Skip to main content

2022 | OriginalPaper | Buchkapitel

A Resource-Blockchain Framework for Safeguarding IoT

verfasst von : Monika Bharti, Rajesh Kumar, Sharad Saxena, Vishal Sharma

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy concerning resource discovery and selection on the Internet of Things (IoT) platform has emerged as a crucial challenge due to constrained network environment, poor throughput, and access control system in the Resource Directory (RD), which could potentially lead to information breaches among intelligent devices. Blockchain is indeed the latest technological model for global information management, point-to-point exchange, consensus process, asymmetric authentication, cognitive agreement, and perhaps other computing innovations to address the challenge. Considering these advantages, a resource-blockchain framework for safeguarding IoT is proposed in this article. The framework facilitates efficient access of information among devices, gathers information about the constrained environment, accepts data from heterogeneous resources and stores them on CoAP-based RD. Moreover, it provides secure transactions and records authorised user’s information via Blockchain-based centralised server which acts as the frontend of CoAP based REST, dispatcher or repository and proxy server. The study demonstrates that Blockchain technologies help in strengthening privacy capabilities and safeguarding intelligent devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sharma, V., You, I., Andersson, K., Palmieri, F., Rehmani, M.H., Lim, J.: Security, privacy and trust for smart mobile-internet of things (M-IoT): a survey. IEEE Access 8, 167123–167163 (2020)CrossRef Sharma, V., You, I., Andersson, K., Palmieri, F., Rehmani, M.H., Lim, J.: Security, privacy and trust for smart mobile-internet of things (M-IoT): a survey. IEEE Access 8, 167123–167163 (2020)CrossRef
2.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: From “smart objects’’ to “social objects’’: the next evolutionary step of the internet of things. IEEE Commun. Mag. 52(1), 97–105 (2014)CrossRef Atzori, L., Iera, A., Morabito, G.: From “smart objects’’ to “social objects’’: the next evolutionary step of the internet of things. IEEE Commun. Mag. 52(1), 97–105 (2014)CrossRef
3.
Zurück zum Zitat Wong, S.K., Yiu, S.-M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 16–30 (2020) Wong, S.K., Yiu, S.-M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(4), 16–30 (2020)
4.
Zurück zum Zitat Wong, S.K., Yiu, S.-M.: Identification of device motion status via Bluetooth discovery. J. Internet Serv. Inf. Secur. 10(4), 59–69 (2020) Wong, S.K., Yiu, S.-M.: Identification of device motion status via Bluetooth discovery. J. Internet Serv. Inf. Secur. 10(4), 59–69 (2020)
5.
Zurück zum Zitat Wu, C.K., Tsang, K.F., Liu, Y., Zhu, H., Wang, H., Wei, Y.: Critical internet of things: an interworking solution to improve service reliability. IEEE Commun. Mag. 58(1), 74–79 (2020)CrossRef Wu, C.K., Tsang, K.F., Liu, Y., Zhu, H., Wang, H., Wei, Y.: Critical internet of things: an interworking solution to improve service reliability. IEEE Commun. Mag. 58(1), 74–79 (2020)CrossRef
6.
Zurück zum Zitat Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(1), 35–53 (2020) Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(1), 35–53 (2020)
8.
Zurück zum Zitat Bharti, M., Kumar, R., Saxena, S., Jindal, H.: Optimal resource selection framework for internet-of-things. Comput. Electr. Eng. 86, 106693 (2020)CrossRef Bharti, M., Kumar, R., Saxena, S., Jindal, H.: Optimal resource selection framework for internet-of-things. Comput. Electr. Eng. 86, 106693 (2020)CrossRef
9.
Zurück zum Zitat Barnaghi, P., Sheth, A.: On searching the internet of things: requirements and challenges. IEEE Intell. Syst. 31(6), 71–75 (2016)CrossRef Barnaghi, P., Sheth, A.: On searching the internet of things: requirements and challenges. IEEE Intell. Syst. 31(6), 71–75 (2016)CrossRef
10.
Zurück zum Zitat Vishwakarma, R., Jain, A.K.: A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 73(1), 3–25 (2020)CrossRef Vishwakarma, R., Jain, A.K.: A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 73(1), 3–25 (2020)CrossRef
11.
Zurück zum Zitat Sahay, R., Geethakumari, G., Mitra, B.: A novel blockchain based framework to secure IoT-LLNS against routing attacks. Computing 102, 2445–2470 (2020)CrossRef Sahay, R., Geethakumari, G., Mitra, B.: A novel blockchain based framework to secure IoT-LLNS against routing attacks. Computing 102, 2445–2470 (2020)CrossRef
12.
Zurück zum Zitat Dawod, A., Georgakopoulos, D., Jayaraman, P.P., Nirmalathas, A.: Advancements towards global IoT device discovery and integration. In: 2019 IEEE International Congress on Internet of Things (ICIOT), pp. 147–155. IEEE (2019) Dawod, A., Georgakopoulos, D., Jayaraman, P.P., Nirmalathas, A.: Advancements towards global IoT device discovery and integration. In: 2019 IEEE International Congress on Internet of Things (ICIOT), pp. 147–155. IEEE (2019)
13.
Zurück zum Zitat Dhillon, H.S., Huang, H., Viswanathan, H.: Wide-area wireless communication challenges for the internet of things. IEEE Commun. Mag. 55(2), 168–174 (2017)CrossRef Dhillon, H.S., Huang, H., Viswanathan, H.: Wide-area wireless communication challenges for the internet of things. IEEE Commun. Mag. 55(2), 168–174 (2017)CrossRef
14.
Zurück zum Zitat Hussain, F., Hassan, S.A., Hussain, R., Hossain, E.: Machine learning for resource management in cellular and IoT networks: potentials, current solutions, and open challenges. IEEE Commun. Surv. Tutor. 22(2), 1251–1275 (2020)CrossRef Hussain, F., Hassan, S.A., Hussain, R., Hossain, E.: Machine learning for resource management in cellular and IoT networks: potentials, current solutions, and open challenges. IEEE Commun. Surv. Tutor. 22(2), 1251–1275 (2020)CrossRef
15.
Zurück zum Zitat Abou-Nassar, E.M., Iliyasu, A.M., El-Kafrawy, P.M., Song, O.-Y., Bashir, A.K., Abd El-Latif, A.A.: Ditrust chain: towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access 8, 111223–111238 (2020)CrossRef Abou-Nassar, E.M., Iliyasu, A.M., El-Kafrawy, P.M., Song, O.-Y., Bashir, A.K., Abd El-Latif, A.A.: Ditrust chain: towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access 8, 111223–111238 (2020)CrossRef
16.
Zurück zum Zitat Sahay, R., Geethakumari, G., Mitra, B.: A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing (2020) Sahay, R., Geethakumari, G., Mitra, B.: A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing (2020)
17.
Zurück zum Zitat Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., Ni, W.: Privysharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput. Secur. 88, 101653 (2020)CrossRef Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., Ni, W.: Privysharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput. Secur. 88, 101653 (2020)CrossRef
18.
Zurück zum Zitat Ferrag, M.A., Maglaras, L.: DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans. Eng. Manag. 67, 1285–1297 (2019)CrossRef Ferrag, M.A., Maglaras, L.: DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans. Eng. Manag. 67, 1285–1297 (2019)CrossRef
19.
Zurück zum Zitat Pan, J., Wang, J., Hester, A., Alqerm, I., Liu, Y., Zhao, Y.: EdgeChain: an edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet Things J. 6(3), 4719–4732 (2018)CrossRef Pan, J., Wang, J., Hester, A., Alqerm, I., Liu, Y., Zhao, Y.: EdgeChain: an edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet Things J. 6(3), 4719–4732 (2018)CrossRef
20.
Zurück zum Zitat Sharma, V.: An energy-efficient transaction model for the blockchain-enabled internet of vehicles (IoV). IEEE Commun. Lett. 23(2), 246–249 (2018)CrossRef Sharma, V.: An energy-efficient transaction model for the blockchain-enabled internet of vehicles (IoV). IEEE Commun. Lett. 23(2), 246–249 (2018)CrossRef
21.
Zurück zum Zitat Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020) Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
22.
Zurück zum Zitat König, L., Unger, S., Kieseberg, P., Tjoa, S., Blockchains, J.R.C.: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. 10(3), 110–127 (2020) König, L., Unger, S., Kieseberg, P., Tjoa, S., Blockchains, J.R.C.: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. 10(3), 110–127 (2020)
23.
Zurück zum Zitat Sharma, M., Gupta, A.: Intercloud resource discovery: a future perspective using blockchain technology. J. Technol. Manag. Growing Econ. 10(2), 89–96 (2019)CrossRef Sharma, M., Gupta, A.: Intercloud resource discovery: a future perspective using blockchain technology. J. Technol. Manag. Growing Econ. 10(2), 89–96 (2019)CrossRef
24.
Zurück zum Zitat Sharma, V., You, I., Seo, J.T., Guizani, M.: Secure and reliable resource allocation and caching in aerial-terrestrial cloud networks (ATCNs). IEEE Access 7, 13867–13881 (2019)CrossRef Sharma, V., You, I., Seo, J.T., Guizani, M.: Secure and reliable resource allocation and caching in aerial-terrestrial cloud networks (ATCNs). IEEE Access 7, 13867–13881 (2019)CrossRef
25.
Zurück zum Zitat Viriyasitavat, W., Da Xu, L., Bi, Z., Hoonsopon, D.: Blockchain technology for applications in internet of things-mapping from system design perspective. IEEE Internet Things J. 6(5), 8155–8168 (2019)CrossRef Viriyasitavat, W., Da Xu, L., Bi, Z., Hoonsopon, D.: Blockchain technology for applications in internet of things-mapping from system design perspective. IEEE Internet Things J. 6(5), 8155–8168 (2019)CrossRef
26.
Zurück zum Zitat Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 173–178. IEEE (2017) Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 173–178. IEEE (2017)
27.
Zurück zum Zitat Georgakopoulos, D.: A global IoT device discovery and integration vision. In: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), pp. 214–221. IEEE (2019) Georgakopoulos, D.: A global IoT device discovery and integration vision. In: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), pp. 214–221. IEEE (2019)
28.
Zurück zum Zitat Sharma, V., You, I., Kul, G.: Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 81–84 (2017) Sharma, V., You, I., Kul, G.: Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 81–84 (2017)
29.
Zurück zum Zitat Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J., Joosten, R.: Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 3–22 (2020) Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J., Joosten, R.: Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 3–22 (2020)
30.
Zurück zum Zitat Tan, T.G., Sharma, V., Zhou, J.: Right-of-stake: deterministic and fair blockchain leader election with hidden leader. In: IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1–9. IEEE (2020) Tan, T.G., Sharma, V., Zhou, J.: Right-of-stake: deterministic and fair blockchain leader election with hidden leader. In: IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1–9. IEEE (2020)
Metadaten
Titel
A Resource-Blockchain Framework for Safeguarding IoT
verfasst von
Monika Bharti
Rajesh Kumar
Sharad Saxena
Vishal Sharma
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_9

Premium Partner