Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2021

29-01-2021

Achieving IoT data security based blockchain

Authors: Dan Liao, Hui Li, Wentao Wang, Xiong Wang, Ming Zhang, Xue Chen

Published in: Peer-to-Peer Networking and Applications | Issue 5/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security in Internet of Things (IoT) remains a significant concern within academia and industry. With the great potential of IoT data, the traditional centralized architecture of IoT system is limited and cannot afford security solutions. In this paper, to address the issue of IoT data security, we propose a blockchain-based data acquisition and processing architecture. The proposed architecture ensures IoT data security through data consistency. It supports distributed IoT nodes to negotiate consensus on the processed data, and decides to write the consensus data to blockchain ledger. Since distributed nodes are non-peer and have different voting weights in the proposed architecture, traditional consensus algorithms are not applicable. Therefore, we design a novel consensus algorithm for data consistency between non-peer nodes: Byzantine Fault-Tolerant consensus algorithm based on Dynamic Permission Adjustment (DPA-PBFT) algorithm. The DPA-PBFT algorithm works in the consensus domain of different weight nodes with the ability of self-optimize. It improves consensus efficiency and reduces communication overhead for data consistency. Finally, we conduct numerous experiments to evaluate the performance improvement of the DPA-PBFT algorithm under the proposed distributed architecture.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kharb S, Singhrova A (2019) Fuzzy based priority aware scheduling technique for dense industrial IoT networks [J]. J Netw Comput Appl 125:17–27CrossRef Kharb S, Singhrova A (2019) Fuzzy based priority aware scheduling technique for dense industrial IoT networks [J]. J Netw Comput Appl 125:17–27CrossRef
2.
go back to reference De La Torre G, Rad P, Choo KKR (2019) Implementation of deep packet inspection in smart grids and industrial internet of things: challenges and opportunities [J]. J Netw Comput Appl 135:32–46CrossRef De La Torre G, Rad P, Choo KKR (2019) Implementation of deep packet inspection in smart grids and industrial internet of things: challenges and opportunities [J]. J Netw Comput Appl 135:32–46CrossRef
3.
go back to reference Puri V, Jagdev SS, Tromp JG et al (2020) Smart bicycle: IoT-based transportation service. Intelligent computing in engineering: select proceedings of RICE 2019, pp 1037–1043 Puri V, Jagdev SS, Tromp JG et al (2020) Smart bicycle: IoT-based transportation service. Intelligent computing in engineering: select proceedings of RICE 2019, pp 1037–1043
4.
go back to reference Alaa M, Zaidan AA, Zaidan BB et al (2017) A review of smart home applications based on internet of things [J]. J Netw Comput Appl 97:48–65CrossRef Alaa M, Zaidan AA, Zaidan BB et al (2017) A review of smart home applications based on internet of things [J]. J Netw Comput Appl 97:48–65CrossRef
5.
go back to reference Pal S, Hitchens M, Varadharajan V et al (2019) Policy-based access control for constrained healthcare resources in the context of the internet of things [J]. J Netw Comput Appl 139:57–74CrossRef Pal S, Hitchens M, Varadharajan V et al (2019) Policy-based access control for constrained healthcare resources in the context of the internet of things [J]. J Netw Comput Appl 139:57–74CrossRef
8.
go back to reference Zheng Z, Xie S, Dai HN et al (2020) An overview on smart contracts: challenges, advances and platforms. Future Generation Computer Systems 105:475–491CrossRef Zheng Z, Xie S, Dai HN et al (2020) An overview on smart contracts: challenges, advances and platforms. Future Generation Computer Systems 105:475–491CrossRef
9.
go back to reference Agrawal S, Bünz KB, Zamani M et al (2019) Blockchain system for confidential and anonymous smart contracts. United States patent application US No.16/206, 661. Accessed 3 2020 Agrawal S, Bünz KB, Zamani M et al (2019) Blockchain system for confidential and anonymous smart contracts. United States patent application US No.16/206, 661. Accessed 3 2020
10.
go back to reference Kolluri A, Nikolic I, Sergey I et al (2019) Exploiting the laws of order in smart contracts. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 363–373 Kolluri A, Nikolic I, Sergey I et al (2019) Exploiting the laws of order in smart contracts. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 363–373
11.
go back to reference Aggarwal S, Chaudhary R, Aujla GS et al (2019) Blockchain for smart communities: applications, challenges and opportunities[J]. J Netw Comput Appl 144:13–48CrossRef Aggarwal S, Chaudhary R, Aujla GS et al (2019) Blockchain for smart communities: applications, challenges and opportunities[J]. J Netw Comput Appl 144:13–48CrossRef
12.
go back to reference Zhu L, Wu Y, Gai K et al (2019) Controllable and trustworthy blockchain-based cloud data management. Futur Gener Comput Syst 91:527–535CrossRef Zhu L, Wu Y, Gai K et al (2019) Controllable and trustworthy blockchain-based cloud data management. Futur Gener Comput Syst 91:527–535CrossRef
13.
go back to reference Huang X, Xu C, Wang P et al (2018) Lnsc: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access, pp 1–1 Huang X, Xu C, Wang P et al (2018) Lnsc: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access, pp 1–1
14.
go back to reference Song G, Kim S, Hwang H et al (2019) Blockchain-based notarization for social media. IEEE International Conference on Consumer Electronics (ICCE), pp 1–2 Song G, Kim S, Hwang H et al (2019) Blockchain-based notarization for social media. IEEE International Conference on Consumer Electronics (ICCE), pp 1–2
15.
go back to reference Mcghin T, Choo KR, Liu CZ et al (2019) Blockchain in healthcare applications: research challenges and opportunities [J]. J Netw Comput Appl 135:62–75CrossRef Mcghin T, Choo KR, Liu CZ et al (2019) Blockchain in healthcare applications: research challenges and opportunities [J]. J Netw Comput Appl 135:62–75CrossRef
16.
go back to reference Patil AS, Hamza R, Hassan A et al (2020) Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Computers & Security 97:101958CrossRef Patil AS, Hamza R, Hassan A et al (2020) Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Computers & Security 97:101958CrossRef
17.
go back to reference Misra S, Mukherjee A, Roy A et al (2021) Blockchain at the edge: performance of resource-constrained IoT networks. IEEE Trans Parallel Distrib Syst 32:174–183 Misra S, Mukherjee A, Roy A et al (2021) Blockchain at the edge: performance of resource-constrained IoT networks. IEEE Trans Parallel Distrib Syst 32:174–183
18.
go back to reference Fox A, Brewer EA (1999) Harvest, yield, and scalable tolerant systems. Hot Topics in Operating Systems, pp 174–178 Fox A, Brewer EA (1999) Harvest, yield, and scalable tolerant systems. Hot Topics in Operating Systems, pp 174–178
21.
go back to reference Gilbert S, Lynch N (2002) Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, pp 51–59 Gilbert S, Lynch N (2002) Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, pp 51–59
22.
go back to reference Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols. Secure Information Networks, pp 258–272 Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols. Secure Information Networks, pp 258–272
23.
go back to reference Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. Annual international cryptology conference, pp 139–147 Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. Annual international cryptology conference, pp 139–147
24.
go back to reference Han R, Foutris N, Kotselidis C (2019) Demystifying crypto-mining: analysis and optimizations of memory-hard PoW algorithms. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp 22–33 Han R, Foutris N, Kotselidis C (2019) Demystifying crypto-mining: analysis and optimizations of memory-hard PoW algorithms. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp 22–33
25.
go back to reference Sukhwani H, Martínez JM, Chang X et al (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). Reliable Distributed Systems, pp 253–255 Sukhwani H, Martínez JM, Chang X et al (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). Reliable Distributed Systems, pp 253–255
26.
go back to reference Castro M, Liskov B (1999) Practical byzantine fault tolerance. USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp 173–186 Castro M, Liskov B (1999) Practical byzantine fault tolerance. USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp 173–186
27.
go back to reference Cachin C (2016) Architecture of the hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, pp 310 Cachin C (2016) Architecture of the hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, pp 310
28.
go back to reference Sousa J, Bessani A, Vukolic M (2018) A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp 51–58 Sousa J, Bessani A, Vukolic M (2018) A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp 51–58
29.
go back to reference Lamport L, Shostak R, Pease M (1982) The byzantine generals problem. ACM Trans Program Lang Syst 4:382–401CrossRef Lamport L, Shostak R, Pease M (1982) The byzantine generals problem. ACM Trans Program Lang Syst 4:382–401CrossRef
30.
go back to reference Vukolić M (2015) The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. International Workshop on Open Problems in Network Security, pp 112–125 Vukolić M (2015) The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. International Workshop on Open Problems in Network Security, pp 112–125
31.
go back to reference Wan SH, Li MJ, Liu GY et al (2020) Recent advances in consensus protocols for blockchain: a survey. Wirel Netw 26:5579–5593CrossRef Wan SH, Li MJ, Liu GY et al (2020) Recent advances in consensus protocols for blockchain: a survey. Wirel Netw 26:5579–5593CrossRef
33.
go back to reference Nguyen CT, Hoang DT, Nguyen DN et al (2019) Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access:5727–85745 Nguyen CT, Hoang DT, Nguyen DN et al (2019) Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access:5727–85745
34.
go back to reference Saleh F (2019) Blockchain without waste: proof-of-stake. Social Science Electronic Publishing. Available at SSRN 3183935 Saleh F (2019) Blockchain without waste: proof-of-stake. Social Science Electronic Publishing. Available at SSRN 3183935
35.
go back to reference Yang F, Zhou W, Wu Q, et al. (2019) Delegated proof of stake with downgrade: a secure and efficient Blockchain consensus algorithm with downgrade mechanism. IEEE Access, pp 18541–118555 Yang F, Zhou W, Wu Q, et al. (2019) Delegated proof of stake with downgrade: a secure and efficient Blockchain consensus algorithm with downgrade mechanism. IEEE Access, pp 18541–118555
38.
go back to reference Seres IA, Gulyás L, Nagy DA et al (2019) Topological analysis of bitcoin's lightning network. arXiv preprint arXiv:1901.04972 Seres IA, Gulyás L, Nagy DA et al (2019) Topological analysis of bitcoin's lightning network. arXiv preprint arXiv:1901.04972
Metadata
Title
Achieving IoT data security based blockchain
Authors
Dan Liao
Hui Li
Wentao Wang
Xiong Wang
Ming Zhang
Xue Chen
Publication date
29-01-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-01042-w

Other articles of this Issue 5/2021

Peer-to-Peer Networking and Applications 5/2021 Go to the issue

Premium Partner