Skip to main content

2020 | OriginalPaper | Buchkapitel

Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review

verfasst von : Sreemana Datta, Ayan Kumar Das, Abhijeet Kumar, Khushboo, Ditipriya Sinha

Erschienen in: 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) has garnered a good chunk of limelight with the emerging advancements in technologies. It comprises of heterogeneous devices embedded with sensors, which are able to communicate directly with each other without any human intervention. In this paper, a survey has been done on authentication and privacy in IoT using Blockchain during Forest Fire. The purpose of Blockchain is to design a data structure to construct a distributed ledger of transactions that cannot be tampered by any third party. The blockchain forms by cryptographically linked blocks of transactions. Public-key cryptography is used to sign transactions among users in blockchain technology. It achieves privacy very strongly as it is very difficult to modify or delete blocks of data which are stored in the ledger of blockchain.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 787–2805 (2010)CrossRef Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 787–2805 (2010)CrossRef
2.
Zurück zum Zitat Satendra, Kaushik, A.D.: Forest Fire Diaster Management. Published by National Institute of Disaster Management, Ministry of Home Affairs, New Delhi (2014) Satendra, Kaushik, A.D.: Forest Fire Diaster Management. Published by National Institute of Disaster Management, Ministry of Home Affairs, New Delhi (2014)
3.
Zurück zum Zitat Hefeeda, M.: Forest fire modeling and early detection using wireless sensor networks. ACM J. 5 (2009) Hefeeda, M.: Forest fire modeling and early detection using wireless sensor networks. ACM J. 5 (2009)
4.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Proc. CACM 21, 120–126 (1978)CrossRef Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Proc. CACM 21, 120–126 (1978)CrossRef
6.
Zurück zum Zitat Wu, C.-H., Hong, J.-H., Wu, C.-W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Proceedings of 2001 Asia and South Pacific Design Automation Conference ASP-DAC 2001. ACM, New York (2001) Wu, C.-H., Hong, J.-H., Wu, C.-W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Proceedings of 2001 Asia and South Pacific Design Automation Conference ASP-DAC 2001. ACM, New York (2001)
7.
Zurück zum Zitat Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of CCS06, Alexandria, Virginia, USA. ACM 1-59593- 518-5/06/0010 (2006) Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of CCS06, Alexandria, Virginia, USA. ACM 1-59593- 518-5/06/0010 (2006)
8.
Zurück zum Zitat Karunakaran, S., Thangara, P.: An adaptive weighted cluster based routing (AWCBRP) protocol for mobile ad-hoc networks. J. WSEAS Trans. Commun. 7, 248–257 (2008) Karunakaran, S., Thangara, P.: An adaptive weighted cluster based routing (AWCBRP) protocol for mobile ad-hoc networks. J. WSEAS Trans. Commun. 7, 248–257 (2008)
9.
Zurück zum Zitat Zheng, Z., Wu, Z., Lin, H., Zheng, K.: CRAM: an energy efficient routing algorithm for wireless sensor networks. In: Proceedings of 19th International Symposium, Kemer-Antalya, Turkey (2004) Zheng, Z., Wu, Z., Lin, H., Zheng, K.: CRAM: an energy efficient routing algorithm for wireless sensor networks. In: Proceedings of 19th International Symposium, Kemer-Antalya, Turkey (2004)
10.
Zurück zum Zitat Liu, C., Wu, J.: Scalable routing in delay tolerant network. In: Proceedings of MobiHoc 2007 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 51–60. ACM Digital Library (2007). https://doi.org/10.1145/1288107.1288115. ISBN 978-1-59593-684-4 Liu, C., Wu, J.: Scalable routing in delay tolerant network. In: Proceedings of MobiHoc 2007 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 51–60. ACM Digital Library (2007). https://​doi.​org/​10.​1145/​1288107.​1288115. ISBN 978-1-59593-684-4
11.
Zurück zum Zitat Chauhan, N., Awasthi, L.K., Chand, N., Chugh, A.: A distributed weighted cluster based routing protocol for MANETs. In: Proceedings of Second International Conference on Advances in Communication, Network and Computing, CNC 2011, Bangalore, India. CCIS, vol. 142, pp. 147–151. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19542-6, ISBN 978-3-642-19541-9 (print), 978-3-642-19542-6 (online) Chauhan, N., Awasthi, L.K., Chand, N., Chugh, A.: A distributed weighted cluster based routing protocol for MANETs. In: Proceedings of Second International Conference on Advances in Communication, Network and Computing, CNC 2011, Bangalore, India. CCIS, vol. 142, pp. 147–151. Springer, Heidelberg (2011). https://​doi.​org/​10.​1007/​978-3-642-19542-6, ISBN 978-3-642-19541-9 (print), 978-3-642-19542-6 (online)
12.
Zurück zum Zitat Majumder, A., Sarma, N.: DEMAC: a cluster-based topology control for ad hoc networks. IJCSI – Int. J. Comput. Sci. Issues 7(5), 82–88 (2010). ISSN (Online) 1694-0814 Majumder, A., Sarma, N.: DEMAC: a cluster-based topology control for ad hoc networks. IJCSI – Int. J. Comput. Sci. Issues 7(5), 82–88 (2010). ISSN (Online) 1694-0814
13.
Zurück zum Zitat Jiang, M., Li, J., Tay, Y.C.: Cluster based routing protocol (CBRP). In: INTERNET-DRAFT draft-ietf-manet-cbrp-spec01.tx, July 1999 Jiang, M., Li, J., Tay, Y.C.: Cluster based routing protocol (CBRP). In: INTERNET-DRAFT draft-ietf-manet-cbrp-spec01.tx, July 1999
14.
Zurück zum Zitat Hossein, O., Saadawi, T.: Ant routing algorithm for mobile ad hoc networks (ARAMA). In: Proceedings of 22nd IEEE International Performance, Computing, and Communications Conference, April 2003, Phoenix, Arizona, USA, pp. 281–290 (2003) Hossein, O., Saadawi, T.: Ant routing algorithm for mobile ad hoc networks (ARAMA). In: Proceedings of 22nd IEEE International Performance, Computing, and Communications Conference, April 2003, Phoenix, Arizona, USA, pp. 281–290 (2003)
15.
Zurück zum Zitat Gunes, M., Sorges, U., Bouazizi, I.: ARA- the ant colony based routing algorithm for MANET. In: Proceedings of International Workshop on Ad-hoc Networking (IWAHN 2002), pp. 18–22, August 2002 Gunes, M., Sorges, U., Bouazizi, I.: ARA- the ant colony based routing algorithm for MANET. In: Proceedings of International Workshop on Ad-hoc Networking (IWAHN 2002), pp. 18–22, August 2002
17.
Zurück zum Zitat Ducatelle, F., De Caro, G., Gamardella, L.M.: Ant agents for hybrid multipath routing in MANETs. IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland (2005) Ducatelle, F., De Caro, G., Gamardella, L.M.: Ant agents for hybrid multipath routing in MANETs. IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland (2005)
18.
Zurück zum Zitat Camilo, T., Carreto, C., Silva, J.S., Boavida, F.: An energy-efficient ant-based routing algorithm for wireless sensor networks (2006)CrossRef Camilo, T., Carreto, C., Silva, J.S., Boavida, F.: An energy-efficient ant-based routing algorithm for wireless sensor networks (2006)CrossRef
19.
Zurück zum Zitat Ghazy, A.M., Fatma, E.L.L., Hefny, H.A.: Threshold based AntNet algorithm for dynamic traffic routing of road networks Egypt. Inform. J. 13, 111–121 (2012)CrossRef Ghazy, A.M., Fatma, E.L.L., Hefny, H.A.: Threshold based AntNet algorithm for dynamic traffic routing of road networks Egypt. Inform. J. 13, 111–121 (2012)CrossRef
20.
Zurück zum Zitat Lu, Y., Zhao, G., Su, F.: Adaptive ant-based dynamic routing algorithm (2004) Lu, Y., Zhao, G., Su, F.: Adaptive ant-based dynamic routing algorithm (2004)
21.
Zurück zum Zitat Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System
22.
Zurück zum Zitat Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. Commun. Surv. Tutorials 20, 3416–3452 (2018)CrossRef Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. Commun. Surv. Tutorials 20, 3416–3452 (2018)CrossRef
23.
Zurück zum Zitat Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger Eip-150 Revision Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger Eip-150 Revision
24.
Zurück zum Zitat Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems (2017) Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems (2017)
29.
Zurück zum Zitat Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system (2019) Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system (2019)
37.
Zurück zum Zitat Sharma, H.J., Dhawan, A.: An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks (2013) Sharma, H.J., Dhawan, A.: An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks (2013)
38.
Zurück zum Zitat Douceur, J.R.: The Sybil attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 792–796 (2013)MATH Douceur, J.R.: The Sybil attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 792–796 (2013)MATH
39.
Zurück zum Zitat Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 6, 379–387 (2018)CrossRef Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 6, 379–387 (2018)CrossRef
40.
Zurück zum Zitat Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security, pp. 507–527. Springer, Heidelberg (2015)CrossRef Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security, pp. 507–527. Springer, Heidelberg (2015)CrossRef
41.
Zurück zum Zitat Bochem, A., Leiding, B., Hogrefe, D.: Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. SecureComm (2018) Bochem, A., Leiding, B., Hogrefe, D.: Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. SecureComm (2018)
42.
Zurück zum Zitat Aydos, M., Sunar, B., Koc, C.K.: An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998) Aydos, M., Sunar, B., Koc, C.K.: An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)
43.
Zurück zum Zitat Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: Ring CT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: SCOPUS. LNCS (LNAI, LNB), vol. 10493, pp. 456–474. Springer, Heidelberg (2017)CrossRef Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: Ring CT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: SCOPUS. LNCS (LNAI, LNB), vol. 10493, pp. 456–474. Springer, Heidelberg (2017)CrossRef
Metadaten
Titel
Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review
verfasst von
Sreemana Datta
Ayan Kumar Das
Abhijeet Kumar
Khushboo
Ditipriya Sinha
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_14