Skip to main content
Erschienen in: Wireless Personal Communications 3/2022

19.03.2022

A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic

verfasst von: N. Anita, M. Vijayalakshmi, S. Mercy Shalinie

Erschienen in: Wireless Personal Communications | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Blockchain mechanism usually transacts the data between the blocks but there exists a restriction of total transaction within a local ledger. This often may lead to compromising the peer transaction validation both at local or global level. The integration of Internet of Things (IoT) data on the blockchain transaction mechanism often fails due to limited resources in the blockchain to carry the rapid collection of IoT data. Further, the processing and validation of data and storing it in the form of logs in ledger may require additional computational time. In this paper, we address such limitations while integrating the IoT data collection modules with blockchain technology using fuzzy logic model. The study uses fuzzy logic engine to analyze the trust level of data packets entering the blockchain network. The encrypted while entering the blockchain and decryption at the receiver end is carried out in addition with the blockchain encryption and decryption. A closed-loop model is developed to address the security related concerns in block chain and data management within supply chains. The implementation of blockchain is carried out in Pyethereum tester tool under Ethereum platform. The result shows an improved security on blockchain than existing benchmark methods in terms block reliability and data integrity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ye, C., Li, G., Cai, H., Gu, Y., & Fukuda, A. (2018). Analysis of security in blockchain: Case study in 51%-attack detecting. In 2018 5th International conference on dependable systems and their applications (DSA) (pp. 15–24). Ye, C., Li, G., Cai, H., Gu, Y., & Fukuda, A. (2018). Analysis of security in blockchain: Case study in 51%-attack detecting. In 2018 5th International conference on dependable systems and their applications (DSA) (pp. 15–24).
3.
Zurück zum Zitat Wu, A., Zhang, Y., Zheng, X., Guo, R., Zhao, Q., & Zheng, D. (2019). Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Annals of Telecommunications, 74(7–8), 401–411.CrossRef Wu, A., Zhang, Y., Zheng, X., Guo, R., Zhao, Q., & Zheng, D. (2019). Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Annals of Telecommunications, 74(7–8), 401–411.CrossRef
4.
Zurück zum Zitat Cui, H., Wan, Z., Wei, X., Nepal, S., & Yi, X. (2020). Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain. IEEE Transactions on Information Forensics and Security, 15, 3227–3238.CrossRef Cui, H., Wan, Z., Wei, X., Nepal, S., & Yi, X. (2020). Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain. IEEE Transactions on Information Forensics and Security, 15, 3227–3238.CrossRef
5.
Zurück zum Zitat Guo, L., Xie, H., & Li, Y. (2020). Data encryption based blockchain and privacy preserving mechanisms towards big data. Journal of Visual Communication and Image Representation, 70, 102741. Guo, L., Xie, H., & Li, Y. (2020). Data encryption based blockchain and privacy preserving mechanisms towards big data. Journal of Visual Communication and Image Representation, 70, 102741.
6.
Zurück zum Zitat Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420–429.CrossRef Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420–429.CrossRef
7.
Zurück zum Zitat Zhou, B., Li, H., & Xu, L. (2018). An authentication scheme using identity-based encryption & blockchain. In 2018 IEEE Symposium on computers and communications (ISCC) (pp. 00556–00561). IEEE. Zhou, B., Li, H., & Xu, L. (2018). An authentication scheme using identity-based encryption & blockchain. In 2018 IEEE Symposium on computers and communications (ISCC) (pp. 00556–00561). IEEE.
8.
Zurück zum Zitat Yuvaraj, N., Arshath Raja, R., & Kousik N. V. (2021) Privacy Preservation between privacy and utility using ECC-based PSO algorithm. In: Dash, S. S., Das, S., & Panigrahi, B. K. (Eds.) Intelligent computing and applications. Advances in intelligent systems and computing (Vol. 1172). Springer. https://doi.org/10.1007/978-981-15-5566-4_51 Yuvaraj, N., Arshath Raja, R., & Kousik N. V. (2021) Privacy Preservation between privacy and utility using ECC-based PSO algorithm. In: Dash, S. S., Das, S., & Panigrahi, B. K. (Eds.) Intelligent computing and applications. Advances in intelligent systems and computing (Vol. 1172). Springer. https://​doi.​org/​10.​1007/​978-981-15-5566-4_​51
9.
Zurück zum Zitat Zhang, Y., Xu, C., Ni, J., Li, H., & Shen, X. S. (2019). Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing. Zhang, Y., Xu, C., Ni, J., Li, H., & Shen, X. S. (2019). Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing.
10.
Zurück zum Zitat Veerappan Kousik, N. G., Natarajan, Y., Suresh, K., Patan, R., & Gandomi, A. H. (2020). Improving power and resource management in heterogeneous downlink OFDMA networks. Information, 11(4), 203. (Scopus & ESCI) Veerappan Kousik, N. G., Natarajan, Y., Suresh, K., Patan, R., & Gandomi, A. H. (2020). Improving power and resource management in heterogeneous downlink OFDMA networks. Information, 11(4), 203. (Scopus & ESCI)
11.
Zurück zum Zitat Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.CrossRef Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.CrossRef
12.
Zurück zum Zitat Guerrero-Sanchez, A. E., Rivas-Araiza, E. A., Gonzalez-Cordoba, J. L., Toledano-Ayala, M., & Takacs, A. (2020). Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors, 20(10), 2798.CrossRef Guerrero-Sanchez, A. E., Rivas-Araiza, E. A., Gonzalez-Cordoba, J. L., Toledano-Ayala, M., & Takacs, A. (2020). Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors, 20(10), 2798.CrossRef
13.
Zurück zum Zitat Kousik, N., Natarajan, Y., Raja, R. A., Kallam, S., Patan, R., & Gandomi, A. H. (2021). Improved salient object detection using hybrid convolution recurrent neural network. Expert Systems with Applications, 166, 114064 Kousik, N., Natarajan, Y., Raja, R. A., Kallam, S., Patan, R., & Gandomi, A. H. (2021). Improved salient object detection using hybrid convolution recurrent neural network. Expert Systems with Applications, 166, 114064
14.
Zurück zum Zitat Zhou, Y., Li, Z., Hu, F., & Li, F. (2019). Identity-based combined public key schemes for signature, encryption, and signcryption. In Information technology and applied mathematics (pp. 3–22). Springer. Zhou, Y., Li, Z., Hu, F., & Li, F. (2019). Identity-based combined public key schemes for signature, encryption, and signcryption. In Information technology and applied mathematics (pp. 3–22). Springer.
15.
Zurück zum Zitat Yuvaraj, N., Karthikeyan, T., & Praghash, K. (2021). An improved task allocation scheme in serverless computing using gray wolf optimization (GWO) based reinforcement learning (RIL) approach. Wireless Personal Communications, 117(3), 2403–2421.CrossRef Yuvaraj, N., Karthikeyan, T., & Praghash, K. (2021). An improved task allocation scheme in serverless computing using gray wolf optimization (GWO) based reinforcement learning (RIL) approach. Wireless Personal Communications, 117(3), 2403–2421.CrossRef
16.
Zurück zum Zitat Prasad, A., & Kaushik, K. (2019). Digital signatures. In Emerging security algorithms and techniques (pp. 249–272). Chapman and Hall/CRC. Prasad, A., & Kaushik, K. (2019). Digital signatures. In Emerging security algorithms and techniques (pp. 249–272). Chapman and Hall/CRC.
17.
Zurück zum Zitat Okamoto, T., Fujisaki, E., & Morita, H. (2000). PSEC: Provably secure elliptic curve encryption scheme. In IEEE P1363a. Okamoto, T., Fujisaki, E., & Morita, H. (2000). PSEC: Provably secure elliptic curve encryption scheme. In IEEE P1363a.
18.
Zurück zum Zitat El Ioini, N., & Pahl, C. (2018) A review of distributed ledger technologies. In Panetto, H., Debruyne, C., Proper, H. A., Ardagna, C. A., Roman, D., & Meersman, R. (Eds.) On the move to meaningful internet systems. OTM 2018 conferences (pp. 277–288). Springer El Ioini, N., & Pahl, C. (2018) A review of distributed ledger technologies. In Panetto, H., Debruyne, C., Proper, H. A., Ardagna, C. A., Roman, D., & Meersman, R. (Eds.) On the move to meaningful internet systems. OTM 2018 conferences (pp. 277–288). Springer
19.
Zurück zum Zitat Kumar, R. (2020). Cryptanalytic performance appraisal of improved HLL, KUOCHEN, GENGVRF, FENGVRF secure signature with TKIP digital workspaces: For financial cryptography. Wireless Personal Communications, 115(2), 1541–1563.CrossRef Kumar, R. (2020). Cryptanalytic performance appraisal of improved HLL, KUOCHEN, GENGVRF, FENGVRF secure signature with TKIP digital workspaces: For financial cryptography. Wireless Personal Communications, 115(2), 1541–1563.CrossRef
20.
Zurück zum Zitat Raja, R. A., Karthikeyan, T., & Kousik, N. V. (2020). Improved privacy preservation framework for cloud-based internet of things. Internet of Things: Integration and Security Challenges, 165. Raja, R. A., Karthikeyan, T., & Kousik, N. V. (2020). Improved privacy preservation framework for cloud-based internet of things. Internet of Things: Integration and Security Challenges, 165.
21.
Zurück zum Zitat Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3), 382–401.CrossRef Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3), 382–401.CrossRef
23.
Zurück zum Zitat Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on ethereum smart contracts (SOK). In Principles of security and trust (pp. 164–186). Springer Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on ethereum smart contracts (SOK). In Principles of security and trust (pp. 164–186). Springer
24.
25.
Zurück zum Zitat Bogner, A. (2017). Seeing is understanding: Anomaly detection in blockchains with visualized features. In Proceedings of the 2017 ACM international joint conference on pervasive and ubiquitous computing and proceedings of the 2017 ACM international symposium on wearable computers, UbiComp’17 (pp. 5–8). ACM. Bogner, A. (2017). Seeing is understanding: Anomaly detection in blockchains with visualized features. In Proceedings of the 2017 ACM international joint conference on pervasive and ubiquitous computing and proceedings of the 2017 ACM international symposium on wearable computers, UbiComp’17 (pp. 5–8). ACM.
26.
Zurück zum Zitat Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Computing Surveys (CSUR), 53(6), 1–37.CrossRef Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Computing Surveys (CSUR), 53(6), 1–37.CrossRef
27.
Zurück zum Zitat Arachchige, P. C. M., Bertok, P., Khalil, I., Liu, D., Camtepe, S., & Atiquzzaman, M. (2020). A trustworthy privacy preserving framework for machine learning in industrial IoT systems. IEEE Transactions on Industrial Informatics, 16(9), 6092–6102.CrossRef Arachchige, P. C. M., Bertok, P., Khalil, I., Liu, D., Camtepe, S., & Atiquzzaman, M. (2020). A trustworthy privacy preserving framework for machine learning in industrial IoT systems. IEEE Transactions on Industrial Informatics, 16(9), 6092–6102.CrossRef
28.
Zurück zum Zitat Singh, S. K., Rathore, S., & Park, J. H. (2020). Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence. Future Generation Computer Systems, 110, 721–743.CrossRef Singh, S. K., Rathore, S., & Park, J. H. (2020). Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence. Future Generation Computer Systems, 110, 721–743.CrossRef
29.
Zurück zum Zitat Casado-Vara, R., Chamoso, P., De la Prieta, F., Prieto, J., & Corchado, J. M. (2019). Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management. Information Fusion, 49, 227–239.CrossRef Casado-Vara, R., Chamoso, P., De la Prieta, F., Prieto, J., & Corchado, J. M. (2019). Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management. Information Fusion, 49, 227–239.CrossRef
30.
Zurück zum Zitat Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., & Mohaisen, D. (2020). Exploring the attack surface of blockchain: A comprehensive survey. IEEE Communications Surveys & Tutorials, 22(3), 1977–2008.CrossRef Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., & Mohaisen, D. (2020). Exploring the attack surface of blockchain: A comprehensive survey. IEEE Communications Surveys & Tutorials, 22(3), 1977–2008.CrossRef
32.
Zurück zum Zitat Puri, V., Kataria, A., & Sharma, V. (2021). Artificial intelligence‐powered decentralized framework for Internet of Things in Healthcare 4.0. Transactions on Emerging Telecommunications Technologies, e4245. Puri, V., Kataria, A., & Sharma, V. (2021). Artificial intelligence‐powered decentralized framework for Internet of Things in Healthcare 4.0. Transactions on Emerging Telecommunications Technologies, e4245.
33.
Zurück zum Zitat Pranesh, S. A., Kannan, V., Viswanathan, N., & Vijayalakshmi, M. (2020). Design and analysis of incentive mechanism for ethereum-based supply chain management systems. In 2020 11th International conference on computing, communication and networking technologies (ICCCNT) (pp. 1–6). https://doi.org/10.1109/ICCCNT49239.2020.9225602 Pranesh, S. A., Kannan, V., Viswanathan, N., & Vijayalakshmi, M. (2020). Design and analysis of incentive mechanism for ethereum-based supply chain management systems. In 2020 11th International conference on computing, communication and networking technologies (ICCCNT) (pp. 1–6). https://​doi.​org/​10.​1109/​ICCCNT49239.​2020.​9225602
34.
Zurück zum Zitat Garcia, S., Larios, D. F., Barbancho, J., Personal, E., Mora-Merchan, J. M., & Leon, C. (2019). Heterogeneous LoRa-based wireless multimedia sensor network multiprocessor platform for environmental monitoring. Sensors, 19(16), 3446.CrossRef Garcia, S., Larios, D. F., Barbancho, J., Personal, E., Mora-Merchan, J. M., & Leon, C. (2019). Heterogeneous LoRa-based wireless multimedia sensor network multiprocessor platform for environmental monitoring. Sensors, 19(16), 3446.CrossRef
Metadaten
Titel
A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic
verfasst von
N. Anita
M. Vijayalakshmi
S. Mercy Shalinie
Publikationsdatum
19.03.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09648-4

Weitere Artikel der Ausgabe 3/2022

Wireless Personal Communications 3/2022 Zur Ausgabe

Neuer Inhalt