Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table
Abstract
:1. Introduction
- We offer a multi-layer blockchain-based method for safeguarding the privacy and security of IoT devices while also increasing system scalability.
- Multiple-hashcode-based access control is utilized to provide safe communication with multiple organizations without Trusting Third Parties (TTP);
- We assess our approach by executing a prototype implementation to match the IoT criteria.
2. IoT Architecture and Security Challenges
- Issues with low-level security;
- Issues of security at the intermediate level;
- Issues of high-level security.
3. Blockchain Technology
Blockchain Platform in IoT
- The trade-off between performance, security, and power consumption: The development of these technology-based apps on resource-constrained devices has increased significantly due to the high computing power needed to execute blockchain algorithms [30]. Researchers have also questioned how well the blockchain performs while processing data from the Internet of Things and advised improving its core algorithms to produce more verified blocks per second [31]. For instance, getting rid of the blockchain’s PoW consensus algorithm can enhance efficiency and minimize power use [32]
- IoT Connectivity Challenges: To exchange IoT data with possible stakeholders, the IoT devices are anticipated to be connected to high computational, storage, and networking capabilities [33]. The Internet of Things (IoT) has limited capacity to link with blockchain technology to offer fresh business prospects for the development of new applications and services in several domains.
- Data concurrency and throughput issue: IoT systems have high concurrency because IoT devices transmit data continually [34]. Due to its intricate cryptographic security protocol and consensus procedures, the blockchain’s throughput is constrained. Increased bandwidth is needed to quickly synchronize new blocks between blockchain nodes in a chain-structured ledger, which can increase blockchain throughput.
- Blockchain Regulating in IoT: Decentralization, immutability, anonymity, and automation are some of the blockchain’s promised security properties for a variety of IoT applications, but these traits taken together provide several new regulatory issues [35]. The distributed transaction ledger (DTL) immutability characteristic indicates that data are permanently published there and cannot be changed or removed. Additionally, because there is no governance, documents cannot be vetted to preserve privacy before being published on the blockchain.
4. Literature Review
5. Proposed Solution
5.1. Dynamic Blockchain Table (DBT)
5.2. Smart Contract
- The data processing tasks that are called at each event include the production of sensed data records, data date and time, and IoT device ID, which is represented by a dynamicTable 256-bit.
- A database with a dynamic table from an Internet of Things device to store the detected data. ID, IoT ID, sensed data, and sensed data date/time are among these data.
- Functions, which contain all the functions needed to proceed with the event. Which are:
- Data creation: add the sensed data to the array with the basic information mentioned before.
- Block verification: when the dynamic table has confirmed the validity of the data with the previous dynamic table.
5.3. Multiple AES Encryption
5.4. Key Exchange Mechanism
6. Materials and Methods
7. Evaluation and Analysis
7.1. Security Analysis
- Using standard blockchain technology is much more costly than the proposed solution due to the hashing mechanism that is used with a standard blockchain, which is (SHA-2).
- Encrypting the transfer channel only with the HTTPS or SSL technique is not enough to secure the IoT data, because it requires encrypting data with a 256-bit AES key, which is much more costly than a 64-bit AES key. Moreover, it does not protect the network from message forwarding. The attacker can simply store and re-send IoT packets many times over the network to the server. On the other hand, the dynamic table mechanism provides a unique identity for each sent message.
- Using multi-part AES keys and a dynamic blockchain table, giving a different message each time even if the data are the same, which maximizes the encrypted data security against a brute-force attack.
- Last but not least, using the proposed solution provides a set of blocks that can be used to verify IoT nodes’ data at any time, as each block is connected with a previous one.
7.2. Performance Evaluation
- Packet overhead: Indicates the length of the sent packets.
- Time overhead: Refers to the processing time for each transaction in the miner and is measured from the time the transaction is received in the miner until the appropriate response is sent to the server.
- Power consumption: Refers to the power that the miner consumes in the hardware to process transactions. The miner is the most power-consuming device in the IoT network because it handles all transactions and does a lot of hashing and encryption. The power consumption of other devices is limited to coding for their transactions.
- Packets overhead: Table 2 shows the simulation results for packets in the network. The content of the table applies to both the access and storage parameters, as they both have the same packet size. The use of encryption and hashing increases the payload of packets due to the transformation of data from its explicit form to its encrypted form; however, given the lower layer headers (i.e., 6LowPAN), the increase in data payload has a relatively small impact, because multi-key encryption with an appropriate meta-array size in the data will result in a slight increase in the size of the transmitted data.
- Time overhead: Figure 7 shows the results of overtime. The BC-based design alone takes more time to process packets than the basic method due to additional coding and hashing, as the system needs more processing. However, comparing it with the previous works that used the blockchain technology, we find that the system has given a better time as a result of the presence of a simplified block technology in the proposed work, which helped reduce the effort significantly.
- Energy consumption: Clearly, the blockchain method in previous research increases the energy consumption by 0.07 (mJ), but in the proposed work, the amount of energy consumed was much better and very close to the basic work. Figure 8 and Figure 9 show the power consumption of the three primary tasks a miner performs: CPU, Transmit (Tx), and Listen (Lx). CPU power consumption increased by approximately 0.002 (mJ) in the comparable design, but with the proposed work, the power increased by approximately 0.0004 due to the lightweight blockchain technique of the proposed solution and simple (xor) hashing. Sending longer data packets doubled the transmission power consumption of the method, we compared with the basic method, but with the proposed system, the consumption increased by less than 25%.
7.3. Proposed Solution Analysis with Healthcare Application
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Nižetić, S.; Šolić, P.; González-de, D.L.d.I.; Patrono, L. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J. Clean. Prod. 2020, 274, 122877. [Google Scholar] [CrossRef]
- Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Noor, M.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]
- Minoli, D.; Occhiogrosso, B. Blockchain mechanisms for IoT security. Internet Things 2018, 1, 1–13. [Google Scholar] [CrossRef]
- Gunduz, M.Z.; Das, R. Analysis of cyber-attacks on smart grid applications. In Proceedings of the 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), Malatya, Turkey, 28–30 September 2018; pp. 1–5. [Google Scholar]
- Antonopoulos, A.M. Mastering Bitcoin: Unlocking Digital Cryptocurrencies; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2014. [Google Scholar]
- Abdelmaboud, A.; Ahmed, A.I.A.; Abaker, M.; Eisa, T.A.E.; Albasheer, H.; Ghorashi, S.A.; Karim, F.K. Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions. Electronics 2022, 11, 630. [Google Scholar] [CrossRef]
- Tanwar, S.; Gupta, N.; Iwendi, C.; Kumar, K.; Alenezi, M. Next Generation IoT and Blockchain Integration. J. Sens. 2022, 2022, 9077348. [Google Scholar] [CrossRef]
- Rahman, M.S.; Islam, M.A.; Uddin, M.A.; Stea, G. A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges. Internet Things 2022, 19, 100551. [Google Scholar] [CrossRef]
- Al_Barazanchi, I.; Murthy, A.; Al Rababah, A.A.; Khader, G.; Abdulshaheed, H.R.; Rauf, H.T.; Daghighi, E.; Niu, Y. Blockchain Technology-Based Solutions for IOT Security. Iraqi J. Comput. Sci. Math. 2022, 3, 53–63. [Google Scholar] [CrossRef]
- Tsaur, W.J.; Chang, J.C.; Chen, C.L. A highly secure IoT firmware update mechanism using blockchain. Sensors 2022, 22, 530. [Google Scholar] [CrossRef]
- Chauhan, C.; Ramaiya, M.K. Advanced Model for Improving IoT Security Using Blockchain Technology. In Proceedings of the 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 20–22 January 2022; pp. 83–89. [Google Scholar]
- Sadeeq, M.M.; Abdulkareem, N.M.; Zeebaree, S.R.; Ahmed, D.M.; Sami, A.S.; Zebari, R.R. IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Acad. J. 2021, 1, 1–7. [Google Scholar] [CrossRef]
- Atlam, H.F.; Wills, G.B. IoT security, privacy, safety and ethics. In Digital Twin Technologies and Smart Cities; Springer: Cham, Switzerland, 2020; pp. 123–149. [Google Scholar]
- Mohindru, V.; Garg, A. Security attacks in internet of things: A review. In Proceedings of the International Conference on Recent Innovations in Computing, Jammu, India, 20–21 March 2020; pp. 679–693. [Google Scholar]
- Arshad, J.; Azad, M.A.; Abdeltaif, M.M.; Salah, K. An intrusion detection framework for energy constrained IoT devices. Mech. Syst. Signal Process. 2020, 136, 106436. [Google Scholar] [CrossRef]
- Oh, S.R.; Kim, Y.G. AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720906388. [Google Scholar] [CrossRef]
- Ahsan, T.; Khan, F.; Iqbal, Z.; Ahmed, M.; Alroobaea, R.; Baqasah, A.M.; Ali, I.; Raza, M.A. IoT devices, user authentication, and data management in a secure, validated manner through the blockchain system. Wirel. Commun. Mob. Comput. 2022, 2022, 8570064. [Google Scholar] [CrossRef]
- Samuel, O.; Omojo, A.B.; Mohsin, S.M.; Tiwari, P.; Gupta, D.; Band, S.S. An Anonymous IoT-Based E-Health Monitoring System Using Blockchain Technology. IEEE Syst. J. 2022, 1–12. [Google Scholar] [CrossRef]
- Monrat, A.A.; Schelén, O.; Andersson, K. A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 2019, 7, 117134–117151. [Google Scholar] [CrossRef]
- Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef]
- Jyothilakshmi, K.; Robins, V.; Mahesh, A. A comparative analysis between hyperledger fabric and ethereum in medical sector: A systematic review. Sustain. Commun. Netw. Appl. 2022, 93, 67–86. [Google Scholar]
- Zhao, Z. Comparison of Hyperledger Fabric and Ethereum Blockchain. In Proceedings of the 2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), Dalian, China, 14–16 April 2022; pp. 584–587. [Google Scholar]
- Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.N. Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 2022, 10, 6605–6621. [Google Scholar] [CrossRef]
- Six, N.; Herbaut, N.; Salinesi, C. Blockchain software patterns for the design of decentralized applications: A systematic literature review. Blockchain Res. Appl. 2022, 3, 100061. [Google Scholar] [CrossRef]
- Sah, S.; Surendiran, B.; Dhanalakshmi, R.; Arulmurugaselvi, N. A Survey on Hyperledger Frameworks, Tools, and Applications. In Internet of Things, Artificial Intelligence and Blockchain Technology; Springer: Cham, Switzerland, 2021; pp. 25–43. [Google Scholar]
- Dasgupta, K.; Rajasekhara Babu, M. A review on crypto-currency transactions using IOTA (Technology). In Social Network Forensics, Cyber Security, and Machine Learning; Springer: Singapore, 2019; pp. 67–81. [Google Scholar]
- Shabandri, B.; Maheshwari, P. Enhancing IoT security and privacy using distributed ledgers with IOTA and the tangle. In Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 7–8 March 2019; pp. 1069–1075. [Google Scholar]
- Schiller, E.; Niya, S.R.; Surbeck, T.; Stiller, B. Scalable transport mechanisms for blockchain IoT applications. In Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabruck, Germany, 14–17 October 2019; pp. 34–41. [Google Scholar]
- Panarello, A.; Tapas, N.; Merlino, G.; Longo, F.; Puliafito, A. Blockchain and iot integration: A systematic survey. Sensors 2018, 18, 2575. [Google Scholar]
- Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. An efficient selective miner consensus protocol in blockchain oriented IoT smart monitoring. In Proceedings of the 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, Australia, 13–15 February 2019; pp. 1135–1142. [Google Scholar]
- Petrut, I.; Oteşteanu, M. The IoT connectivity challenges. In Proceedings of the 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, Romania, 17–19 May 2018; pp. 000385–000388. [Google Scholar]
- Yu, F.; Rao, W.; Liu, C.; Wang, J.; Zhou, L. Architecture, Integrated Gateway Design, Furthermore, Performance Evaluation for High Concurrency Access of Power Internet of Things. Mob. Inf. Syst. 2022, 2022, 1260923. [Google Scholar]
- Ellul, J.; Galea, J.; Ganado, M.; Mccarthy, S.; Pace, G.J. Regulating Blockchain, DLT and Smart Contracts: A technology regulator’s perspective. ERA Forum 2020, 21, 209–220. [Google Scholar] [CrossRef]
- Al Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
- Ouaddah, A.; Abou Elkalam, A.; Ait Ouahman, A. FairAccess: A new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 2016, 9, 5943–5964. [Google Scholar] [CrossRef]
- Yu, W.; Kose, S. A lightweight masked AES implementation for securing IoT against CPA attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 2017, 64, 2934–2944. [Google Scholar] [CrossRef]
- Boudguiga, A.; Bouzerna, N.; Granboulan, L.; Olivereau, A.; Quesnel, F.; Roger, A.; Sirdey, R. Towards better availability and accountability for iot updates by means of a blockchain. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Paris, France, 26–28 April 2017; pp. 50–58. [Google Scholar]
- Miraz, M.H.; Ali, M. Blockchain enabled enhanced IoT ecosystem security. In Proceedings of the International Conference for Emerging Technologies in Computing, London, UK, 23–24 August 2018; pp. 38–46. [Google Scholar]
- Naif, J.R.; Abdul-Majeed, G.H.; Farhan, A.K. Secure IOT system based on chaos-modified lightweight AES. In Proceedings of the 2019 International Conference on Advanced Science and Engineering (ICOASE), Duhok, Iraq, 2–4 April 2019; pp. 1–6. [Google Scholar]
- Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 2019, 134, 180–197. [Google Scholar] [CrossRef]
- Du, M.; Wang, K.; Liu, Y.; Qian, K.; Sun, Y.; Xu, W.; Guo, S. Spacechain: A three-dimensional blockchain architecture for IoT security. IEEE Wirel. Commun. 2020, 27, 38–45. [Google Scholar] [CrossRef]
- Honar Pajooh, H.; Rashid, M.; Alam, F.; Demidenko, S. Multi-layer blockchain-based security architecture for internet of things. Sensors 2021, 21, 772. [Google Scholar] [CrossRef]
- Ahmed, I.; Zhang, Y.; Jeon, G.; Lin, W.; Khosravi, M.R.; Qi, L. A blockchain-and artificial intelligence-enabled smart IoT framework for sustainable city. Int. J. Intell. Syst. 2022, 37, 6493–6507. [Google Scholar] [CrossRef]
- Bataineh, M.R.; Mardini, W.; Khamayseh, Y.M.; Yassein, M.M.B. Novel and Secure Blockchain Framework for Health Applications in IoT. IEEE Access 2022, 10, 14914–14926. [Google Scholar] [CrossRef]
- Seyhan, K.; Nguyen, T.N.; Akleylek, S.; Cengiz, K.; Islam, S.H. Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 2021, 58, 102788. [Google Scholar] [CrossRef]
- Tambe, V.; Bansod, G.; Khurana, S.; Khandekar, S. Reliability and availability of IoT devices in resource constrained environments. Int. J. Qual. Reliab. Manag. 2022, 39, 1648–1662. [Google Scholar] [CrossRef]
Requirement | Employed Safeguard |
---|---|
Confidentiality | Achieved using AES Encryption |
Integrity | Blockchain Technology is employed for integrity achievement |
User Control | Using logging transaction of Blockchain |
Authorization | Achieved using Dynamic Blockchain Array |
Packet Flow | Base | Standard Blockchain | Proposed Solution |
---|---|---|---|
From device to cloud | 5 | 512 | 128 |
From cloud to device | 5 | 512 | 128 |
Packet Flow | IoT Security | Proposed Solution |
---|---|---|
From device to cloud | 1024 | 128 |
From cloud to device | 1024 | 128 |
Packet flow | Proposed solution |
---|---|
From device to cloud | 128 |
From cloud to device | 128 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hameedi, S.S.; Bayat, O. Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table. Appl. Sci. 2022, 12, 9377. https://doi.org/10.3390/app12189377
Hameedi SS, Bayat O. Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table. Applied Sciences. 2022; 12(18):9377. https://doi.org/10.3390/app12189377
Chicago/Turabian StyleHameedi, Saleem S., and Oguz Bayat. 2022. "Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table" Applied Sciences 12, no. 18: 9377. https://doi.org/10.3390/app12189377
APA StyleHameedi, S. S., & Bayat, O. (2022). Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table. Applied Sciences, 12(18), 9377. https://doi.org/10.3390/app12189377