Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system

被引:15
作者
Babu, Erukala Suresh [1 ]
Rao, Mekala Srinivasa [2 ]
Swain, Gandharba [3 ]
Nikhath, A. Kousar [4 ]
Kaluri, Rajesh [5 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Warangal, India
[2] Lakireddy Bali Reddy Coll Engn, Dept CSE, Mylavaram, India
[3] Koneru Lakshmaiah Educ Fdn, Dept Artificial Intelligence & Data Sci, Vaddeswaram, India
[4] VNR Vignana Jyothi Inst Engn & Technol Hyderabad, Dept CSE AIML & IoT, Hyderabad, India
[5] VIT, Sch Informat Technol & Engn, Vellore, India
关键词
attacks; blockchain; fog network; IoT; security; AUTHENTICATION SCHEME; INTERNET; EDGE;
D O I
10.1002/nem.2248
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The technological integration of the Internet of Things (IoT)-Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT-Fog-Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog-enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog-enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog-enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog-based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device-to-device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state-of-the-art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss. This paper explores a secure, efficient solution using a blockchain-based fog network for secure communication among IoT-enabled edge devices. The proposed work provides an improved secure IoT architecture that provides secure device-to-device communication using fog nodes and gateway in a fog-based blockchain network in an adversarial environment. Finally, we performed experimental setups and security analysis of the proposed communication network to protect the IoT edges devices and compared it with the state-of-art work.image
引用
收藏
页数:28
相关论文
共 38 条
[1]  
Ali J., 2020, INT J ADV COMPUT SC, V9, P584, DOI [10.14569/IJACSA.2018.091071, DOI 10.14569/IJACSA.2018.091071]
[2]  
Almadhoun R, 2018, I C COMP SYST APPLIC
[3]   A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles [J].
Aman, Muhammad Naveed ;
Javaid, Uzair ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) :1123-1139
[4]  
[Anonymous], SOURC COD LINK PROP
[5]   Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks [J].
Babu, Erukala Suresh ;
Barthwal, Amogh ;
Kaluri, Rajesh .
COMPUTER COMMUNICATIONS, 2023, 199 :10-29
[6]   Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks [J].
Babu, Erukala Suresh ;
SrinivasaRao, B. K. M. ;
Nayak, Soumya Ranjan ;
Verma, Amit ;
Alqahtani, Fayez ;
Tolba, Amr ;
Mukherjee, Amrit .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
[7]   A distributed identity-based authentication scheme for internet of things devices using permissioned blockchain system [J].
Babu, Erukala Suresh ;
Dadi, Ajay Kumar ;
Singh, Krishna Kant ;
Nayak, Soumya Ranjan ;
Bhoi, Akash Kumar ;
Singh, Akansha .
EXPERT SYSTEMS, 2022, 39 (10)
[8]   A Survey on Blockchain-Fog Integration Approaches [J].
Baniata, Hamza ;
Kertesz, Attila .
IEEE ACCESS, 2020, 8 :102657-102668
[9]  
Banoun N., 2021, CS IT C P
[10]  
Borgohain T., 2015, ARXIV