Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart City

被引:8
作者
Malik, Adeel A. [1 ]
Tosh, Deepak K. [1 ]
Ghosh, Uttam [2 ]
机构
[1] Univ Texas El Paso, Dept Comp Sci, El Paso, TX 79968 USA
[2] Vanderbilt Univ, Dept Comp Sci, Nashville, TN 37235 USA
来源
2019 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON) | 2019年
关键词
Blockchain; Smart City; Hyperledger Sawtooth; Decentralized Deployment; INTERNET; THINGS;
D O I
10.1109/sahcn.2019.8824921
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet-of-Things has emerged to develop smart communities so that real time sensing and decision can improve operational efficiency and quality of lives. However, establishing such infrastructure can be exceptionally intricate due to the vast variety of devices and the implemented technologies. Also, it poses several unique challenges, such as heterogeneity of the infrastructure, type, and scale of deployment, security, privacy, and inter-operability. One primary concern in a smart city environment is the capabilities of typically end-IoT devices which are vulnerable to security threats and prone to confidentiality and integrity breach of data. Blockchain can potentially address these security challenges due to the distributed ledger's inherent properties. In this paper, we propose a decentralized architecture using the Blockchain to provide a secure and resilient smart city infrastructure that can run the ledger service over a distributed network. We consider a permissioned Blockchain, Hyperledger Sawtooth, and to automate and to overcome the infrastructural challenges concerning the smart city deployment, and we provide a systematic methodology that automates the deployment process and saves a significant amount of time. We simulate and deploy a Blockchain-integrated smart city environment using the proposed seamless deployment strategy using our automation module. With the proposed deployment scheme, we improve the Blockchain-based infrastructure development time by 82% compared to the traditional deployment approach.
引用
收藏
页数:6
相关论文
共 19 条
  • [1] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [2] [Anonymous], 2018, HYPERLEDGER SAWTOOTH
  • [3] [Anonymous], 2018, SAWTOOTH ARCHITECTUR
  • [4] [Anonymous], 2018, SAWTOOTH 1 1 PEERING
  • [5] [Anonymous], 2018, ORACLES VIRTUALBOX
  • [6] Chourabi H., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P2289, DOI 10.1109/HICSS.2012.615
  • [7] Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
  • [8] Ghosh U., 2019, CYBERSECURITY PRIVAC
  • [9] Ghosh U., 2016, Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, P52, DOI DOI 10.1145/2899015.2899020
  • [10] A Security Framework for SDN-enabled Smart Power Grids
    Ghosh, Uttam
    Chatterjee, Pushpita
    Shetty, Sachin
    [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 113 - 118