobile devices consist of limited resources, so applying
blockchain on the wireless mobile network requires abundant
resources (computational and storage) to solve the PoW puzzle
for the mining process [16]. No secure caching scheme can be
tackled in the Information-Centric Network (ICN) that based
on WSNs [17]. Nodes in a WSN have limited energy and
storage capacity. Due to this reason, many network nodes
prefer to preserve their resources. If most nodes act selfishly
and do not forward the packets, then the whole network
will not work properly [18]. Crowdsensing networks utilized
mobile phone sensors for the collection of data to reduce
the cost. However, there is a threat of privacy leakage. Due
to this reason, users do not trust on it, upload incorrect
information and also their involvement is low [19]. Now a
day’s WSN plays a significant role. However, sensors nodes
have constraints like limited energy and transmission range.
Due to this reason, they faces several threats. These threats
can be divided into two parts data and routing. A data attack
malicious node changes the data in the payload for learning
the transmission details or performing the variation. While in
routing attacks, malicious nodes choose the wrong path by
enforcement [20].
WSN has a self-organizing structure where various sensor
nodes are being deployed at random positions to collect data
from the physical environment. There are two types of sensor
nodes named beacon and unknown nodes. Beacon nodes
know their location through GPS or manually assigned them.
In comparison, Unknown nodes get their position through
localization. There are two types of localization algorithms
known as range based and range-free. The former approach
requires special hardware, so its procedure needs high cost
for localization. While in the case of range free approach, the
mobility of sensor nodes can change the framework’s network
topology. Besides this, constant alarming situation because of
malicious nodes make the framework overprotective [21].
Different types of threats occur in Industrial IoT. Workers
gain access to the restricted area of the industry, steal, or mis-
place the products, information, or important records through
compromising the sensor nodes, moreover, by getting open
access to the information. Furthermore, to register the IoT
devices, collect and verify the registration every time. So that
no one can be able to modify or change it [22]. WSNs have
a significant impact on IoT development. There are mainly
two types of threats in WSNs, external and internal attacks.
In the external attacker attacks from outside the network,
while an internal attack node is compromised, it attacks from
within the network. So, the detection of a malicious node
within the network is very important. Also, there is no way to
record the original data and detection process to trackback later
[23]. Various challenges occur when blockchain is deployed
in IIoT. Blockchain requires massive computing power in
deployment. While IIoT demands maximum storage capacity
and bandwidth to handle a huge amount of data. For these
reasons, resource-constrained devices do not support certain
operations because of their conflicts between heterogeneous
network resources and IIoT devices [24].
The Central Processing Unit usage rate of the mining pro-
cess, hash operations, hash quality, self-proposed block num-
ber, system throughput, remaining blocks filtered by UBOF in
different scale of accounts, remaining blocks in different scale
of throughput and storage cost are the key parameters that
are considered for the validation of the proposed scheme [25].
Network latency and data delivery issues occur due to mobile
sensors. Mobile WSNs sensor nodes cannot send information
to their mobile CH until the mobile CH comes to its cluster
boundary. Besides this, mobile CHs rises the possibility of
malicious nodes to join the network and compromise its data
privacy [26].
Shifting the global population in the urban area can maxi-
mize the burden on smart city network architecture in struc-
tural scalability, bandwidth constraints, low latency, high mo-
bility, single points of failure, security and privacy of data
[27]. As IoT devices contain a huge amount of data to access
data, it takes a lot of time as IoT sensors have limited
computing power and storage capacity. Due to this reason,
it quickly runs out of battery when process the transactions
faster. Limited bandwidth and slow update rate can cause
major issues in time-critical applications as it requires faster
information updates [28].
III. SYS TE M MOD EL
In this paper, blockchain and IPFS based Service Model is
proposed which is motivated from [3], [6]. It consists of the
following three entities.
Service Provider: Any person or organization which owns the
data and provide the services to the consumers (C).
Consumer: Make a request for the service and execute the
service program.
Arbitrator: It is from the minor nodes which uses the smart
contract for abitration. Arbitrator (A) responsibility is to settle
disputes between C and service provider (SP). A is also
utilized to maintain the distributed ledger.
The proposed system consists of two phases, namely registra-
tion and service model.
A. Registration
The registration of every node is compulsory before pro-
viding any services. So, all the nodes are registered in the
blockchain in the registration phase and contain a unique
account address. Also, the node comprises other relevant
information like services name, services data and hash value.
After successful registration of the nodes, they can provide the
desired services. The service record of every node is stored on
the IPFS.
B. Service Model
This section contains the description of Elliptic Curve
Integrated Encryption Scheme (ECIES) and IPFS. Moreover,
blockchain and IPFS based service model is described.
1) Elliptic Curve Integrated Encryption Scheme: ECIES is
the enhancement of Elliptic Curve Cryptography (ECC) which
is considered as the public key-based encryption scheme. It
gives the semantic security against the intruders [29]. As,
the intruder can utilizes plaintext and ciphertext attacks. Our
service model uses ECIES to encrypt the services data.
2) InterPlanetary File System: Our service model utilizes
a distributed file storage system, IPFS. As IPFS is content-
addressable, so if any modification is done on the data, its
content address also changes. After encryption of data through
ECIES, it is uploaded on the IPFS. Hash is generated against
each data which is later stored on the blockchain.
3) Description of the Service Model: In traditional scheme
product consensus between admin and user is replaced through
the service model. The user sends a request to the SP for
the required services so no Cental Authority (CA) is used to
Registration
Data Storage and Encryption
Service Model
Client Service Provider Registration
Phase1: Node Registration in blockchain
2.3 Deliver S2 through IPFS
2.5 Publish S1
2.2.Publish Hash (S2)
2.4 Confirm Hash (S2)
2.6 Confirm Hash (S)
2.1 Request Service S
Phase2: Service Model
Generate
Shared to
Fig. 1. Proposed system model
find a respective SP. Here, blockchain is utilized to record
the evidence of the services. The whole service is split into
two nonexecutable fragments. The major off-chain part is sent
through IPFS and the tiny part is delivered via on-chain, which
can reduce the burden on blockchain and enforce the C to
submit evidence of the off-chain part (IPFS) on the blockchain.
So, through these steps fairness of the mechanism is ensured.
Also, a service verification scheme is designed based on SHA-
256 that only validates the on-chain evidence instead of the
whole service program. The smart contract based technique is
utilized to settle service disputes between C and SP. It provides
fair and effective dispute resolution.
The whole service scheme process is demonstrated as follows
(also see the Fig.1)
Step 1: First, C sends the request of the transaction to SP for
the desired service. This request consists of the service name
and crypto token.
Step 2: SP calculates the hash of S2, which is a major part
of service S2, by using the hash function SHA-256. After
calculating the hash, it is encapsulated with the token within
the transaction and then sent to the respective C for the
evidence (on-chain).
Step 3: As Hash of S2 is published on the blockchain
successfully. Now SP sends the S2 part through IPFS to C.
As the major part is sent through IPFS and the tiny part is
delivered via on-chain, it reduces the burden from blockchain
and enforces the client to submit evidence of the off-chain part
(IPFS) on the blockchain. So, these steps ensure the fairness
of the repudiation mechanism.
Step 4: C compute the hash value of the obtained S2 through
SHA-256 and then compare it with the value stored in
blockchain. If both values match, then C confirms it by sending
the transaction confirmation with the SP account’s token.
Whereas, if its value does not match, then C invokes smart
contract for the termination of service program. In this step,
SP can also terminate the service program if no response is
received from the C within a specified time. As in Step 4, C is
bound to confirm the off-chain part S2 for complete executable
service program. Otherwise, both cannot obtain any benefit in
case of termination of the service program. This demonstrates
the true fairness of the scheme.
Step 5: Afterwards, confirmation of the previous transaction
from C is accessible on blockchain. The SP sends the trans-
action as evidence that comprises a small part S1 and token
to the C account.
Step 6: After getting the S1, C restore the whole service. C has
two options: either confirm the service or call for arbitration
through a smart contract. Likewise in step 4, SP has a right to
arbitrate if no response is received within specified time. Note
that in step 5, hash of S1 is already published as evidence on
the blockchain, so the smart contract can easily resolve the
dispute based on previous evidence without final confirmation
of C.
TABLE I
MAP PIN G TABL E
Limitations identified Solutions proposed Validations
L1: Extra maintenance
cost and storage capacity.
Data tampering and
information leakage in
local database [22].
S1: IPFS and encryp-
tion.
V1: Average gas
consumption,
V2: average
transaction
latency.
L2: Computational cost
increases and delay occurs
[22].
S2:Blockchain based
service model
C. Mapping of Limitations to the Solutions
In first limitation (L1), two databases (blockchain and local
database) are considered that require extra maintenance cost
and storage capacity. Also, due to the local database, there is
a possibility of data tampering and information leakage. To
overcome the L1, IPFS is utilized as the solution one (S1) of
the proposed model. In the registration phase, all the nodes
are registered in the blockchain before providing any services.
After successful registration of the nodes, they can provide the
desired services. Services record of every node is stored on the
IPFS. IPFS then generates the hash of the data. This process
lacks the security of data because its hash is shared with every
network node. The security of data is ensured by encryption
after that encrypted hash is stored on the blockchain.
In second limitation (L2), product consensus among user
and admin involves minor nodes and peer nodes which cause
increased computational cost and delay because of lengthy
procedure of verification and consensus among nodes. To over-
come the L2, service model is proposed which is the second
solution (S2) . Product consensus between admin and user is
replaced by the blockchain service model. Users directly send
the request to the service provider for the required services
so that no CA is used to find the respective service provider.
Average gas consumption and average transaction latency are
the key parameters considered for the validation (V1,V2) of
the proposed service model.
IV. SIMULATION RESULTS AN D DISCUSSION
This section provides the simulation results of the proposed
system model. Average gas consumption of five steps is
illustrated for both PoW and PoA consensus mechanisms.
In PoW all nodes participate in consensus, and it utilizes
maximum resources for mining. Whereas, in PoA, only pre-
selected nodes participate in consensus so it requires less
resources. According to Fig. 2, step 1 requires more gas in
case of PoA as compared to PoW due to pre-selection of minor
nodes. Step 2 and step 5 consumed maximum gas because
of publishing the hashes (s1, s2). In Fig. 3, the transaction
latency illustrates the efficiency of handling the transactions
in blockchain system. Two consensus mechanism are utilized
to check the average transaction latency. PoA has low latency
as compared to PoW due to the pre selected nodes that take
part in mining.
Step 1 Step 2 Step 4 Step 5 Step 6
0
1
2
3
4
5
6
7
8
Average Gas Consumption(gas)
104
PoW
PoA
Fig. 2. Average gas consumption
25 50 75 100 125 150 175 200 225
Number of Transactions
-0.5
0
0.5
1
1.5
2
2.5
Average Transaction Latency (s)
PoA
PoW
Fig. 3. Average transaction latency
V. CONCLUSION
In this paper, we have proposed blockchain and IPFS based
service model for IoT. The proposed system consists of two
phases, namely registration and service model. In the registra-
tion phase, all the nodes are registered in the blockchain before
service provisioning. After successful registration of the nodes,
they can provide the desired services. The record of every
node is stored on the IPFS. The second phase consists of a
service model. In this model, the consumers send the request
to the service provider blockchain account for the required
services. Therefore, no middleman is used to find a respective
service provider. Here, blockchain is utilized to record the
evidence of the services. Also, a service verification scheme
is designed which is based on the SHA-256. Beside this, the
smart contract is utilized to settle service disputes between
clients and service providers. In case of conflict between both
parties, this mechanism provides fair and effective dispute
resolution. So, anyone can easily trust on it. The simulation
results shows that PoA consumes less gas as compared to
PoW. In addition, PoA has low latency as compared to PoW,
which shows the efficiency and effectiveness of the proposed
solution.
REFERENCES
[1] Rathore, S., Kwon, B. W., Park, J. H. (2019). BlockSecIoTNet:
Blockchain-based decentralized security architecture for IoT network.
Journal of Network and Computer Applications, 143, 167-177.
[2] Alghamdi, T. A., Ali, I., Javaid, N., & Shafiq, M. (2019). Secure service
provisioning scheme for lightweight IoT devices with a fair payment
system and an incentive mechanism based on blockchain. IEEE Access,
8, 1048-1061.
[3] Xu, Y., Ren, J., Wang, G., Zhang, C., Yang, J., Zhang, Y. (2019). A
blockchain-based nonrepudiation network computing service scheme for
industrial IoT. IEEE Transactions on Industrial Informatics, 15(6), 3632-
3641.
[4] Moinet, A., Darties, B., Baril, J. L. (2017). Blockchain based trust
and authentication for decentralized sensor networks. arXiv preprint
arXiv:1706.01730.
[5] Sultana, T., Almogren, A., Akbar, M., Zuair, M., Ullah, I., & Javaid,
N. (2020). Data sharing system integrating access control mechanism
using blockchain-based smart contracts for IoT devices. Applied Sciences,
10(2), 488.
[6] Javed, M. U., Javaid, N., Aldegheishem, A., Alrajeh, N., Tahir, M.,
& Ramzan, M. (2020). Scheduling Charging of Electric Vehicles in a
Secured Manner by Emphasizing Cost Minimization Using Blockchain
Technology and IPFS. Sustainability, 12(12), 5151.
[7] Cui, Z., Fei, X. U. E., Zhang, S., Cai, X., Cao, Y., Zhang, W., Chen,
J. (2020). A hybrid BlockChain-based identity authentication scheme for
multi-WSN. IEEE Transactions on Services Computing, 13(2), 241-251.
[8] Kim, T. H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J.,
Saha, R.,Thomas, R. (2019). A Novel Trust Evaluation Process for
Secure Localization Using a Decentralized Blockchain in Wireless Sensor
Networks. IEEE Access, 7, 184133-184144.
[9] Yang, J., He, S., Xu, Y., Chen, L., Ren, J. (2019). A trusted routing
scheme using blockchain and reinforcement learning for wireless sensor
networks. Sensors, 19(4), 970.
[10] Hong, S. (2020). P2P networking based internet of things (IoT) sensor
node authentication by Blockchain. Peer-to-Peer Networking and Appli-
cations, 13(2), 579-589.
[11] Ramezan, G., Leung, C. (2018). A blockchain-based contractual rout-
ing protocol for the internet of things using smart contracts. Wireless
Communications and Mobile Computing, 2018.
[12] Tian, Y., Wang, Z., Xiong, J., Ma, J. (2020). A blockchain-based
secure key management scheme with trustworthiness in DWSNs. IEEE
Transactions on Industrial Informatics, 16(9), 6193-6202.
[13] Uddin, M. A., Stranieri, A., Gondal, I., Balasurbramanian, V. (2019). A
lightweight blockchain based framework for underwater iot. Electronics,
8(12), 1552.
[14] Sergii, K., Prieto-Castrillo, F. (2018). A rolling blockchain for a dynamic
WSNs in a smart city. arXiv preprint arXiv:1806.11399.
[15] Kolumban-Antal, G., Lasak, V., Bogdan, R., Groza, B. (2020). A
Secure and Portable Multi-Sensor Module for Distributed Air Pollution
Monitoring. Sensors, 20(2), 403.
[16] Liu, M., Yu, F. R., Teng, Y., Leung, V. C., Song, M. (2018). Computation
offloading and content caching in wireless blockchain networks with
mobile edge computing. IEEE Transactions on Vehicular Technology,
67(11), 11008-11021.
[17] Mori, S. (2018). Secure caching scheme by using blockchain for
information-centric network-based wireless sensor networks. Journal of
Signal Processing, 22(3), 97-108.
[18] Ren, Y., Liu, Y., Ji, S., Sangaiah, A. K., Wang, J. (2018). Incentive
mechanism of data storage based on blockchain for wireless sensor
networks. Mobile Information Systems, 2018.
[19] Jia, B., Zhou, T., Li, W., Liu, Z., Zhang, J. (2018). A blockchain-
based location privacy protection incentive mechanism in crowd sensing
networks. Sensors, 18(11), 3894.
[20] Kuma r, M. H., Mohanraj, V., Suresh, Y., Senthilkumar, J., Nagalalli, G.
(2020). Trust aware localized routing and class based dynamic block chain
encryption scheme for improved security in WSN. Journal of Ambient
Intelligence and Humanized Computing, 1-9.
[21] Goyat, R., Kumar, G., Rai, M. K., Saha, R., Thomas, R., Kim, T. H.
(2020). Blockchain Powered Secure Range-Free Localization in Wireless
Sensor Networks. Arabian Journal for Science and Engineering, 45(8),
6139-6155.
[22] Rathee, G., Balasaraswathi, M., Chandran, K. P., Gupta, S. D., Boopathi,
C. S. (2020). A secure IoT sensors communication in industry 4.0 using
blockchain technology. Journal of Ambient Intelligence and Humanized
Computing, 1-13.
[23] She, W., Liu, Q., Tian, Z., Chen, J. S., Wang, B., Liu, W. (2019).
Blockchain trust model for malicious node detection in wireless sensor
networks. IEEE Access, 7, 38947-38956.
[24] Liu, Y., Wang, K., Lin, Y., Xu, W. (2019). LightChain: A Lightweight
Blockchain System for Industrial Internet of Things. IEEE Transactions
on Industrial Informatics, 15(6), 3571-3581.
[25] Feng, H., Wang, W., Chen, B., Zhang, X. (2020). Evaluation on frozen
shellfish quality by blockchain based multi-sensors monitoring and SVM
algorithm during cold storage. IEEE Access, 8, 54361-54370.
[26] Haseeb, K., Islam, N., Almogren, A., Din, I. U. (2019). Intrusion
prevention framework for secure routing in WSN-based mobile Internet
of Things. Ieee Access, 7, 185496-185505.
[27] Sharma, Pradip Kumar and Jong Hyuk Park. ”Blockchain based hybrid
network architecture for the s mart city.” Future Generation Computer
System s 86 (2018): 650 655.
[28] Rovira-Sugranes, A., Razi, A. (2019). Optimizing the Age of Informa-
tion for Blockchain Technology With Applications to IoT Sensors. IEEE
Communications Letters, 24(1), 183-187.
[29] Gayoso Mart´
ınez, V., Hern´
andez Encinas, L., and S´
anchez ´
Avila, C.
(2010). A survey of the elliptic curve integrated encryption scheme.
... A hybrid storage model that includes both on-chain and off-chain storage is used. IPFS can be used for off-chain data storage, as more data are sent on the Blockchain and can be extended with additional storage using cloud facilities [73,74]. ...
Article
Full-text available
The fish industry experiences substantial illegal, unreported, and unregulated (IUU) activities within traditional supply chain systems. Blockchain technology and the Internet of Things (IoT) are expected to transform the fish supply chain (SC) by incorporating distributed ledger technology (DLT) to build trustworthy, transparent, decentralized traceability systems that promote secure data sharing and employ IUU prevention and detection methods. We have reviewed current research efforts directed toward incorporating Blockchain in fish SC systems. We have discussed traceability in both traditional and smart SC systems that make use of Blockchain and IoT technologies. We demonstrated the key design considerations in terms of traceability in addition to a quality model to consider when designing smart Blockchain-based SC systems. In addition, we proposed an Intelligent Blockchain IoT-enabled fish SC framework that uses DLT for the trackability and traceability of fish products throughout harvesting, processing, packaging, shipping, and distribution to final delivery. More precisely, the proposed framework should be able to provide valuable and timely information that can be used to track and trace the fish product and verify its authenticity throughout the chain. Unlike other work, we have investigated the benefits of integrating machine learning (ML) into Blockchain IoT-enabled SC systems, focusing the discussion on the role of ML in fish quality, freshness assessment and fraud detection.
... In this study, IPFS and IoT is being used. However, blockchain is prohibitively expensive when it comes to storing significant amounts of data [11]. There is always a risk of manipulation of data & leakage of information with a centralized database. ...
... Zareen et al. [60] suggested the off-chain storage mechanism (i.e., IPFS) with the blockchain. e model utilizes the off-chain storage model for storing the IoT data and node credentials. ...
Article
Full-text available
Industry 4.0 connects the latest technologies such as cloud computing, Internet of things (IoT), machine learning and artificial intelligence (ML/AI), and blockchain to provide more automation in the industrial process and also bridges the gap between the physical and digital worlds through the cyber-physical system. The inherent feature of IoT devices creates the industry to smart industry (referred to as industrial IoT, i.e., IIoT) through its data-driven decision policies. However, several challenges such as decentralization, security and privacy vulnerability, single point of failure (SPOF), and trust issues exist in the IoT system. Blockchain is one of the promising technologies that can bring about opportunities for addressing the challenges of IoT systems. In this article, we have investigated the integration of IoT with blockchain technology and provided an in-depth study of the blockchain-enabled IoT and IIoT systems. The state-of-the-art research is categorized into data storage and management technique, big data and cloud computing technique (finance and data auditing), and industrial sectors (supply chain, energy, and healthcare sector). The insightful discussion based on the different categories is also presented in the paper. In particular, first, we introduce the IoT and IIoT and then discuss the need for smart contracts in IoT and IIoT systems. Next, we concentrate on the convergence of blockchain and IoT with state-of-the-art research. In addition, this article also provides the open and future research directions towards this era with the highlighted observations.
... A Wireless Sensor Network (WSN) is considered the key technology in IoE architecture, which plays a significant role in promoting IoE. The IoE is now extensively used in various fields such as smart cities, healthcare, smart power grids, etc. [1,2]. ...
Article
Full-text available
In residential energy management (REM), Time of Use (ToU) of devices scheduling based on user-defined preferences is an essential task performed by the home energy management controller. This paper devised a robust REM technique capable of monitoring and controlling residential loads within a smart home. In this paper, a new distributed multi-agent framework based on the cloud layer computing architecture is developed for real-time microgrid economic dispatch and monitoring. In this paper the grey wolf optimizer (GWO), artificial bee colony (ABC) optimization algorithm-based Time of Use (ToU) pricing model is proposed to define the rates for shoulder-peak and on-peak hours. The results illustrate the effectiveness of the proposed the grey wolf optimizer (GWO), artificial bee colony (ABC) optimization algorithm based ToU pricing scheme. A Raspberry Pi3 based model of a well-known test grid topology is modified to support real-time communication with open-source IoE platform Node-Red used for cloud computing. Two levels communication system connects microgrid system, implemented in Raspberry Pi3, to cloud server. The local communication level utilizes IP/TCP and MQTT is used as a protocol for global communication level. The results demonstrate and validate the effectiveness of the proposed technique, as well as the capability to track the changes of load with the interactions in real-time and the fast convergence rate.
Article
Full-text available
In this work, Electric Vehicles (EVs) are charged using a new and improved charging mechanism called the Mobile-Vehicle-to-Vehicle (M2V) charging strategy. It is further compared with conventional Vehicle-to-Vehicle (V2V) and Grid-to-Vehicle (G2V) charging strategies. In the proposed work, the charging of vehicles is done in a Peer-to-Peer (P2P) manner; the vehicles are charged using Charging Stations (CSs) or Mobile Vehicles (MVs) in the absence of a central entity. CSs are fixed entities situated at certain locations and act as charge suppliers, whereas MVs act as prosumers, which have the capability of charging themselves and also other vehicles. In the proposed system, blockchain technology is used to tackle the issues related with existing systems, such as privacy, security, lack of trust, etc., and also to promote transparency, data immutability, and a tamper-proof nature. Moreover, to store the data related to traffic, roads, and weather conditions, a centralized entity, i.e., Transport System Information Unit (TSIU), is used. It helps in reducing the road congestion and avoids roadside accidents. In the TSIU, an Inter-Planetary File System (IPFS) is used to store the data in a secured manner after removing the data’s redundancy through data filtration. Furthermore, four different types of costs are calculated mathematically, which ultimately contribute towards calculating the total charging cost. The shortest distance between a vehicle and the charging entities is calculated using the Great-Circle Distance formula. Moving on, both the time taken to traverse this shortest distance and the time to charge the vehicles are calculated using real-time data of four EVs. Location privacy is also proposed in this work to provide privacy to vehicle users. The power flow and the related energy losses for the above-mentioned charging strategies are also discussed in this work. An incentive provisioning mechanism is also proposed on the basis of timely delivery of credible messages, which further promotes users’ participation. In the end, simulations are performed and results are obtained that prove the efficiency of the proposed work, as compared to conventional techniques, in minimizing the EVs’ charging cost, time, and distance.
Article
Full-text available
The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel trust aware localized routing and class based dynamic encryption scheme has been presented. The method first discovers the route to reach the destination and transmit the data packet. But the localized nature of each hop in the route estimates the trust measure for each neighbor according to their prior involvement in data transmission and number of retransmission of the same packets with other neighbor, number of successful transmission. By identifying the values of those parameters, the value of trusted data forwarding support (TDFS) is measured. According to the TDFS value of several routes, a route with the specific neighbor only selected for route selection. On the other side, the method maintains and classifies the data being transmitting into number of classes. Further, the method uses different signature and encryption schemes for various classes. The data has been encrypted with class specific scheme and key before transmission. The method generates a block chain where each block contains the part of encrypted data and represented by a hash and pointer to the next block. The same has been reversed to produce original data from the encrypted key. The method introduces higher performance data security and improves the overall network performance.
Article
Full-text available
Industrial IoT in the advancement of organizations consigns to the next level in order to trace and manage every single activity of their entities. However, the interdependence, implementation and communication among such wireless devices also known as IoT devices that lead to various secrecy and personnel concerns. Even though the use of smart sensors in industries assists and reduces human efforts with the increased quality besides of enhanced production cost. Several attacks may further encountered by various attackers by hacking several sensors/objects/devices activities. In this paper, in order to preserve transparency and secure each and every activity of smart sensors, we have proposed a secure wireless mechanism using Blockchain technology that stores extorted proceedings of each record into number of blocks. Further, the simulation results of proposed blockchain mechanism are executed against various security transmission processes. In addition, the simulated results are scrutinized besides traditional mechanism and verified over certain metrics such as Probability of attack success, ease of attack detection by the system, falsification attack, authentication delay and probabilistic scenarios to appraise the authenticity of IoT devices.
Article
Full-text available
IoT-enable monitoring can provide valuable information for the shellfish quality evaluation during cold storage condition. However, IoT based information storage relies on the centralized platform, it is possible to tamper. In this paper, we establish blockchain based multi-sensors (WSN) monitoring system to collect quality parameters and verify captured information for improving transparency and trust during cold storage. The implementation of the K-means and SVM algorithms were used in quality evaluation applications to classify and predict the quality loss of frozen shellfish. The results show blockchain based WSN monitoring can achieve the dynamic indicators continuous monitoring and ensures the data security and reliability. The proportion of the training set and the test set in the allowable deviation range is 88.89% and 87.17%. The root mean square error (RMSE) of training set and test set are 0.1502 and 0.1793 by SVM model. The performance of the K-means and SVM model has higher accuracy than BP model. This paper could help to reduce the risk of food losses and improve quality and safety management of frozen shellfish during cold storage.
Article
Full-text available
Air quality in urban environments has become a central issue of our present society as it affects the health and lives of the population all over the world. The first step in mitigating negative effects is proper measurement of the pollution level. This work presents a portable air pollution measurement system, built from off-the-shelf devices, that is designed to assure user privacy and data authenticity. Data is collected from sensor modules that can be hand carried or installed on vehicles, possibly leading to a vehicular sensor network that may cover a larger area. The main challenge is to provide authenticity for the sensor data while also ensuring user privacy. The proposed system assures authenticity and non-repudiation for the collected data by using group signatures and a blockchain-like structure for secure storage. We use regular key-exchange protocols based on elliptic curve cryptography in order to securely bootstrap a session key, then we benefit from secure tunneling to export data from sensors to the remote server. Post-update tampering is prevented by the use of a blockchain-like structure on the data server. We carry experiments both to determine the computational requirements of the procedures, as well as to measure indicators of air quality on nearby areas.
Article
Full-text available
In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed system is intended to overcome the issues related to trust and authentication for access control in IoT networks. Moreover, the objectives of the system are to achieve trustfulness, authorization, and authentication for data sharing in IoT networks. Multiple smart contracts such as Access Control Contract (ACC), Register Contract (RC), and Judge Contract (JC) are used to provide efficient access control management. Where ACC manages overall access control of the system, and RC is used to authenticate users in the system, JC implements the behavior judging method for detecting misbehavior of a subject (i.e., user). After the misbehavior detection, a penalty is defined for that subject. Several permission levels are set for IoT devices' users to share services with others. In the end, performance of the proposed system is analyzed by calculating cost consumption rate of smart contracts and their functions. A comparison is made between existing and proposed systems. Results show that the proposed system is efficient in terms of cost. The overall execution cost of the system is 6,900,000 gas units and the transaction cost is 5,200,000 gas units.
Chapter
In the Internet of Things (IoT), sensor networks form the basis for interactions with the environment and are seeing accelerated development. This chapter introduces the IoT challenges that we are going to examine here. These are challenges that are related to functioning, confidentiality and security. The chapter describes the concepts of authentication and integrity as well as the concepts of reputation and trust. It introduces the authors' contribution, the Blockchain Authentication and Trust Module (BATM) architecture. The chapter presents the notations used the general architecture of the BATM, and describes how BATM aims to respond to authentication needs by specifying the mechanisms that we have implemented. It explores the evaluation of BATM architecture through simulations. The chapter concludes the relevance of BATM with respect to the results obtained and also explains the possible future prospects of this work.
Article
A novel trust-based range-free secure algorithm using blockchain technology is considered in hostile WSNs for localization. The trust values of beacon nodes are evaluated against reputation value, mobility, residual energy and neighbor node list. The blockchain technology is implemented then to share the beacon nodes trust value with neighbor nodes. The highly trustworthy beacon nodes are subsequently elected as a miner for the mining process of blocks so that unknown nodes get information from highly honest beacon nodes to perform the localization process correctly. A set of simulations is conducted to validate the effectiveness of the proposed algorithm compared to the existing one.
Article
Dynamic Wireless sensor networks (DWSNs) as an important means of industrial data collection are a key part of IIoT, where security and reliability are important characteristics of trustworthiness. However, due to dynamics, the security of key management is caused by a nontrusted base station (BS) that is easily targeted. The distribution key management schemes that avianize the role of BS also lead to additional and heavy overhead on sensors. To tackle these issues, in this paper, we propose a blockchain-based secure key management scheme (BC-EKM). First, stake blockchain is constructed based on the hybrid sensor network. In addition, we design a secure cluster formation algorithm and a secure node movement algorithm to implement key management, where stake blockchain as a trust machine replaces the majority functions of the BS. Finally, we conduct security analysis and ample simulations. The results indicate that the BC-EKM scheme is effective and efficient.
Article
Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity authentication protocols usually rely on trusted third parties. However, many IoT environments do not allow such conditions, and are prone to single point failure. Blockchain technology with decentralization features provides a new solution for distributed IoT system. In this paper, a blockchain based multi-WSN authentication scheme for Internet of Things is proposed. The nodes of IoT are divided into base stations, cluster head nodes and ordinary nodes according to their capability differences, which are formed to a hierarchical network. A blockchain network is constructed among different types of nodes to form a hybrid blockchain model including local chain and public chain. In this hybrid model, nodes identity mutual authentication in various communication scenarios are realized, ordinary node identity authentication operation is accomplished by local blockchain, and cluster head node identity authentication is realized in public blockchain. The analysis of security and performance shows that the scheme has comprehensive security and better performance.