An Anomaly Detecting Blockchain Strategy for Secure IoT Networks

被引:2
作者
Alsadi, Naseem [1 ]
Hilal, Waleed [1 ]
Surucu, Onur [1 ]
Giuliani, Alessandro [1 ]
Gadsden, Stephen A. [1 ]
Yawney, John [2 ]
Iskander, Stephan [3 ]
机构
[1] McMaster Univ, 1280 Main St W, Hamilton, ON L8S 4L8, Canada
[2] Adastra Corp, 8500 Leslie St 600, Thornhill, ON L3T 7M8, Canada
[3] Univ Guelph, Guelph, ON N1G 2W1, Canada
来源
DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI | 2022年 / 12117卷
关键词
Internet of Things; Blockchain; Cybersecurity;
D O I
10.1117/12.2618301
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Highly distributed connected systems, such as the Internet of Things (IoT), have made their way across numerous fields of application. IoT systems present a method for the connection for various heterogeneous devices across the internet, facilitating the efficient distribution, collection and processing of system-related data. However, while system inter-connectivity has aided communication and augmented the effectiveness of integrated technology, it has also increased system vulnerability. To this end, researchers have proposed various security protocols and frameworks for IoT ecosystems. Yet while many suggested approaches augment system security, centralization remains an area of concern within IoT systems. Therefore, we propose the use of a decentralization scheme for IoT ecosystems based on Blockchain technology. The proposed method is inspired by Helium, a public wireless long-range network powered by blockchain. Each network node is characterized by its device properties, which are comprised of local and network-level features. Communication in the network requires the testimony of other companion nodes, ensuring that anomalous behaviour is not accepted and thereby preventing malicious attacks of various sorts.
引用
收藏
页数:9
相关论文
共 18 条
  • [1] [Anonymous], HELIUM INTRO PEOPLES
  • [2] Detecting crypto-ransomware in IoT networks based on energy consumption footprint
    Azmoodeh, Amin
    Dehghantanha, Ali
    Conti, Mauro
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1141 - 1152
  • [3] Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics
    Bridges, Robert A.
    Jimenez, Jarilyn M. Hernandez
    Nichols, Jeffrey
    Goseva-Popstojanova, Katerina
    Prowell, Stacy
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1680 - 1684
  • [4] Chen ZM, 2018, WIREL TELECOMM SYMP
  • [5] Peer to Peer for Privacy and Decentralization in the Internet of Things
    Conoscenti, Marco
    Vetro, Antonio
    De Martin, Juan Carlos
    [J]. PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), 2017, : 288 - 290
  • [6] Blockchain-based solutions for cloud computing: A survey
    Dorsala, Mallikarjun Reddy
    Sastry, V. N.
    Chapram, Sudhakar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 196
  • [7] Gergely A.M., 2017, P 2017 5 INT S DIGIT, V42, P1
  • [8] Cryptojacking Detection with CPU Usage Metrics
    Gomes, Fabio
    Correia, Miguel
    [J]. 2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,
  • [9] Hausknecht K, 2015, 2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1372, DOI 10.1109/MIPRO.2015.7160488
  • [10] Quantum random number generators
    Herrero-Collantes, Miguel
    Carlos Garcia-Escartin, Juan
    [J]. REVIEWS OF MODERN PHYSICS, 2017, 89 (01)