Blockchain-based consensus algorithm for solving security issues in distributed internet of things

被引:0
作者
Mohanta B.K. [1 ]
Samal K. [1 ]
Jena D. [1 ]
Ramasubbareddy S. [2 ]
Karuppiah M. [3 ]
机构
[1] Department of Computer Science and Engineering, International Institute of Information Technology, Odisha, Bhubaneswar
[2] Department of Information Technology, VNRVJIET, Hyderabad
[3] Department of Computer Science and Engineering, SRM Institute of Science and Technology, Delhi NCR Campus, Uttar Pradesh, Ghaziabad
关键词
blockchain; consensus algorithms; distributed system; internet of things; IoT; privacy; security; trust management;
D O I
10.1504/IJEB.2022.124331
中图分类号
学科分类号
摘要
In the last decade, internet of things (IoT) emerged as one of the most promising fields of research. The services provided by the IoT have come as a big relief to human life due to the smartness and real-time monitoring without human intervention. IoT applications are widely used as it provides a high level of comfort, automation of the system, and efficiency. To make successful use of the ever-growing IoT applications requires addressing the security, privacy, and trust to protect IoT devices and user privacy from attackers. In this paper, initially different security and privacy challenges are identified in an IoT application. Secondly, analysis regarding blockchain technology is done which gives the idea to solve some of the IoT security challenges. Blockchain-based consensus algorithm PBFT is used to perform secure computation in a smart transportation system. Security analysis shows that the proposed protocol worked correctly in the presence of malicious or faulty nodes. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:283 / 304
页数:21
相关论文
共 35 条
[1]  
Alaba F.A., Othman M., Hashem I.A.T., Alotaibi F., Internet of things security: a survey, Journal of Network and Computer Applications, 88, 6, pp. 10-28, (2017)
[2]  
Ashton K., Et al., That 'internet of things' thing, RFID Journal, 22, 7, pp. 97-114, (2009)
[3]  
Bhoi S.K., Panda S.K., Khilar P.M., A network survivability approach to resist access point failure in IEEE 802.11 WLAN, Proceedings of International Conference on Internet Computing and Information Communications, pp. 293-303, (2014)
[4]  
Castro M., Liskov B., Et al., Practical byzantine fault tolerance, OSDI, 99, pp. 173-186, (1999)
[5]  
Choudhuri A.R., Green M., Jain A., Kaptchuk G., Miers I., Fairness in an unfair world: fair multiparty computation from public bulletin boards, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 719-728, (2017)
[6]  
de Almeida T.T., Nacif J.A.M., Bhering F.P., Ribeiro J.G., Doctrams: a decentralized and offline community-based traffic monitoring system, IEEE Transactions on Intelligent Transportation Systems, 20, 3, pp. 1160-1169, (2018)
[7]  
Do Q., Martini B., Choo K-K.R., Cyber-physical systems information gathering: a smart home case study, Computer Networks, 138, 6, pp. 1-12, (2018)
[8]  
Evans D., The internet of things: how the next evolution of the internet is changing everything, CISCO White Paper, 1, pp. 1-11, (2011)
[9]  
Hammi M.T., Hammi B., Bellot P., Serhrouchni A., Bubbles of trust: a decentralized blockchain-based authentication system for IoT, Computers & Security, 78, 7, pp. 126-142, (2018)
[10]  
Heartfield R., Loukas G., Budimir S., Bezemskij A., Fontaine J.R.J., Filippoupolitis A., Roesch E., A taxonomy of cyber-physical threats and impact in the smart home, Computers & Security, 78, 7, pp. 398-428, (2018)