A Blockchain-Based Framework for Secure Data Stream Dissemination in Federated IoT Environments

被引:0
作者
Sychowiec, Jakub [1 ]
Zielinski, Zbigniew [1 ]
机构
[1] Mil Univ Technol, Fac Cybernet, PL-00908 Warsaw, Poland
来源
ELECTRONICS | 2025年 / 14卷 / 10期
关键词
Internet of Things; blockchain; distributed ledger; IoT device authentication; data authentication;
D O I
10.3390/electronics14102067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An industrial-scale increase in applications of the Internet of Things (IoT), a significant number of which are based on the concept of federation, presents unique security challenges due to their distributed nature and the need for secure communication between components from different administrative domains. A federation may be created for the duration of a mission, such as military operations or Humanitarian Assistance and Disaster Relief (HADR) operations. These missions often occur in very difficult or even hostile environments, posing additional challenges for ensuring reliability and security. The heterogeneity of devices, protocols, and security requirements in different domains further complicates the requirements for the secure distribution of data streams in federated IoT environments. The effective dissemination of data streams in federated environments also ensures the flexibility to filter and search for patterns in real-time to detect critical events or threats (e.g., fires and hostile objects) with changing information needs of end users. The paper presents a novel and practical framework for secure and reliable data stream dissemination in federated IoT environments, leveraging blockchain, Apache Kafka brokers, and microservices. To authenticate IoT devices and verify data streams, we have integrated a hardware and software IoT gateway with the Hyperledger Fabric (HLF) blockchain platform, which records the distinguishing features of IoT devices (fingerprints). In this paper, we analyzed our platform's security, focusing on secure data distribution. We formally discussed potential attack vectors and ways to mitigate them through the platform's design. We thoroughly assess the effectiveness of the proposed framework by conducting extensive performance tests in two setups: the Amazon Web Services (AWS) cloud-based and Raspberry Pi resource-constrained environments. Implementing our framework in the AWS cloud infrastructure has demonstrated that it is suitable for processing audiovisual streams in environments that require immediate interoperability. The results are promising, as the average time it takes for a consumer to read a verified data stream is in the order of seconds. The measured time for complete processing of an audiovisual stream corresponds to approximately 25 frames per second (fps). The results obtained also confirmed the computational stability of our framework. Furthermore, we have confirmed that our environment can be deployed on resource-constrained commercial off-the-shelf (COTS) platforms while maintaining low operational costs.
引用
收藏
页数:44
相关论文
共 42 条
[1]   A survey on boosting IoT security and privacy through blockchain Exploration, requirements, and open issues [J].
Alfandi, Omar ;
Khanji, Salam ;
Ahmad, Liza ;
Khattak, Asad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01) :37-55
[2]  
Bartock M., 2021, Hardware -Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases
[3]  
Bekaroo G, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND INNOVATIVE BUSINESS PRACTICES FOR THE TRANSFORMATION OF SOCIETIES (EMERGITECH), P361, DOI 10.1109/EmergiTech.2016.7737367
[4]   IoT Data Quality Assessment Framework Using Adaptive Weighted Estimation Fusion [J].
Byabazaire, John ;
O'Hare, Gregory M. P. ;
Collier, Rem ;
Delaney, Declan .
SENSORS, 2023, 23 (13)
[5]   IoT Traffic Flow Identification using Locality Sensitive Hashes [J].
Charyyev, Batyr ;
Gunes, Mehmet Hadi .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[6]   RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning [J].
Chatterjee, Baibhab ;
Das, Debayan ;
Maity, Shovan ;
Sen, Shreyas .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :388-398
[7]  
Chung, 2019, Guide to Attribute Based Access Control (ABAC) Definition and Considerations
[8]   Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks [J].
De Rango, Floriano ;
Potrino, Giuseppe ;
Tropea, Mauro ;
Fazio, Peppino .
PERVASIVE AND MOBILE COMPUTING, 2020, 61
[9]   Master-slave chain based trusted cross-domain authentication mechanism in IoT [J].
Guo, Shaoyong ;
Wang, Fengning ;
Zhang, Neng ;
Qi, Feng ;
Qiu, Xuesong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 172
[10]  
hyperledger-fabric.readthedocs, Hyperledger Fabric Documentation