BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network

被引:159
作者
Rathore, Shailendra [1 ]
Kwon, Byung Wook [1 ]
Park, Jong Hyuk [1 ]
机构
[1] SeoulTech, Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Seoul 01811, South Korea
关键词
Internet of things; Security attack detection; Edge computing; Fog computing; Blockchain; Deep learning; Software defined networking; INTERNET; THINGS;
D O I
10.1016/j.jnca.2019.06.019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of the use of insecure stationary and portable devices in the Internet of Things (IoT) network of the smart city has made the security of the smart city against cyber-attacks a vital issue. Various mechanisms for detecting security attacks that rely on centralized and distributed architectures have already been proposed, but they tend to be inefficient due to such problems as storage constraints, the high cost of computation, high latency, and a single point of failure. Moreover, existing security mechanisms are faced with the issue of monitoring and collecting historic data throughout the entire IoT network of the smart city in order to deliver optimal security and defense against cyberattacks. To address the current challenges, this paper proposes a decentralized security architecture based on Software Defined Networking (SDN) coupled with a blockchain technology for IoT network in the smart city that relies on the three core technologies of SDN, Blockchain, and Fog and mobile edge computing in order to detect attacks in the IoT network more effectively. Thus, in the proposed architecture, SDN is liable to continuous monitoring and analysis of traffic data in the entire IoT network in order to provide an optimal attack detection model; Blockchain delivers decentralized attack detection to mitigate the "single point of failure" problem inherent to the existing architecture; and Fog and mobile edge computing supports attack detection at the fog node and, subsequently, attack mitigation at the edge node, thus enabling early detection and mitigation with lesser storage constraints, cheaper computation, and low latency. To validate the performance of the proposed architecture, it was subjected to an experimental evaluation, the results of which show that it outperforms both centralized and distributed architectures in terms of accuracy and detection time.
引用
收藏
页码:167 / 177
页数:11
相关论文
共 28 条
[1]   Autonomic schemes for threat mitigation in Internet of Things [J].
Ashraf, Qazi Mamoon ;
Habaebi, Mohamed Hadi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 49 :112-127
[2]  
Benet J., 2014, Technical Report Draft, V3
[3]  
Butun I, 2015, IEEE INT CONF COMM, P2610, DOI 10.1109/ICCW.2015.7247572
[4]   CLARIFYING FOG COMPUTING AND NETWORKING: 10 QUESTIONS AND ANSWERS [J].
Chiang, Mung ;
Ha, Sangtae ;
I, Chih-Lin ;
Risso, Fulvio ;
Zhang, Tao .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (04) :18-20
[5]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[6]   Early and Late Level Fusion of Deep Convolutional Neural Networks for Visual Concept Recognition [J].
Ergun, Hilal ;
Akyuz, Yusuf Caglar ;
Sert, Mustafa ;
Liu, Jianquan .
INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2016, 10 (03) :379-397
[7]   Convolutional Two-Stream Network Fusion for Video Action Recognition [J].
Feichtenhofer, Christoph ;
Pinz, Axel ;
Zisserman, Andrew .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :1933-1941
[8]  
Hosseinpour F., 2016, Int. J. Digit. Content Technol. Appl., V10
[9]   Securing Internet of Things with Software Defined Networking [J].
Kalkan, Kubra ;
Zeadally, Sherali .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (09) :186-192
[10]  
Karnouskos S., 2018, IEEE T ENG MANAGE, P1