Public-Key Reinforced Blockchain Platform for Fog-IoT Network System Administration

被引:3
作者
Baucas, Marc Jayson [1 ]
Spachos, Petros [1 ]
Plataniotis, Konstantinos N. [2 ]
机构
[1] Univ Guelph, Sch Engn, Guelph, ON N1G 2W1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Blockchains; Security; Servers; Internet of Things; Cryptography; Public key; Edge computing; Fog computing; Fog-IoT network; Internet of Things (IoT); permissioned blockchain; privacy; security; SECURITY; INTERNET; CHALLENGES; PRIVACY; ARCHITECTURE; REQUIREMENTS; ISSUES;
D O I
10.1109/JIOT.2021.3104740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of embedded devices that connect to a wireless network has been growing for the past decade. This interaction creates a network of Internet-of-Things (IoT) devices where data travel continuously. With the increase of devices and the need for the network to extend via fog computing, we have fog-based IoT networks. However, with more endpoints introduced to it, the network becomes open to malicious attackers. This work attempts to protect fog-based IoT networks by creating a platform that secures the endpoints through public-key encryption. The servers are allowed to mask the data packets shared within the network. To be able to track all of the encryption processes, we incorporated the use of permissioned blockchains. This technology completes the security layer by providing an immutable and automated data structure to function as a hyper ledger for the network. Each data transaction incorporates a handshake mechanism with the use of a public-key pair. This design guarantees that only devices that have proper access through the keys can use the network. Hence, management is made convenient and secure. The implementation of this platform is through a wireless server-client architecture to simulate the data transactions between devices. The conducted qualitative tests provide an in-depth feasibility investigation on the network's levels of security. The results show the validity of the design as a means of fortifying the network against endpoint attacks.
引用
收藏
页码:22366 / 22374
页数:9
相关论文
共 37 条
[1]  
Al Asif M. R., 2020, PROC 2 INT C SUSTAIN, P1
[2]   Blockchain in Industries: A Survey [J].
Al-Jaroodi, Jameela ;
Mohamed, Nader .
IEEE ACCESS, 2019, 7 :36500-36515
[3]   Subscription-Based Data-Sharing Model Using Blockchain and Data as a Service [J].
Al-Zahrani, Fahad Ahmad .
IEEE ACCESS, 2020, 8 :115966-115981
[4]   Blockchain in IoT Systems: End-to-End Delay Evaluation [J].
Alaslani, Maha ;
Nawab, Faisal ;
Shihada, Basem .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8332-8344
[5]   Access Control in Fog Computing: Challenges and Research Agenda [J].
Aleisa, Mohammed A. ;
Abuhussein, Abdullah ;
Sheldon, Frederick T. .
IEEE ACCESS, 2020, 8 :83986-83999
[6]   Blockchain Technologies: The Foreseeable Impact on Society and Industry [J].
Aste, Tomaso ;
Tasca, Paolo ;
Di Matteo, Tiziana .
COMPUTER, 2017, 50 (09) :18-28
[7]   Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions [J].
Chaudhary, Rajat ;
Aujla, Gagangeet Singh ;
Kumar, Neeraj ;
Zeadally, Sherali .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4897-4909
[8]  
Cholik M.I., 2018, 2018 INT C INF MAN T, P38
[9]   Evaluating Critical Security Issues of the IoT World: Present and Future Challenges [J].
Frustaci, Mario ;
Pace, Pasquale ;
Aloi, Gianluca ;
Fortino, Giancarlo .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2483-2495
[10]   Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks [J].
Gai, Keke ;
Wu, Yulu ;
Zhu, Liehuang ;
Xu, Lei ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :7992-8004