Skip to main content
main-content
Top

Hint

Swipe to navigate through the chapters of this book

2020 | OriginalPaper | Chapter

Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review

Authors: Sreemana Datta, Ayan Kumar Das, Abhijeet Kumar, Khushboo, Ditipriya Sinha

Published in: 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019

Publisher: Springer International Publishing

share
SHARE

Abstract

Internet of Things (IoT) has garnered a good chunk of limelight with the emerging advancements in technologies. It comprises of heterogeneous devices embedded with sensors, which are able to communicate directly with each other without any human intervention. In this paper, a survey has been done on authentication and privacy in IoT using Blockchain during Forest Fire. The purpose of Blockchain is to design a data structure to construct a distributed ledger of transactions that cannot be tampered by any third party. The blockchain forms by cryptographically linked blocks of transactions. Public-key cryptography is used to sign transactions among users in blockchain technology. It achieves privacy very strongly as it is very difficult to modify or delete blocks of data which are stored in the ledger of blockchain.
Literature
1.
go back to reference Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 787–2805 (2010) CrossRef Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 787–2805 (2010) CrossRef
2.
go back to reference Satendra, Kaushik, A.D.: Forest Fire Diaster Management. Published by National Institute of Disaster Management, Ministry of Home Affairs, New Delhi (2014) Satendra, Kaushik, A.D.: Forest Fire Diaster Management. Published by National Institute of Disaster Management, Ministry of Home Affairs, New Delhi (2014)
3.
go back to reference Hefeeda, M.: Forest fire modeling and early detection using wireless sensor networks. ACM J. 5 (2009) Hefeeda, M.: Forest fire modeling and early detection using wireless sensor networks. ACM J. 5 (2009)
4.
go back to reference Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Proc. CACM 21, 120–126 (1978) CrossRef Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Proc. CACM 21, 120–126 (1978) CrossRef
6.
go back to reference Wu, C.-H., Hong, J.-H., Wu, C.-W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Proceedings of 2001 Asia and South Pacific Design Automation Conference ASP-DAC 2001. ACM, New York (2001) Wu, C.-H., Hong, J.-H., Wu, C.-W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Proceedings of 2001 Asia and South Pacific Design Automation Conference ASP-DAC 2001. ACM, New York (2001)
7.
go back to reference Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of CCS06, Alexandria, Virginia, USA. ACM 1-59593- 518-5/06/0010 (2006) Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of CCS06, Alexandria, Virginia, USA. ACM 1-59593- 518-5/06/0010 (2006)
8.
go back to reference Karunakaran, S., Thangara, P.: An adaptive weighted cluster based routing (AWCBRP) protocol for mobile ad-hoc networks. J. WSEAS Trans. Commun. 7, 248–257 (2008) Karunakaran, S., Thangara, P.: An adaptive weighted cluster based routing (AWCBRP) protocol for mobile ad-hoc networks. J. WSEAS Trans. Commun. 7, 248–257 (2008)
9.
go back to reference Zheng, Z., Wu, Z., Lin, H., Zheng, K.: CRAM: an energy efficient routing algorithm for wireless sensor networks. In: Proceedings of 19th International Symposium, Kemer-Antalya, Turkey (2004) Zheng, Z., Wu, Z., Lin, H., Zheng, K.: CRAM: an energy efficient routing algorithm for wireless sensor networks. In: Proceedings of 19th International Symposium, Kemer-Antalya, Turkey (2004)
11.
go back to reference Chauhan, N., Awasthi, L.K., Chand, N., Chugh, A.: A distributed weighted cluster based routing protocol for MANETs. In: Proceedings of Second International Conference on Advances in Communication, Network and Computing, CNC 2011, Bangalore, India. CCIS, vol. 142, pp. 147–151. Springer, Heidelberg (2011). https://​doi.​org/​10.​1007/​978-3-642-19542-6, ISBN 978-3-642-19541-9 (print), 978-3-642-19542-6 (online) Chauhan, N., Awasthi, L.K., Chand, N., Chugh, A.: A distributed weighted cluster based routing protocol for MANETs. In: Proceedings of Second International Conference on Advances in Communication, Network and Computing, CNC 2011, Bangalore, India. CCIS, vol. 142, pp. 147–151. Springer, Heidelberg (2011). https://​doi.​org/​10.​1007/​978-3-642-19542-6, ISBN 978-3-642-19541-9 (print), 978-3-642-19542-6 (online)
12.
go back to reference Majumder, A., Sarma, N.: DEMAC: a cluster-based topology control for ad hoc networks. IJCSI – Int. J. Comput. Sci. Issues 7(5), 82–88 (2010). ISSN (Online) 1694-0814 Majumder, A., Sarma, N.: DEMAC: a cluster-based topology control for ad hoc networks. IJCSI – Int. J. Comput. Sci. Issues 7(5), 82–88 (2010). ISSN (Online) 1694-0814
13.
go back to reference Jiang, M., Li, J., Tay, Y.C.: Cluster based routing protocol (CBRP). In: INTERNET-DRAFT draft-ietf-manet-cbrp-spec01.tx, July 1999 Jiang, M., Li, J., Tay, Y.C.: Cluster based routing protocol (CBRP). In: INTERNET-DRAFT draft-ietf-manet-cbrp-spec01.tx, July 1999
14.
go back to reference Hossein, O., Saadawi, T.: Ant routing algorithm for mobile ad hoc networks (ARAMA). In: Proceedings of 22nd IEEE International Performance, Computing, and Communications Conference, April 2003, Phoenix, Arizona, USA, pp. 281–290 (2003) Hossein, O., Saadawi, T.: Ant routing algorithm for mobile ad hoc networks (ARAMA). In: Proceedings of 22nd IEEE International Performance, Computing, and Communications Conference, April 2003, Phoenix, Arizona, USA, pp. 281–290 (2003)
15.
go back to reference Gunes, M., Sorges, U., Bouazizi, I.: ARA- the ant colony based routing algorithm for MANET. In: Proceedings of International Workshop on Ad-hoc Networking (IWAHN 2002), pp. 18–22, August 2002 Gunes, M., Sorges, U., Bouazizi, I.: ARA- the ant colony based routing algorithm for MANET. In: Proceedings of International Workshop on Ad-hoc Networking (IWAHN 2002), pp. 18–22, August 2002
17.
go back to reference Ducatelle, F., De Caro, G., Gamardella, L.M.: Ant agents for hybrid multipath routing in MANETs. IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland (2005) Ducatelle, F., De Caro, G., Gamardella, L.M.: Ant agents for hybrid multipath routing in MANETs. IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland (2005)
18.
go back to reference Camilo, T., Carreto, C., Silva, J.S., Boavida, F.: An energy-efficient ant-based routing algorithm for wireless sensor networks (2006) CrossRef Camilo, T., Carreto, C., Silva, J.S., Boavida, F.: An energy-efficient ant-based routing algorithm for wireless sensor networks (2006) CrossRef
19.
go back to reference Ghazy, A.M., Fatma, E.L.L., Hefny, H.A.: Threshold based AntNet algorithm for dynamic traffic routing of road networks Egypt. Inform. J. 13, 111–121 (2012) CrossRef Ghazy, A.M., Fatma, E.L.L., Hefny, H.A.: Threshold based AntNet algorithm for dynamic traffic routing of road networks Egypt. Inform. J. 13, 111–121 (2012) CrossRef
20.
go back to reference Lu, Y., Zhao, G., Su, F.: Adaptive ant-based dynamic routing algorithm (2004) Lu, Y., Zhao, G., Su, F.: Adaptive ant-based dynamic routing algorithm (2004)
21.
go back to reference Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System
22.
go back to reference Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. Commun. Surv. Tutorials 20, 3416–3452 (2018) CrossRef Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. Commun. Surv. Tutorials 20, 3416–3452 (2018) CrossRef
23.
go back to reference Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger Eip-150 Revision Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger Eip-150 Revision
24.
go back to reference Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems (2017) Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems (2017)
29.
go back to reference Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system (2019) Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system (2019)
37.
go back to reference Sharma, H.J., Dhawan, A.: An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks (2013) Sharma, H.J., Dhawan, A.: An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks (2013)
38.
go back to reference Douceur, J.R.: The Sybil attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 792–796 (2013) MATH Douceur, J.R.: The Sybil attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 792–796 (2013) MATH
39.
go back to reference Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 6, 379–387 (2018) CrossRef Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 6, 379–387 (2018) CrossRef
40.
go back to reference Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security, pp. 507–527. Springer, Heidelberg (2015) CrossRef Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security, pp. 507–527. Springer, Heidelberg (2015) CrossRef
41.
go back to reference Bochem, A., Leiding, B., Hogrefe, D.: Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. SecureComm (2018) Bochem, A., Leiding, B., Hogrefe, D.: Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. SecureComm (2018)
42.
go back to reference Aydos, M., Sunar, B., Koc, C.K.: An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998) Aydos, M., Sunar, B., Koc, C.K.: An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)
43.
go back to reference Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: Ring CT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: SCOPUS. LNCS (LNAI, LNB), vol. 10493, pp. 456–474. Springer, Heidelberg (2017) CrossRef Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: Ring CT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: SCOPUS. LNCS (LNAI, LNB), vol. 10493, pp. 456–474. Springer, Heidelberg (2017) CrossRef
Metadata
Title
Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review
Authors
Sreemana Datta
Ayan Kumar Das
Abhijeet Kumar
Khushboo
Ditipriya Sinha
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_14