Next Article in Journal
Artificial-Intelligence-Enhanced Mobile System for Cardiovascular Health Management
Previous Article in Journal
Water Content of Polyelectrolyte Multilayer Films Measured by Quartz Crystal Microbalance and Deuterium Oxide Exchange
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Layer Blockchain-Based Security Architecture for Internet of Things

1
Department of Mechanical and Electrical Engineering, Massey University, Auckland 0632, New Zealand
2
School of Science and Technology, Sunway University, Selangor 47500, Malaysia
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(3), 772; https://doi.org/10.3390/s21030772
Submission received: 31 October 2020 / Revised: 8 January 2021 / Accepted: 20 January 2021 / Published: 24 January 2021
(This article belongs to the Section Intelligent Sensors)

Abstract

:
The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.

1. Introduction

Ubiquitous interconnected objects can be deployed through the Internet of Things (IoT) infrastructure using cloud platforms in a centralized network [1]. A wide variety of interconnected devices, including smart locks [2] and vehicles [3], can also implement decentralized solutions by employing the blockchain technology in a decentralized peer-to-peer manner [4]. Both of the models are capable of dealing with the challenges of providing privacy and security for networked devices in the IoT environment. Nevertheless, the constraints of limited resources, centralized control, scalability, overhead, latency, and throughput characterize the expected heterogeneity of IoT network devices [5].
In a centralized network structure, the server controls and enhances the performance of the devices [6]. However, centralized schemes have several drawbacks. The network with a large number of smart devices normally generates a tremendous volume of data. A cloud platform service-provider requires considerable network bandwidth as well as high-performance with regards to efficiency and storage [7,8]. Furthermore, there is always a risk of the centralized network key components failure leading to a serious (or complete) breakdown of the entire system [9,10]. The data that are collected by the central cloud storage often require further manipulation by a third-party. This potentially could lead to data leaks, thus compromising the end-user’s privacy [11]. The external computing resources coordination is another challenge for proving IoT security and performance in the centralized systems [9]. Therefore, most current centralized systems fail to provide entities with a guarantee of data reliability and privacy.
Most IoT devices are only able to communicate in short-range transmissions, due to their low-power wireless transmitters and receivers. IoT networks can benefit from utilizing the Multihop Cellular Network (MCN) concept [12] that facilitates significant shortening in signal coverage. The essence of MCN leveraged by distributed, decentralized blockchain technology can ensure the required high-security and credibility for the IoT network by addressing the drawbacks of the centralization servers [13]. Besides, it enhances the degree of trust between heterogeneous devices, and that can minimize the cost of conventional data-sharing platforms [14]. The formation of a large-scale network comprising of heterogeneous nodes is not as easy as traditional blockchain implementation needs high-performance nodes. A self-protection mechanism is also required, due to the distributed structure of IoT networks with a multitude of objects and devices [15].
The increased number of connected devices (in the order of million devices per sq km), heterogeneity of devices and vendors, interoperability, a vast amount of collected data and network traffic, requirements of large bandwidth capacity, communication latency, and trust are the major challenges within the new era of the 5G-enabled IoT. [16]. The new model of security should address the unique requirements of the 5G-enabled IoT and D2D (Device-to-Device) communication devices such as scalability, low latency, energy concerns, secure communication, and reliability. Blockchain technology, including bitcoin [17,18], have been implemented for security enhancement for a long time. Their technical value has been generally recognized. At the same time, their functionality support is still limited to simple transactional data storage. Furthermore, the blockchain is a viable option for supporting ultra-reliable low latency massive Machine Type Communication (mMTC) of resource-constrained IoT devices under the 5G networks for improved security and privacy.
This paper discusses a multilayer architecture that is based on a new clustering model suited for blockchain implementation to tackle the issues associated with implementation complexity and elaborate on the mechanism for securing IoT communication. The new network model that is based on multi-layer distributed blockchain can be regarded as an organic combination of the blockchain technology and clustering techniques that effectively utilize network clustering performance and capabilities, and significantly improve the overall security and reliability of the IoT. An adapted clustering algorithm has been developed to suit the IoT systems’ blockchain implementation by considering the network performance metrics in defined cost functions. The IoT network clustering aims to reduce the network load, enhance coverage, and minimize the energy (as reflected in the distance) while leveraging the essence of MCNs. The multi-layer structure facilitates the detection of compromised entities within the entire network in each layer. Each transaction in the system needs to be verified by other participants by implementing a consensus algorithm. Blockchain is continuously monitored by the entire network participants, maintaining a copy of the blockchain ledger. Therefore, compromised nodes have no means of inserting fraudulent blocks into the public ledger without immediately being noticed by others. Thus, the multi-layer blockchain removes compromised entities from being a part of the system. This makes it impossible to compromise the integrity of records in the blockchain. Another crucial point is that the new multi-layer architecture allows for upgrading for the existing central cloud server. This makes large-scale deployments possible. Besides, a lightweight authorization and authentication process running in each cluster guarantees secure access to the network resources through implementing smart contracts.
The rest of the paper is organized, as follows. In Section 2, a literature review on the blockchain implementation in the IoT environment is introduced along with essential information on the blockchain and IoT security. Section 3 details the framework architecture and multi-layer system. Section 4 provides the proposed IoT blockchain framework implementation and associated results. The proposed clustering algorithm is based on the Genetic Algorithm (GA) and Simulated Annealing (SA) [19]. Section 5 illustrates the challenges addressed by implementing the proposed system model. Finally, Section 6 draws a conclusion and presents future research directions.

2. Related Works

Fast-growing numbers of networked devices characterize modern IoT systems. Consequently, the amount of generated data by the connected devices is also escalating. This inevitably leads to security and privacy concerns. Security (along with computing and communication issues associated with IoT devices) is mainly due to the limited memory capacity and processing power of the devices [10].

2.1. Authentication and Authorization in IoT

Devices require authentication and authorization to enter the IoT system. These measures are considered as a critical juncture of network security [20]. Interconnected devices within the IoT environment are required for establishing secure communication with the aid of relevant authentication procedures. The authentication and authorization processes of the interconnected nodes and devices are traditionally maintained by a central authority in the IoT network based on the Public Key Infrastructure (PKI) [21]. Therefore, the process increases the authority center’s workload significantly and it causes considerable delay due to a large number of requests [22]. To this end, several new authentication models have been proposed. The method that was proposed in [23] for the authentication and privacy is built up upon IP-Sec and Transport Layer Security (TLS). However, such a mechanism is not suitable for resource-constrained interconnected IoT devices due to the high demand for computational resources.
Research [24] develops an access management mechanism that is based on blockchain decentralized architecture in the IoT system. The proposed approach eliminates the centralized control server and implements the Proof of Concept (PoC) as a consensus algorithm. The development of a secure access control mechanism for IoT is presented in [25] in order to address the issues related to the distribution of access rights delegation. This approach uses the blockchain Ethereum technology to validate the identity of the entity. Research [26] proposes a framework with layers, intersect, and self-organization Blockchain Structures (BCS) to verify IoT entities. Model efficiency and security performance are analyzed in terms of storage efficiency, response time, and verification. Paper [27] highlights the concerns that are related to privacy and security of data authentication in IoT. The blockchain technology has been seen as a potential fabric for eliminating the central server concept, and distributed futures helps to address IoT challenges, such as device spoofing, false authentication, and lower reliability in data sharing. The authors in [28] propose a structure for security and authentication in IoT that is based on the blockchain. This proposal addresses the single-point-failure issue.

2.2. Blockchain-Based Frameworks for IoT Security and Privacy

Researchers have been developing blockchain technology to address the privacy and security challenges in the IoT as an alternative solution. The implementation of several privacy preservation strategies in blockchain-based IoT systems is discussed in [29]. These strategies include encryption, anonymization, private contract, mixing, and differential privacy. The authors of the research [30] review the blockchain technology and applications for IoT systems as well as a way the blockchain techniques can address the security challenges within the IoT systems. The lack of a comprehensive standard architecture, cloud server availability, capacity, susceptibility to manipulation, and cost limitations are highlighted as the critical challenges with the blockchain technology implementation in IoT [7,8].
Lightweight Scalable Blockchain (LSB) is presented in [31] in order to facilitate the privacy and security of the IoT devices. An overlay network is proposed to achieve decentralization and maintain end-to-end security and privacy with the blockchain-based framework implementation run by devices with robust computation capabilities. A new Proof of Block and Trade (PoBT) consensus algorithm is proposed in [32] in order to address the challenges associated with integrating salable IoT networks and blockchain technology. The research aim is to reduce the computation time for the validation of trades and blocks. The work is also considered a ledger distribution mechanism to reduce the memory requirements of IoT devices. The study that is presented in [5] suggests using LSB to build the blockchain-based model on the modified consensus algorithm to minimize the Proof of Work (PoW) deployment complexity. Hence, the author replaced the PoW with a distributed trusted consensus algorithm. The proposal enhances the privacy and security of IoT networks in a decentralized manner. The research in [33] proposes a blockchain-based framework to address privacy, security, fault-tolerance, and autonomous behavior issues. The framework helps to assess the possible blockchain implementation through a decision structure for IoT and edge computing.
Data operations are performed in the blockchain system through smart contract implementation, including data gathering, invoking, transfer, storage. A new context-aware mechanism is proposed in [34] for blockchain-enabled IoT systems to facilitate the on-chain data allocation. The authors define a fuzzy logic mechanism to control the data and calculate the Rating of Allocation (RoA) value that is associated with each data request. The efficiency of the proposed mechanism is investigated in the blockchain-based cloud and fog architectures implementations.

2.3. Permissioned Blockchain in IoT

Hyperledger Fabric (HLF) [35], which is a distributed ledger technology, paves the way to leverage a trustful environment without central authority dependency while delivering a high degree of flexibility, scalability, and confidentiality. The consensus algorithm is an open architecture in HLF. It provides a flexible environment for modifying the configuration and increase the performance. A new authorization framework for an IoT network is proposed in [36] based on the HLF framework. The work focuses on enhancing the consensus algorithm by implementing the GA optimization. The aim is to attain the best configuration with input transactions and success rates as input parameters to the GA algorithm. The IoT data management and its traditional characteristics have been considered in [37]. The research proposes a permissioned blockchain-based decentralized trust management (BlockBDM) in order to address the security and trust problems of IoT big data management.

2.4. Layer-Based IoT Blockchain

A platform for facilitating secure communications for smart cities is proposed in [38]. The presented solution deploys a layer-wise security structure by integrating smart devices and blockchain technology. Paper [39] has proposed a multi-layer IoT blockchain-based solution that is specifically modelled for use in the medical field. The solution addresses computation and complexity issues of the blockchain implementation by converting IoT networks into decentralized multi-layer structures. The research presented in [40] proposes a hybrid network architecture for the smart city by leveraging the strength of emerging Software Defined Networking (SDN) and blockchain technologies. In order to achieve higher efficiency, the proposed architecture is divided into two parts: the core network and edge network. This model inherits the strength of both the centralized and distributed network architectures. In [41], the authors proposed a multi-level blockchain framework to enhance privacy and data security in IoT applications. The multi-level model focuses on improving the response time and resource utilization. The authors define mobile agents to perform the hash function, implement encryption, deploy aggregation, and decryption. The mobile agents are transferred between blockchain and IoT in order to accomplish the required tasks. A two-tier hierarchical blockchain framework for IoT is proposed in [42] for enhancing and measuring the scalability of a blockchain application in a IoT car rental system.
Some of the previous works discuss the multi-layer based blockchain approach for the integration of IoT and blockchain technology. The multi-layer based blockchain network model is introduced in [43] in order to overcome the challenges of conventional centralized network architecture. The proposed model reduces the difficulty of the blockchain deployment in IoT systems by dividing the network into a multi-level decentralized network. Hybrid IoT [44] is a new hybrid blockchain platform for IoT. It is based on the implementation of PoW and Byzantine Fault Tolerance (BFT) consensus algorithms. The proposed structure includes sub-blockchains and inter-blockchains. The BFT inter-connector platform connects two PoW sub-blockchains. An integrated blockchain-IoT is proposed in [45] in order to secure the digital system for healthcare. The work addresses the scalability challenges in the IoT system.
In [46], the authors proposes a double-chain (alliance and private chain) model that considers the IoT environment for the data-sharing-transaction application. In the multi-layer model, the alliance chain processes the transactions. The transaction data record in the blockchain ledger is performed by the private chain that is deployed within each organization. The real blockchain system data is stored in an IPFS cluster server built by the alliance stores. Paper [47] proposes a hierarchical resource allocation framework based on the blockchain for edge computing. The presented model implements a smart contract-based hierarchical auction mechanism for solving resource allocation challenges for the IoT devices that are located beyond the coverage of Access Points. A blockchain-based multi-layer hierarchical architecture proposed in [48] facilitates the monitoring and managing of the Internet of Underwater Things (IoUT) on cloud data. Sensor nodes are clustered and organized based on selected residual energy cluster heads. The cluster head and node tracking are performed by using the Bloom filter. The gateways communicate by deploying a standard secret key, separated from another secret key that is used by the cluster head. Subsequently, the blockchain ledger stores the routed data. A fog layer smart gateway merged into the IoUT blockchain addresses the transaction preparation challenges, data routing to miners problems, and scalability issues [49]. The proposed model deploys a lightweight consensus mechanism to add blocks in the blockchain where the IoUT data are stored.
Unfortunately, the majority of the solutions proposed in the literature do not address the problems that are associated with the implementation of the blockchain technology in IoT systems, such as device authentication, low scalability, transaction delays, high computational resources for mining, and device heterogeneity. In our previous work [50], some of the challenges that are mentioned above are highlighted along with the discussion on the adoption of the blockchain technology in the IoT context. This article expands the implementation of the Lightweight Hyperledger Blockchain (LHB) technology and smart contracts to enhance the performance of the blockchain-IoT combination.
The heterogeneous IoT network lifetime improvement is achievable by implementing a clustering model along with a multi-layer structure. The clustering concept is the key to achieving the multi-layer architecture, where the cluster heads form the multi-layer structure. Clustering techniques for wireless networks and device-to-device (D2D) communications systems have been widely reported in the literature. They offer reduced energy consumption and higher throughput [51]. A self-clustering method is proposed in this work in order to identify Cluster Head (CH) nodes. Genetic algorithms considering various clustering factors, including geospatial ones (e.g., the distance between nodes, the base-station distance to nodes) and total network energy, are proposed. A fitness function simulating network changes and node movements within the network is optimized by deploying the SA methodology.
In the multi-layer architecture, devices in each layer have different computational capabilities and energy storage capacity. Consequently, different security strategies are proposed for individual layers. Each design is based on the blockchain. Even so, the blockchain implementation is modified to suit the devices of each particular layer. The key contribution of this research is three-fold:
  • A novel, lightweight, private multi-layer model is proposed for reducing the complexity of blockchain technology implementation while improving the network scalability. The proposed model is tailored to meet the requirements of IoT devices by adopting the blockchain technology to suit different layers of the IoT system. The simulation study shows that the proposed Hyperledger Fabric-based method outperforms a traditional blockchain solution, like the Ethereum, in terms of latency and throughput.
  • Clustering is one of the key steps of implementing the multi-layer architecture. Therefore, a new network clustering method is presented. It is based on the evolutionary computation that deploys multi-objective fitness functions that are relevant to heterogeneous IoT networks. The decentralized, fast, and self-clustering method divides the IoT network into clusters while considering the node mobility. The simulation results show that the proposed clustering algorithm outperforms existing solutions.
  • A novel method of authentication and authorization of IoT nodes is implemented in order to provide security for IoT devices and protect device communications through a multi-layer structure.

3. Multi-Layer Security Framework

The aim of the proposed network model is to provide a reliable trustful security mechanism for IoT networks while using the performance and capabilities of the cellular system. The intelligent clustering and machine learning approach based on Swarm Intelligence (SI) and Evolutionary Computation (EC) algorithms [19] is deployed in order to encode the multi-layer structure. This proposal provides a framework to facilitate the lightweight authentication and authorization of IoT networked devices (objects and nodes) based on the blockchain technology.
The proposed multi-layer network model divides the entire cellular-enabled IoT network into multiple tiers. Layer-1 consists of various clusters and IoT nodes. Layer-2 includes sink nodes and controlling devices, such as cluster heads. Layer-3 contains the base stations of a cellular network. All of the CHs, as cellular devices, have cellular connectivity with the 5G BSs, and, thus, via the BSs/D2D capability, also with other CHs. The BSs have the processing power (with appropriate servers and CPUs) to implement the decentralized blockchain mechanism at Layer-3. Figure 1 shows the overall system model.
Blockchain implementation can potentially lead to additional overhead and scalability issues [5]. The multi-layer network model, as shown in Figure 2, is proposed for minimizing the overhead, reduce delays, and response time, create associated channels to collect specific data, secure communication, and address the need for the network scalability. The first layer contains devices and nodes with a diverse range of computational capabilities and power resources. Locally registered devices use authentication and authorization services through a local authorization program that is run by the cluster heads in the IoT network. The second layer includes CH nodes, authority nodes, edge-computing nodes, and gateways. CH nodes can securely communicate in the blockchain environment that deploys a lightweight consensus. The local permissioned HLF blockchain is implemented in this layer. The last layer consists of BSs in cellular networks. This higher layer, which consists of resources with high computational power, can be arranged as a set of separate structures under the HLF blockchain [52]. Robust asymmetric cryptography mechanism deployment can be achieved in this layer. The security and privacy are guaranteed with the implementation of the Global Blockchain and sophisticated security approaches to the high-level layer (Layer 3).

3.1. LAYER-1

This level includes IoT objects, nodes, and devices, as well as network elements for communications, network procedures, and protocols. Unsupervised hybrid clustering algorithms, as described in Section 4, convert the entire IoT network into multiple clusters and to form the layers. Each cluster is associated with a powerful device chosen as CH. IoT devices and nodes are geographically distributed non-uniformly. The devices are authenticated and authorized to the network through a local authorization and authentication services to guarantee the privacy and security inside each cluster.
The intra-cluster security and privacy are facilitated by local CH nodes acting as edge processing nodes, as shown in Figure 2. Such an approach can enhance the implementation efficiency while also addressing the issues that are associated with globally centralized cloud computing.
A lightweight session key is assigned to devices when they authenticate to associated CH nodes and establish communications. The session key period validation is carried out by the cluster heads in order to perform the authorization and authentication. The registration services and authentication management, as well as authorization, are also locally performed by the CH nodes to improve scalability and address device heterogeneity. CH nodes maintain the addition of new devices to the network through a local registration process. The cryptographic key distribution or session keys allow the node authentications. Less power-hungry cryptography is provided by edge computing. Alternatively, CH nodes for IoT devices with limited resources could provide long-term cached session keys (cryptographic keys).
Lightweight session keys are assigned by CH nodes in order to maintain the authorization of registered nodes as an authorization entity and authenticate them to the network. Symmetric keys and lightweight cryptography are proposed to tackle the scalability challenges and the limitation of IoT devices with constrained resources. CH nodes perform the following four tasks:
  • a new node registration to the network as a new entity;
  • session key (cryptographic key) distribution and assignment;
  • communications management and initiation; and,
  • secure communications management and establishment.
Symmetric key-wrapping encrypts the lightweight session keys, called the distribution keys. Every single communication is protected with a session key. The session key is a symmetric key that has a unique ID and a period of validity. The use of cryptographic keys (credential management) for encryption, message authentication, and decryption is managed by secure communication. Consequently, selected CH nodes are responsible for managing cryptographic keys. Figure 3 illustrates the overview of the authorization procedure.

3.2. LAYER-2

The second layer connects all of the selected CH nodes under the serving Base Station (BS) units. Cluster heads collect and forward data to the higher layer. All of the nodes in the second layer run a private LBC in a distributed manner to achieve a consensus that is based on the defined consensus algorithm [5]. BS and CH units generate and verify blocks, handle communications with non-consensus devices and nodes within the same layer, and broadcast blocks to each cluster. Trusted nodes provide interfaces to subordinate and superior layers employing the blockchain protocol. The HLF blockchain platform is proposed for this layer.
The proposed network model needs to consider secured CH communications while addressing the resource-constrained and decentralized node distribution of the IoT network. The blockchain mining process is computationally intensive and time-consuming. Hence, it is not ideally suited for implementation in an IoT system. Therefore, the proposal suggests a lightweight, private, decentralized blockchain-based method for data communications built upon distributed consensus. It is important to consider the limitation (resource-constraint) of devices in the IoT system. Thus, a lightweight cryptographic mechanism is to be implemented.
In the proposed model, the interaction between CH nodes and other networked elements are based on local permissioned HLF blockchain [53] platform. HLF is a private permissioned blockchain and it is based on an execute-order-validate architecture. In this architecture, the transaction execution (via smart contract) is separated from transaction ordering in order to achieve better scalability and modular consensus implementations.
The main elements of the proposed model are organizations (base stations), IoT nodes and objects, ordering clusters, and peers (including endorser and committer, membership service providers (MSPs), and channels [54]), as shown in Figure 4.
The peers maintain distributed ledger and execute transactions. A peer node can be an endorser or committer or both. The orderers are responsible for ordering all of the transactions in the network. In addition, orderers propose new blocks and seek consensus. Ordering service is a collection of orderers. All peers are committers by default. Ordering service sends the ordered state updates in the form of a block of transactions, and committers maintaining the ledger. The peer validates transactions of a new block, commits the changes locally as a copy of ledger, and updates the blockchain by appending it on the block. Peers also can be an endorser for endorsing transactions. An endorser executes the smart contract (ChainCode in HLF) and appends the results with its cryptographic signature (called endorsement) before sending it back to the client. In the proposed model, CH nodes can take the endorsers or committer roles, based on predefined roles.
MSP carries out the authentication services in the Hyperledger network. MSP has to verify the network nodes identity. The organizations are the logical representation of the Hyperledger framework. They are responsible for the management of the network members with the help of MSP. Channels facilitate the various connections within the network between its different elements while using private or dedicated channels. The committers perform the validation and update of the shared ledger.
The Hyperledger Blockchain is implemented through various transactions for data collection and data transmission. Transactions are defined using smart contracts [54]. Base stations in the high-level layers provide an organization for the blockchain implementation. They are connected to CH and different nodes in the IoT system. The ordering cluster handles the transactions and queue orders while providing a shared channel for different peer-to-peer communications. Additionally, the ordering service performs messages broadcasting, including transactions, and creating transaction blocks. IoT devices send transactions to ordering clusters while using Ordering Service (OS) to make a block of transactions. Defining the IoT nodes in the blockchain network to have an endorser or committer role depends on various metrics, e.g., the network configuration. Aside from validation tasks and updating the blockchain state, the committer node is responsible for block addition to the blockchain ledger.
An IoT node becomes an endorser through submitting an endorsement request. This request is sent to the endorser node for approval and consistency monitoring. The process of consistency check proceeds with the smart contract execution. The endorser sends back the response to the associated IoT node requests and grants a specific read and writes access.
The transaction block creation is performed by ordering clusters through the OS. The transaction blocks are distributed to all CH nodes. The blockchain system in this level updates the ledger, and transactions are added to the ledger along with IoT node specifications. A copy of the Blockchain ledger is shared with all of the peers in the network after validation.

3.3. LAYER-3

This layer consists of a distributed networked collection of BS nodes acting as an organization owner. Base stations manage devices, generate data, and process requests in a cloud server manner. The trusted nodes in this layer have powerful computing resources with less power and processor limitations. Consequently, more robust asymmetric cryptography mechanisms are proposed for this level with the aid of the global blockchain.
The high-level layer consists of BS nodes that can perform independent mining tasks without reliance on the central authentication servers. The nodes in this layer are computationally powerful while forming a distributed network topology. Therefore, deploying a suitable global chain, such as the global Ethereum blockchain framework, along with more sophisticated security techniques is feasible. The deployment of asymmetric cryptography, such as Elliptic Curve Cryptography (ECC) [55], is an appropriate solution for this layer. The blockchain-based system implementation enhances the level of privacy and security while guaranteeing data integrity. The higher layers do not include any central node, while the devices are data independent. The blockchain network records the transaction exchange between the nodes of this layer. The cluster heads, base stations, and computing edge nodes initiate the globally distributed trust relationship service mechanism among other network members.
The peer-to-peer nature of the blockchain provides a suitable solution for a globally distributed security framework between different network entities, such as BS nodes. The communication among CH nodes and computing edge nodes is done through implementing the blockchain-based communication with the use of certificates. Smart contracts maintain the distribution of the certificates to perform a trustful communication within the blockchain system among different nodes in this layer. CH nodes are required to sign the certificates. The proposed blockchain-based model is enhancing the distributed trust between two CH nodes and related BS nodes when they collaborate for authorization of their entities. It also enhances the trust, while an entity or IoT node establishes communication with other nodes in separate clusters under each BS.
The blockchain-based system maintains smart contract execution in order to avoid the requirement of using domain names and fixed addresses while the nodes establish the communications. The fixed addresses and domain names are not needed for the cluster heads in the proposed model for their communications with the edge devices as well as to execute smart contracts.

4. Framework Implementation

4.1. Network Self-Clustering

Figure 5 shows the clustering approach for the IoT network. Figure 6 shows the flow of the proposed network clustering algorithm. It can be seen that the clustering is done with the utilization of metaheuristic algorithms [56]. Metaheuristic algorithms are based on a close interaction between computational practices and optimization. The main advantage of these methods is that they are unentrapped in local optimal points [57]. Therefore, these approaches seek all over the entire search space. Furthermore, the control within the metaheuristic algorithms is fully distributed among individuals (network nodes and participants). These individuals communicate with each other in a localized manner. The system response is robust, and the application for environment changes is fast [56,57,58].
GA is a population-based algorithm that is a subset of metaheuristic methods. It shows a good global-based exploration performance for the search of a problem space [59]. Therefore, GA is proposed in this research for the heterogeneous IoT network clustering. Furthermore, a good local-based exploration mechanism within the search space is required in order to evaluate a single solution. While SA indicates very good performance in this manner, a hybrid mechanism (built upon GA and SA) is chosen in this paper to optimize the proposed IoT network clustering [60].
The clustering approach also reduces the latency and overhead in the IoT systems via the overall minimization of communication distances among IoT objects and selected cluster heads. With clustering, a lower number of nodes require long-distance transmissions to BS nodes. Therefore, the total energy consumption for the entire system is reduced, while the network coverage is enhanced [59,60,61]. The clustering-based approach helps to leverage the blockchain technology application efficiency by reducing the deployment complexity. The entire network is divided into non-overlapping clusters that are managed by the CH nodes. Other cluster members communicate with the CH nodes for data transmission.
The idea is to achieve the clustering through the deployment of the evolutionary computation algorithms within the network. In the proposed model, critical network attributes, such as the distance, network coverage, energy, and load, are the parameters considered for the clustering of the nodes.
A hybrid algorithm (consisting of a Genetic Algorithm and Simulated Annealing) is employed for the selection of a cluster head as well as for cluster optimization, as shown in Figure 6. The proposed self-clustering approach allows for avoiding a uniform distribution of nodes and clusters. This is done to model the heterogeneous nature of the IoT network. The total number of clusters as well as the number of nodes that belong to each cluster are not predefined. Besides, the proposed clustering enhances the flexibility of nodes deployment in the IoT network. The nonuniform distribution of nodes in each cluster is considered. Consequently, the lifetime of the entire network increases, while the energy dissipation among the CH nodes is more uniform.

4.1.1. GA Phase: CH Selection with Genetic Algorithm

The most critical factor in the IoT network design is satisfying the energy constraint. Longer network operation can be achieved through the shortening of communications and transmission links as well as by reducing the power consumption. Shorter communication links are achievable by grouping nodes into independent clusters. Such an approach facilitates the aggregation and forwarding of data, because each cluster member needs to exchange its information with the associated CH. The calculation of energy consumption uses the first order radio communication model [62]. The radio energy dissipation for transmitting or receiving a bit of data is equal to E e l e c . Energy dissipation for transmitting n bits of data from the transmitter to the receiver node at the distance l can be calculated, as follows [63]:
E t x ( n , l ) = E e l e c × n + E a m p × n × l 2 ,
while the energy dissipation volume in a node to receive n bits of data is formulated as:
E r x ( n ) = E e l e c × n ,
where, E e l e c is the dissipation of radio energy and E a m p is transmission amplifier energy dissipation.
Consequently, the total energy requirements to send and receive n data bits between two nodes located at the distance l comprise two main elements. The first component is the energy for amplifying data, transmission, and receiving. The second component includes the energy for the data processing by the node. The current leakage is considered to be negligible in low voltage and high-frequency systems. Equation (3) denotes E l l the total energy loss for the distances that are shown in Figure 5.
E l l = j = 1 k i = 1 m j l i j 2 + L j 2 m j ,
where, L j represents the distance between the cluster-head and computing edge node; the l i j represents the distance between a node and its related cluster head (Figure 5); k represents a number of cluster heads; and, m represents the total number of nodes on the network.
Clustering is performed by considering the node residual energy, node distance from the BS, number of CH nodes, and CH distance from the other cluster heads (intra- and inter-cluster distances).
The cost function for the optimization problem considers the total transmission distance as a key metric that is to be minimized. Furthermore, the fitness function also takes the number of cluster heads into account while optimizing the network load. The following multi-objective cost function evaluates each individual node in the GAs algorithm:
Minimize:
c o s t f 1 = ω 1 E d d D + ω 2 C H i m + ω 3 L o a d m ,
where, E d d is the sum of CH distances to all individual nodes and the sum of the computing edge node distances to all CH nodes, C H i indicates the number of cluster heads, D is the network scaling dimension, m is the total number of nodes, Load is the max network load, and ω 1 , ω 2 , and ω 3 are predefined constant weights.
The goal is to attain a fewer number of CH nodes and enhance the energy. The weights ω 1 to ω 3 , with values between 0 and 1, represent the importance of the key metrics during the optimization procedure. Their values are chosen according to the importance of cost function factors [60]. GA minimizes the cost function at this stage. Figure 7 shows the initial phase of the clustering algorithm.

4.1.2. Optimization of Distance and Coverage by GA

The GA approach helps to achieve distance optimization through its self-organized feature. The next GA starts with the final global solution of the first step GA as the initial solution, as outlined in Figure 6. This step can effectively formulate the mobility of different nodes. The proposed GA method also takes network coverage optimization into account.
The second GA phase enhances the GA solution of the first phase by a local search strategy. Optimizing the distance between CH to a node, and the CH to the sink or edge computing node results in the minimization of the total network energy dissipation. The distance-based equation is deployed in order to cluster the nodes in multi groups in the previous step and define the number of clusters through implementing the GA algorithm. The initial population for the current stage is generated from the best solution of the last phase. A multi-objective cost function is used in the GA optimization step. The distance is optimized while maximizing the coverage:
Minimize:
c o s t f 2 = ω 4 E l l + ω 5 1 C o v e r a g e ,
where, E l l is detailed in (3). Coverage shows the provided network coverage by nodes, ω 4 and ω 5 are predefined constant weights.

4.1.3. Network Changes Optimization Using SA

Simulated Annealing is a meta-heuristic algorithm that is chosen to perform the network changes, including node addition to, moving in, and removing from the IoT network. Generally, a random primary solution is required to start SA. However, in the proposed hybrid GA-GA-SA approach (Figure 6), the initial solution for SA is selected from the final GA global solution in the previous step. A local search strategy is deployed to improve the network changes by the SA algorithm. A new solution (called S o l u t i o n n e w ) is generated at every iteration of SA that is located in the current solution ( S o l u t i o n c u r r e n t ) neighborhood area. The case C o s t n e w < C o s t c u r r e n t means that the current solution is replaced by the new solution. Otherwise, the new solution can be accepted. The same cost function of the first GA (expression (4)) is considered for SA evaluation at each iteration. Figure 8 shows the SA algorithm.

4.1.4. Clustering Results

In order to study the performance of the proposed clustering algorithms, a network environment for the IoT devices was simulated, as shown in Figure 5. It included 100 nodes randomly generated and distributed in a 2-D network. MATLAB 2018a was employed since it offered a reliable environment for clustering algorithms, facilitated a straightforward simulation of algorithms, so that the results could be ultimately compared. Table 1 provides the GAs parameters deployed in this scenario.
The GAs started from a specific number of individuals, termed population. Each individual in proposed GA algorithms was elevated while using combined cost functions presented in Equations (4) and (5). The network configuration changes were detected by the SA section and then optimized the network accordingly. Table 2 provides the SA parameters used in this scenario.
In the simulation, the energy loss per bit for transmitter or receiver ( E e l e c ) was considered to be equal to 50 nJ/bit ( E e l e c = 50 nJ/bit), while the constant value for transmission amplifier was E a m p = 0.1 nJ/bit/m 2 which was in line with the reported work [64].
The proposed clustering algorithm was benchmarked against four following algorithms reported in the literature: ASLPR [60], ERA [65], FSFLA [64], and GAPSO [50].
Application-Specific Low Power Routing (ASLPR) is based on evolutionary algorithms adopted for Wireless Sensor Network (WSN) applications. It uses GA and SA for CH nodes selection. Energy-aware Routing Algorithm (ERA) is for cluster-based WSNs. The residual energy of the CH nodes and the intra-cluster distances is considered in ERA for cluster formation. Fuzzy Shuffled Frog Leaping Algorithm (FSFLA) employs the memetic Shuffled Frog Leaping Algorithm (SFLA) in order to optimize the Mamdani fuzzy rule-base table based on the application specifications. This protocol deals with node energy and intra-cluster distances as well as with network lifetime. Genetic Algorithm and Particle Swarm Optimization (GAPSO) [50] is proposed in order to form clusters in the IoT environment. All of the protocols were evaluated within the same simulated network environment. Each algorithm at the end of its optimization resulted in a different number of clusters and cluster heads.
The obtained simulation results indicate the effectiveness of the proposed clustering model as well as the efficiency of the algorithm to minimize the distances and the total network energy. Figure 9a illustrates the formed clusters for GA-GA-SA with the centrally located base station with 100 nodes that were randomly distributed in a network coverage area of 150 (m) × 150 (m). Figure 9b–d show that the proposed GA-GA-SA performs better when compared to the other algorithms by lowering the network load, minimizing the distances, and, therefore, increasing the network coverage.

4.2. Blockchain Implementation

4.2.1. Development Environment

We deployed simulation models in two different environments associated with each level of the multi-layer network in order to demonstrate the feasibility and practicability of the proposed blockchain framework. The first model implements the HLF blockchain in Layer-2 encompassing IoT devices, CH nodes (peers), APIs, and an organization. The global blockchain deployment simulator at Layer-3 is conducted to compare both Etherume and HLF metrics implementations. The simulation model at Layer-3 uses a workstation as the BS server running the blockchain applications.
The Layer-2 implementation environment was created in order tto study the efficiency of the proposed blockchain framework of the multi-layer model, as illustrated in Figure 10. It also shows the means of connection between various entities consisting of IoT devices, IoT server, and blockchain network. The IBM Cloud was used to host development tools and technologies for implementing the IoT devices. IBM Watson IoT Platform [66] was chosen to host IoT devices and gateways. The Node-Red server provided communication between the IoT devices and servers while using the Constrained Application Protocol (CoAP). Physical nodes are simulated in the IBM IoT Watson platform and connected to related Cloud foundry services on the IBM Cloud. The IoT server is organized using a virtual environment that was integrated with various virtual nodes, and a lightweight permissioned HLF blockchain framework is utilized to grant the security for Layer-2. The HLF network within the experimental setup consists of four peers and an orderer node running as docker images using docker containers [67]. The open-source HLF (v1.4) blockchain framework was implemented and hosted by Linux foundations. The Ubuntu Linux 18.4 LTS is the operating system hosted by Intel Core i7-3770 @ 3.4 GHz processor and 16 GB memory. The docker environment is run by the docker engine (version 19.03.8). The configuration of docker images and containers is provided by the docker-compose (version 1.17.0) as the Integrated Development Environment (IDE).
A smart contract was installed and instantiated on peers nodes, and data storage was allocated in order to write a block of transactions to the blockchain ledger. The composer-playground is a web interface for designing and implementing smart contracts and managing transactions and assets. The composer Command Line Interface (CLI) provides an environment to deploy, implement, and execute smart contracts and related definitions by the developers. The peers were set up to use the CouchDB for managing the state data that can handle the complex queries against the transaction logs. The Chain Code (CC) was modelled as JavaScript Object Notation (JSON). The client application can invoke a CC to access the state database and perform various queries, such as put, get, and delete, through APIs. Different blockchain functions were defined by deploying a REST server to directly provide RESTful APIs that can be invoked while using a web client or a virtual device. The user can invoke relevant APIs using GET or POST to submit various transactions through HTTP requests. The REST server hosts the Fabric client application to communicate with the HLF network through google Remote Procedures Calls (gRPC) system deployment. All of the peers in the network have a copy replica of the ledger. The ledger has two parts transaction log and all the recorded state changes. The state data also consists of the key-value pairs that are version. All the state database changes are recorded in time order in the ledger, and the blocks are cryptographically linked together. The orderer node ensures ledger consistency by implementing the PBFT algorithm. The HLF framework supports the Execute-Order-Validate and Commit transaction model.
The Layer -3 simulation model was created while using a workstation as the BS server running the blockchain applications. This environment facilitated measuring the throughput and latency parameters of the Ethereum and Hyperledger private networks. The networks were set up in similar conditions and provided with a virtually generated workload. A distributed environment that includes the two blockchain networks was considered for the experimental set up. The simulation models used a workstation with Intel Core i7-3770 @ 3.4 GHz processor and 16 GB memory as the BS. For simplicity, the Etherume network was deployed with just one mining node. The experimental results are presented in Section 4.3.

4.2.2. Smart Contract for Modeling Transactions

The Hyperledger Composer [68] hosted the blockchain applications and facilitated the design and implementation of smart contracts as well as blockchain applications. A business network was deployed in the Hyperledger Composer through a set of open development tools. The members of business networks were participants. They could submit related transactions. The participants were the owners of IoT devices (CH and related BS nodes) with the management and access abilities for their devices. Assets were services, devices, properties, and goods that were registered and stored within the network. In the reported study, the assets represented IoT devices, including sensors, actuators, or IoT nodes. Each device could be identified through the device ID, device type, device name, device owner, timestamp, event, and value. The presented nodes, including CH ones, were modeled as a different type of assets in the simulation. Transactions represented a logical process within the smart contracts. The implemented model stored the data checksum, data pointers, operations, and ownership of data in the blockchain ledger, while the actual data were held in a separate cloud-server or off-chain storage system. Smart contracts interacted with assets and participants. Besides, a smart contract could set various rules and conditions to perform multiple actions, such as read, create, update, or delete, within the blockchain network. The logical transaction operations were defined in smart contracts as transaction process functions. Smart contracts also included the queries definitions written in a bespoke query language to extract data from the blockchain network. The communication between the blockchain network, IoT device, and the web application was performed by REST APIs that were generated by the composer-rest-server.

4.3. Performance Evaluation

The primary objective of a blockchain application is to maintain a number of submitted transactions by the participants. The submitted transactions then proceed to the verification and ordering process, which results in a block generation and storing the transaction outcome on the blockchain ledger. The following metrics are presented by Hyperledger Performance and Scale Working Group [69] to measure the blockchain application performance:
  • Transaction Throughput, i.e., the total number of committed transactions by the blockchain System Under Test (SUT) in a given time period in seconds.
  • Transaction Latency, i.e., the amount of time that is taken for a transaction to be stored on the blockchain ledger.
The system was tested to evaluate the performance of the proposed model in terms of both the latency and throughput. The results were benchmarked against the parameters reported in the literature with the aim of demonstrating the efficiency of the designed framework. The evaluation was conducted while using the Hyperledger Caliper [70] to facilitate the specific blockchain configuration by the administrator.
In the proposed model, the latency represents the time that is required by CHs to verify new blocks. The block size is an essential factor that affects both node and network latency. The latency is measured by the time that the system requires to reach consensus after the node starts to detect the new block validations. The analysis of the system was conducted with a set of transactions, such as Open, Transfer, and Query. The results were provided for Hyperledger Fabric (proposed blockchain for Layer 2) and Ethereum (standard global blockchain). Table 3 presents the simulation results for evaluating latency and throughput for three different transaction types within HLF implementation. The average latency decreases by implementing a multi-layer model. In this model, only a portion of the nodes (i.e., CHs) is contributing to new blocks validation. Table 3 also presents the Ethereum implementation results. It can be seen that the proposed lightweight HLF blockchain is superior when compared to the Ethereum as a global blockchain technology.
Despite security and privacy, latency and throughput are essential performance metrics when selecting an appropriate blockchain platform for IoT applications. The resource allocation for the blockchain network must be done in order to meet the latency requirements (for a given input load). A further experiment was conducted to analyze the SUT behavior consisted of multiple rounds of benchmarks with different transaction sending rates. The sending rates varied from 20 to 500 Transactions per Second (TPS), and 1000 transactions were generated for each benchmark to measure the maximum, average, and minimum transaction latency and throughput. Figure 11 presents the maximum, average, and minimum transaction latency for each round of experiments. The minimum latency remained below 1 s during the experiments, while the maximum latency proliferated as the send rate reached the 100 TPS. Figure 12 illustrates the transaction throughput results for varying transaction sending rate. The throughput remained around 100% while the sending rate was up to 110 transactions per second. A significant drop in the throughput was observed as the sending rate increased to 110 TPS, which was the maximum usable sending rate for the SUT.
This experiment only considered an individual client in the blockchain network to generate all the transactions. As expected, the performance of the blockchain network highly depends on the underlying hardware. The HLF provides a three-stage revolutionary architecture known as execute-order-validate, in which every stage depends on previously executed transactions.
Our experiments revealed that the proposed HLF-based blockchain model for IoT application could process up to 110 transactions per second while maintaining a 100% transaction throughput and an average latency of 500 milliseconds, with a maximum of 110 TPS, with throughout that is very close to 100%. A send rate of 100 TPS is sustainable, as the actual throughput is around 100%. However, increasing the send rate to 100 and 200 TPS only yields to a marginal throughput decrease. This lead to the conclusion that our setup can sustain a send rate of about 110 TPS. Therefore, our proposed architecture could support real-time provisioning of multiple 5G-enabled IoT applications without imposing any considerable latency to the process.
The maximum latency grows to nearly 15 s as the number of input transactions increases. This is due to resource restrictions of the containers that are allocated to the peer nodes. The minimum latency remains almost constant, as there are no high loads imposed on the peer nodes at the beginning. Additionally, the blockchain configuration (e.g., the block size, the number of channels, ordering service, users, endorsing nodes) influences the latency. It can be observed that, in all cases, all of the transactions are successfully completed, i.e., no loss of transactions occurs.

5. Security Analysis of the Framework

The proposed secured IoT multi-layer model that is based on Hyperledger Blockchain technology offers an overall superiority over the previous works reported in the literature, as illustrated by the metrics comparison that is given in Table 4.

5.1. Framework Privacy

Contracts between different entities are recorded in the blockchain system. Therefore, privacy disclosure assessment is required. The identity of an object is encrypted, and the IoT address is recorded in the blockchain as the pseudonym of the entity. The domain name and fixed address for communication are not required, and the blockchain maintains tasks through running smart contracts, as discussed above. In the IoT network, IP address of an object is encrypted and recorded in the blockchain thus leading to the anonymity of the object. The contract context privacy is guaranteed by the Hash Code of the real context within the blockchain network while minimizing the risk of a privacy leak.

5.2. Heterogeneity and Flexibility

The proposed framework accommodates various configurations for system security in different scenarios. These include the IoT objects with limited resources, the security of sensitive information, high-risk, and broadcasting. The security configuration options can vary, due to the strength of cryptography techniques and characteristics of key lifetimes (strong crypto, short and long key lifetimes, and lightweight cryptography), key distribution mechanisms, the selection of different session keys, such as encryption and authentication, cached session keys, including of one, multiple, and unlimited keys, different owners of keys, and the stability of the fundamental protocols (TCP and UDP). Besides, a certain degree of flexibility is achievable by granting an option to a node or entity to connect or leave the system freely. Changes in the network are recorded in the blockchain through the distributed consensus process.

5.3. Authentication

The process of authentication is implemented in two parts: (1) local authentication and authorization process in the infrastructure layer and (2) rights to objects by smart contracts. The node requirements and respective rights are recorded in the blockchain that was implemented in different segments. The block summary consists of a contract summary. It is accessible at any time. The non-repudiation nature of this summary guarantees the interests of the object.
The multi-layer approach through the network clustering divides the entire IoT network into different tiers, as presented in Figure 2. This includes the local authentication services and globally distributed blockchain-based framework, while separating the external authority. Therefore, the effect of a local authentication service failure or attack to the network is limited to the compromised nodes, while the impact on the network is significantly reduced.

5.4. Scalability

The framework tackles the following scalability challenges: (1) high data traffic and (2) a massive number of IoT objects and devices. The multi-layer structure facilitates multiple cluster implementation and fulfills the scalability issues. Two different CH nodes can establish different secure communications on a client-server basis. CH establishes secure communication with the entities within the same cluster in order to avoid the overhead incrementation. When networked CH nodes start communicating within a framework that is based on the blockchain, the exchange of cryptographic keys is necessary before beginning the client-server communication by which further overhead is reduced.

6. Conclusions

This paper proposes a multi-layer security model for IoT devices functioning under multi-hop cellular networks based on distributed technology of the blockchain. The developed model provides a feasible solution to establish the decentralized application of the blockchain technology for the security of the cellular-enabled IoT network. The hybrid self-clustering EC algorithm, utilizing GA and SA, is developed to fragment the IoT network into clusters in order to provide the multi-layer structure and enhance the network lifetime. Detailed system implementation is discussed, and the way the blockchain-based model can help to improve the IoT system authentication and authorization is elaborated. The model proposes the open-source HLF blockchain for deployment and verification. The multi-layer model enhances network security, lowers the processing load, and reduces network load and latency. The proposed implementation enhances the efficiency of the communications via the peer-to-peer nature of the blockchain communication and maps it to the device-to-device communication in cellular systems with improved integrity and security. The proposed solution tackles the IoT security challenges, including framework privacy, authentication, heterogenicity, and flexibility, as well as network scalability. The proposed hybrid clustering algorithm has been compared with four existing protocols. The simulations study demonstrates that the proposed algorithm outperforms the competitors in terms of various performance metrics, including network load, network coverage, and distances. The performance of the proposed multi-layer blockchain-based framework was evaluated. It was found that the lightweight blockchain was more effective than the global blockchain Ethereum.
The focus of our future work will be on the deployment of a practical scalable test-bed configured as MBS framework of IoT devices to study, analyze, and compare the performance in the real world environment.

Author Contributions

Conceptualization, H.H.P. and M.R.; methodology, H.H.P. and M.R.; software, H.H.P.; validation, H.H.P., M.R. and F.A.; formal analysis, H.H.P.; investigation, H.H.P.; writing—original draft preparation, H.H.P., M.R. and F.A.; writing—review and editing, H.H.P., M.R., F.A. and S.D.; supervision, M.R., F.A. and S.D.; project administration, M.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ASLPRApplication-Specific Low Power Routing
BCSBlockchain Structures
BSBase Station
CCChainCode
CHCluster Head
CLICommand Line Interface
CoAPConstrained Application Protocol
D2DDevice-to-Device
ECEvolutionary Computation
ECCElliptic Curve Cryptography
ERAEnergy-aware Routing Algorithm
FSFLAFuzzy Shuffled Frog Leaping Algorithm
GAGenetic Algorithm
GAPSOGenetic Algorithm and Particle Swarm Optimization
gPRCgoogle Remote Procedures Calls
HLFHyperledger Fabric
IDEIntegrated Development Environment
IoTInternet of Things
LSBLightweight Scalable Blockchain
LHBLightweight Hyperledger Blockchain
LTSLong Term Support
MCNsMultihop Cellular Networks
MSPMembership Service Providers
OSOrdering Service
PKIPublic Key Infrastructure
PoBTProof of Block and Trade
PoCProof of Concept
PoWProof of Work
RoARating of Allocation
SASimulated Annealing
SDKSoftware Development Kit
SDNSoftware Defined Networking
SFLAShuffled Frog Leaping Algorithm
SISwarm Intelligence
SUTSystem Under the Test
TLSTransport Layer Security
TSPTransactions Per Second

References

  1. Familiar, B. Microservices, IoT, and Azure; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
  2. Amoozadeh, M.; Raghuramu, A.; Chuah, C.N.; Ghosal, D.; Zhang, H.M.; Rowe, J.; Levitt, K. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 2015, 53, 126–132. [Google Scholar] [CrossRef] [Green Version]
  3. Ho, G.; Leung, D.; Mishra, P.; Hosseini, A.; Song, D.; Wagner, D. Smart locks: Lessons for securing commodity internet of things devices. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, China, 30 May–3 June 2016; ACM: New York, NY, USA, 2016; pp. 461–472. [Google Scholar]
  4. Kshetri, N. Can blockchain strengthen the internet of things? IT Prof. 2017, 19, 68–72. [Google Scholar] [CrossRef] [Green Version]
  5. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 2019, 134, 180–197. [Google Scholar] [CrossRef]
  6. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  7. Karajeh, H.; Maqableh, M.; Masa’deh, R. Privacy and Security Issues of Cloud Computing Environment. In Proceedings of the 23rd IBIMA Conference Vision: 2020, Valencia, Spain, 13–14 May 2014; pp. 1–15. [Google Scholar]
  8. Guerbouj, S.S.E.; Gharsellaoui, H.; Bouamama, S. A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things. Int. J. Serv. Sci. Manag. Eng. Technol. 2019, 10, 32–44. [Google Scholar]
  9. Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 2019, 6, 2188–2204. [Google Scholar] [CrossRef] [Green Version]
  10. Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
  11. Mistry, I.; Tanwar, S.; Tyagi, S.; Kumar, N. Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges. Mech. Syst. Signal Process. 2020, 135, 106382. [Google Scholar] [CrossRef]
  12. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  13. Wang, S.; Ouyang, L.; Yuan, Y.; Ni, X.; Han, X.; Wang, F. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2266–2277. [Google Scholar] [CrossRef]
  14. Moin, S.; Karim, A.; Safdar, Z.; Safdar, K.; Ahmed, E.; Imran, M. Securing IoTs in distributed blockchain: Analysis, requirements and open issues. Future Gener. Comput. Syst. 2019, 100, 325–343. [Google Scholar] [CrossRef]
  15. Granjal, J.; Monteiro, E.; Silva, J.S. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
  16. Li, S.; Da Xu, L.; Zhao, S. 5G Internet of Things: A survey. J. Ind. Inf. Integr. 2018, 10, 1–9. [Google Scholar] [CrossRef]
  17. Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput. Surv. 2020, 53, 1–32. [Google Scholar] [CrossRef] [Green Version]
  18. Decker, C.; Seidel, J.; Wattenhofer, R. Bitcoin meets strong consistency. In Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, 4–7 January 2016; pp. 1–10. [Google Scholar]
  19. Du, K.L.; Swamy, M. Search and optimization by metaheuristics. In Techniques and Algorithms Inspired by Nature; Birkhauser: Basel, Switzerland, 2016. [Google Scholar]
  20. Zhang, Z.; Cho, M.C.Y.; Wang, C.; Hsu, C.; Chen, C.; Shieh, S. IoT Security: Ongoing Challenges and Research Opportunities. In Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan, 17–19 November 2014; pp. 230–234. [Google Scholar] [CrossRef]
  21. Cooper, D.; Santesson, S.; Farrell, S.; Boeyen, S.; Housley, R.; Polk, W.T. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 2008, 5280, 1–151. [Google Scholar]
  22. Oriwoh, E.; Conrad, M. ‘Things’ in the Internet of Things: Towards a definition. Int. J. Internet Things 2015, 4, 1–5. [Google Scholar]
  23. Ukil, A.; Bandyopadhyay, S.; Pal, A. Iot-privacy: To be private or not to be private. In Proceedings of the 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2014), Toronto, ON, Canada, 27 April–2 May 2014; pp. 123–124. [Google Scholar]
  24. Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195. [Google Scholar] [CrossRef]
  25. Pal, S.; Rabehaja, T.; Hill, A.; Hitchens, M.; Varadharajan, V. On the integration of blockchain to the internet of things for enabling access right delegation. IEEE Internet Things J. 2019, 7, 2630–2639. [Google Scholar] [CrossRef]
  26. Qu, C.; Tao, M.; Zhang, J.; Hong, X.; Yuan, R. Blockchain based credibility verification method for IoT entities. Secur. Commun. Netw. 2018, 2018. [Google Scholar] [CrossRef]
  27. Kumar, N.M.; Mallick, P.K. Blockchain technology for security issues and challenges in IoT. Procedia Comput. Sci. 2018, 132, 1815–1823. [Google Scholar] [CrossRef]
  28. Li, D.; Peng, W.; Deng, W.; Gai, F. A Blockchain-Based Authentication and Security Mechanism for IoT. In Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; pp. 1–6. [Google Scholar] [CrossRef]
  29. Hassan, M.U.; Rehmani, M.H.; Chen, J. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Gener. Comput. Syst. 2019, 97, 512–529. [Google Scholar] [CrossRef]
  30. Dai, H.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A Survey. IEEE Internet Things J. 2019, 6, 8076–8094. [Google Scholar] [CrossRef] [Green Version]
  31. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Big Island, HI, USA, 13–17 March 2017; pp. 618–623. [Google Scholar]
  32. Biswas, S.; Sharif, K.; Li, F.; Maharjan, S.; Mohanty, S.P.; Wang, Y. PoBT: A lightweight consensus algorithm for scalable IoT business blockchain. IEEE Internet Things J. 2019, 7, 2343–2355. [Google Scholar] [CrossRef]
  33. Pahl, C.; El Ioini, N.; Helmer, S. A Decision Framework for Blockchain Platforms for IoT and Edge Computing. In Proceedings of the International Conference on Internet of Things, Big Data and Security, Funchal, Portugal, 19–21 March 2018. [Google Scholar]
  34. Yánez, W.; Mahmud, R.; Bahsoon, R.; Zhang, Y.; Buyya, R. Data Allocation Mechanism for Internet-of-Things Systems with Blockchain. IEEE Internet Things J. 2020, 7, 3509–3522. [Google Scholar] [CrossRef]
  35. Fabric, W.T.H. Available online: http://hyperledger-fabric.readthedocs.io/en/release-1.4/ (accessed on 15 October 2020).
  36. Klaokliang, N.; Teawtim, P.; Aimtongkham, P.; So-In, C.; Niruntasukrat, A. A Novel IoT Authorization Architecture on Hyperledger Fabric with Optimal Consensus Using Genetic Algorithm. In Proceedings of the 2018 Seventh ICT International Student Project Conference (ICT-ISPC), Nakhon Pathom, Thailand, 11–13 July 2018; pp. 1–5. [Google Scholar] [CrossRef]
  37. Zhaofeng, M.; Lingyun, W.; Xiaochang, W.; Zhen, W.; Weizhe, Z. Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data. IEEE Internet Things J. 2019, 7, 4000–4015. [Google Scholar] [CrossRef]
  38. Biswas, K.; Muthukkumarasamy, V. Securing Smart Cities Using Blockchain Technology. In Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, Australia, 12–14 December 2016; pp. 1392–1393. [Google Scholar] [CrossRef] [Green Version]
  39. Chendeb, N.; Khaled, N.; Agoulmine, N. Integrating Blockchain with IoT for a Secure Healthcare Digital System. In Proceedings of the 8th International Workshop on ADVANCEs in ICT Infrastructures and Services (ADVANCE 2020), Cancun, Mexico, 27–29 January 2020; pp. 1–8. [Google Scholar]
  40. Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [Google Scholar] [CrossRef]
  41. Mbarek, B.; Jabeur, N.; Pitner, T. Mbs: Multilevel blockchain system for IoT. Pers. Ubiquitous Comput. 2019, 1–8. [Google Scholar] [CrossRef]
  42. Oktian, Y.E.; Lee, S.G.; Lee, H.J. Hierarchical multi-blockchain architecture for scalable internet of things environment. Electronics 2020, 9, 1050. [Google Scholar] [CrossRef]
  43. Li, C.; Zhang, L.J. A blockchain based new secure multi-layer network model for Internet of Things. In Proceedings of the 2017 IEEE International Congress on Internet of Things (ICIOT). IEEE, Honolulu, HI, USA, 25–30 June 2017; pp. 33–41. [Google Scholar]
  44. Sagirlar, G.; Carminati, B.; Ferrari, E.; Sheehan, J.D.; Ragnoli, E. Hybrid-iot: Hybrid blockchain architecture for internet of things-pow sub-blockchains. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1007–1016. [Google Scholar]
  45. Badr, S.; Gomaa, I.; Abd-Elrahman, E. Multi-tier blockchain framework for IoT-EHRs systems. Procedia Comput. Sci. 2018, 141, 159–166. [Google Scholar] [CrossRef]
  46. Xuan, S.; Zhang, Y.; Tang, H.; Chung, I.; Wang, W.; Yang, W. Hierarchically Authorized Transactions for Massive Internet-of-Things Data Sharing Based on Multilayer Blockchain. Appl. Sci. 2019, 9, 5159. [Google Scholar] [CrossRef] [Green Version]
  47. Lin, H.; Yang, Z.; Hong, Z.; Li, S.; Chen, W. Smart Contract-based Hierarchical Auction Mechanism for Edge Computing in Blockchain-empowered IoT. In Proceedings of the 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Cork, Ireland, 31 August–3 September 2020; pp. 147–156. [Google Scholar]
  48. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasurbramanian, V. A Lightweight Blockchain Based Framework for Underwater IoT. Electronics 2019, 8, 1552. [Google Scholar] [CrossRef] [Green Version]
  49. Saputro, M.Y.A.; Sari, R.F. Securing IoT network using lightweight multi-fog (LMF) blockchain model. In Proceedings of the 2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Bandung, Indonesia, 18–20 September 2019; pp. 183–188. [Google Scholar]
  50. Rashid, M.A.; Pajooh, H.H. A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology. In Proceedings of the 2019 18th IEEE International Conference On Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; pp. 264–271. [Google Scholar] [CrossRef]
  51. Aslam, S.; Alam, F.; Hasan, S.F.; Rashid, M.A. Performance Analysis of Clustering Algorithms for Content-Sharing Based D2D Enabled 5G Networks. In Proceedings of the International Telecommunication Networks and Applications Conference 2019 (ITNAC2019), Auckland, New Zealand, 27–29 November 2019. [Google Scholar]
  52. Foundation, L. Hyperledger White paper. Hyperledger 2016, v2.0.0, 1–19. [Google Scholar]
  53. De Angelis, S.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; Sassone, V. PBFT vs. proof-of-authority: Applying the CAP theorem to permissioned blockchain. In Proceedings of the Italian Conference on Cyber Security, Milan, Italy, 6–9 February 2018. [Google Scholar]
  54. Cachin, C. Architecture of the hyperledger blockchain fabric. In Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, USA, 25–29 July 2016; Volume 310. [Google Scholar]
  55. Joglekar, J.; Bhutani, S.; Patel, N.; Soman, P. Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT System. In Sustainable Communication Networks and Application; Karrupusamy, P., Chen, J., Shi, Y., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 270–278. [Google Scholar]
  56. Altay, E.V.; Alatas, B. Performance Comparisons of Socially Inspired Metaheuristic Algorithms on Unconstrained Global Optimization. In Advances in Computer Communication and Computational Sciences; Springer: Singapore, 2019; pp. 163–175. [Google Scholar]
  57. García, J.; Crawford, B.; Soto, R.; Astorga, G. A clustering algorithm applied to the binarization of Swarm intelligence continuous metaheuristics. Swarm Evol. Comput. 2019, 44, 646–664. [Google Scholar] [CrossRef]
  58. Sabet, S.; Shokouhifar, M.; Farokhi, F. A comparison between swarm intelligence algorithms for routing problems. Electr. Comput. Eng. Int. J. 2016, 5, 17–33. [Google Scholar]
  59. Elhoseny, M.; Yuan, X.; Yu, Z.; Mao, C.; El-Minir, H.K.; Riad, A.M. Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm. IEEE Commun. Lett. 2015, 19, 2194–2197. [Google Scholar] [CrossRef]
  60. Shokouhifar, M.; Jalali, A. A new evolutionary based application specific routing protocol for clustered wireless sensor networks. AEU-Int. J. Electron. Commun. 2015, 69, 432–441. [Google Scholar] [CrossRef]
  61. Eleburuike, I.O.; Adekunle, S.S. Energy Efficient Wireless Sensor Network Using Hierarchical Routing Technique; Blekinge Institute of Technology: Karlskrona, Sweden, 2010. [Google Scholar]
  62. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000. [Google Scholar] [CrossRef]
  63. Guru, S.M.; Hsu, A.; Halgamuge, S.; Fernando, S. An Extended Growing Self-Organizing Map for Selection of Clusters in Sensor Networks. Int. J. Distrib. Sens. Netw. 2005, 1, 227–243. [Google Scholar] [CrossRef] [Green Version]
  64. Fanian, F.; Rafsanjani, M.K. Memetic fuzzy clustering protocol for wireless sensor networks: Shuffled frog leaping algorithm. Appl. Soft Comput. 2018, 71, 568–590. [Google Scholar] [CrossRef]
  65. Amgoth, T.; Jana, P.K. Energy-aware routing algorithm for wireless sensor networks. Comput. Electr. Eng. 2015, 41, 357–367. [Google Scholar] [CrossRef]
  66. Nykyri, M.; Kuisma, M.; Kärkkäinen, T.J.; Hallikas, J.; Jäppinen, J.; Korpinen, K.; Silventoinen, P. IoT Demonstration Platform for Education and Research. In Proceedings of the 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), Helsinki, Finland, 22–25 July 2019; Volume 1, pp. 1155–1162. [Google Scholar] [CrossRef]
  67. Docker, I. Docker. 2017. Available online: https://www.docker.com/what-docker (accessed on 30 September 2020).
  68. Composer, H. Hyperledger Composer Documentation. Linux Found. 2018. Available online: https://hyperledger.github.io/composer/latest/introduction/introduction.html (accessed on 1 September 2020).
  69. Performance, H.; Group, S.W. Hyperledger Blockchain Performance Metrics. White paper. 2018, Volume 1. Available online: https://www.hyperledger.org/wpcontent/uploads/2018/10/HL_Whitepaper_Metrics_PDF_V1 (accessed on 30 September 2020).
  70. Caliper, H. Hyperledger Caliper Architecture. Electronic Article. 2019. Available online: https://hyperledger.github.io/caliper/docs/2_Architecture (accessed on 15 September 2020).
  71. Kokoris-Kogias, L.; Gasser, L.; Khoffi, I.; Jovanovic, P.; Gailly, N.; Ford, B. Managing identities using blockchains and CoSi. In Proceedings of the 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016), Darmstadt, Germany, 19–22 May 2016. [Google Scholar]
  72. Aitzhan, N.Z.; Svetinovic, D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 2016, 15, 840–852. [Google Scholar] [CrossRef]
  73. Wang, K.; Shao, Y.; Shu, L.; Zhu, C.; Zhang, Y. Mobile big data fault-tolerant processing for ehealth networks. IEEE Netw. 2016, 30, 36–42. [Google Scholar] [CrossRef]
  74. Wan, J.; Li, J.; Imran, M.; Li, D. A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans. Ind. Informatics 2019, 15, 3652–3660. [Google Scholar] [CrossRef]
  75. Lu, Q.; Xu, X. Adaptable blockchain-based systems: A case study for product traceability. IEEE Softw. 2017, 34, 21–27. [Google Scholar] [CrossRef]
  76. Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Informatics 2017, 14, 3690–3700. [Google Scholar] [CrossRef] [Green Version]
  77. Esposito, C.; Santis, A.; Tortora, G.; Chang, H.; Choo, K. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 2018, 5, 31–37. [Google Scholar] [CrossRef]
  78. Rahman, M.A.; Hossain, M.S.; Loukas, G.; Hassanain, E.; Rahman, S.S.; Alhamid, M.F.; Guizani, M. Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access 2018, 6, 72469–72478. [Google Scholar] [CrossRef]
  79. Liu, H.; Zhang, Y.; Yang, T. Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw. 2018, 32, 78–83. [Google Scholar] [CrossRef]
  80. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
Figure 1. Multi-Layer model for Internet of Things (IoT) network.
Figure 1. Multi-Layer model for Internet of Things (IoT) network.
Sensors 21 00772 g001
Figure 2. The network model based on a multi-layer structure that implements a local authorization service in the infrastructure level, a local blockchain, and public chain in the remaining two layers.
Figure 2. The network model based on a multi-layer structure that implements a local authorization service in the infrastructure level, a local blockchain, and public chain in the remaining two layers.
Sensors 21 00772 g002
Figure 3. Local authorization service among IoT entity and Cluster Head (CH) nodes for secure communication.
Figure 3. Local authorization service among IoT entity and Cluster Head (CH) nodes for secure communication.
Sensors 21 00772 g003
Figure 4. The network architecture of the IoT-enabled cellular system combined with the blockchain technology and smart contracts.
Figure 4. The network architecture of the IoT-enabled cellular system combined with the blockchain technology and smart contracts.
Sensors 21 00772 g004
Figure 5. Network clustering scheme for cellular IoT network.
Figure 5. Network clustering scheme for cellular IoT network.
Sensors 21 00772 g005
Figure 6. The flow of the Genetic Algorithm-GA-Simulated Annealing (GA-GA-SA) clustering algorithm.
Figure 6. The flow of the Genetic Algorithm-GA-Simulated Annealing (GA-GA-SA) clustering algorithm.
Sensors 21 00772 g006
Figure 7. GA algorithm pseudocode.
Figure 7. GA algorithm pseudocode.
Sensors 21 00772 g007
Figure 8. SA Algorithm pseudocode.
Figure 8. SA Algorithm pseudocode.
Sensors 21 00772 g008
Figure 9. Performance of the proposed clustering algorithm. (a): clustered network and CH positions. (bd): benchmarked performance in terms of load, distances, and coverage, respectively.
Figure 9. Performance of the proposed clustering algorithm. (a): clustered network and CH positions. (bd): benchmarked performance in terms of load, distances, and coverage, respectively.
Sensors 21 00772 g009
Figure 10. The implementation structure of the blockchain IoT framework.
Figure 10. The implementation structure of the blockchain IoT framework.
Sensors 21 00772 g010
Figure 11. Latency vs. transaction sending rate.
Figure 11. Latency vs. transaction sending rate.
Sensors 21 00772 g011
Figure 12. Throughput vs. transaction sending rate.
Figure 12. Throughput vs. transaction sending rate.
Sensors 21 00772 g012
Table 1. GAs Parameter Settings.
Table 1. GAs Parameter Settings.
GAs ParametersValue
Population Size30
Selection TypeProportional Selection
Recombination Percentage0.1
Crossover Percentage0.5
Crossover TypeOne-Point
Mutation Percentage0.4
Mutation Rate0.05
Generation Size500
Table 2. SA Parameter Settings.
Table 2. SA Parameter Settings.
SA ParametersValue
Max Iter SA1000
T initial0.001
T final0.000
Pchange Max0.05
Pchange Min0.02
Table 3. Hyperledger and Ethereum performance metric summary (H: Hyperledger Fabric, E: Ethereum).
Table 3. Hyperledger and Ethereum performance metric summary (H: Hyperledger Fabric, E: Ethereum).
NameSend Rate (TPS)Max Latency (s)Min Latency (s)Avg Latency (s)Throughput (TPS)
BlockchainHEHEHEHEHE
Open20.222.70.387.050.042.120.184.5820.110
Query1010.20.070.020.010.010.010.011010.2
Transfer1010.70.387.130.062.070.194.63106.7
Table 4. Security challenge comparison of blockchain applications in IoT systems.
Table 4. Security challenge comparison of blockchain applications in IoT systems.
RefIoT ApplicationSecurity ChallengesImplemented
Consensus
Implemented
Blockchain
Framework
Privacy
Heterogeneity
and Flexibility
AuthenticationScalability
[38]Smart Grids, Smart Cities Yes YesPoWPrivate
[71]Microgrids, Smart Grids, Vehicle-to-GridsYes PoWConsortium
[72]Microgrids, Smart GridYes PoCPrivate
[73]Big Data, eHealthYes YesPoWPublic
[74]Industrial IoTYesYes PoWPrivate
[75]Smart Factory, Supply Chain Yes PoSConsortium
[76]Industrial IoT, Energy Harvesting networksYesYes PoWConsortium
[77]eHealthYes PoWPublic
[78]Mobile edge computing, eHealth Yes YesPoCPermissioned
[79]Cloud computing, V2XYes Yes PoSConsortium
[80]Vehicular Edge Computing YesYes PoWConsortium
proposed5G MBSYesYesYesYesPBFT,
PoC
Consortium
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Honar Pajooh, H.; Rashid, M.; Alam, F.; Demidenko, S. Multi-Layer Blockchain-Based Security Architecture for Internet of Things. Sensors 2021, 21, 772. https://doi.org/10.3390/s21030772

AMA Style

Honar Pajooh H, Rashid M, Alam F, Demidenko S. Multi-Layer Blockchain-Based Security Architecture for Internet of Things. Sensors. 2021; 21(3):772. https://doi.org/10.3390/s21030772

Chicago/Turabian Style

Honar Pajooh, Houshyar, Mohammad Rashid, Fakhrul Alam, and Serge Demidenko. 2021. "Multi-Layer Blockchain-Based Security Architecture for Internet of Things" Sensors 21, no. 3: 772. https://doi.org/10.3390/s21030772

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop