Secure Internet of Things Based on Blockchain: Comparison
Please note this is a comparison between Version 2 by Jessie Wu and Version 1 by Ahmed Alhusayni.

Centralized networks can host ubiquitous interconnected objects using Internet of Things (IoT) platforms. It is also possible to implement decentralized peer-to-peer solutions using blockchain technology, including smart homes and connected cars. However, both models have limitations regarding their ability to provide privacy and security due to limited resources, centralization management, and scalability, cost, and response time. The diversity of IoT network nodes is expected to result in different throughputs and rates. Centralized networks control and improve the performance of a large number of IoT devices. However, centralizing systems suffer from a number of disadvantages. A third party often has to manipulate the data collected by central cloud storage, which could lead to information leaks that could compromise the user’s privacy.

  • blockchain
  • dynamic consensus control algorithm
  • IoT
  • distributed data management
  • security

1. Internet oTf Things Authentication and Authorization

The term “Internet of Things” refers to the connectivity of “smart” devices, including digital and mechanical machinery, goods, and people. These “smart” gadgets are able to exchange data via a network without the involvement of a human being. The typical Internet of Things system is depicted in Figure 1. Applications of the Internet of Things on a larger scale include, among other things, smart cities, smart homes, and smart healthcare systems. The typical Internet oTf Things (IoT) system is composed of: (i) IoT sensors and devices such as smart vehicles, smart electronics equipment, and smart home appliances. (ii) Networks, communication protocols, and 4G and 5G technologies. (iii) Communication and processing protocols (iv) Storage resources such as the cloud.
Figure 1.
The IoT architecture and its distribution.
To access IoT applications, devices must be authenticated and authorized. In terms of network security, these measures are crucial [9][1]. A relevant authentication procedure is needed for establishing secure communication between IoT devices. An IoT network typically uses public key infrastructure to control the authentication and authorization of devices and nodes [10][2]. The high volume of requests greatly exacerbates the authority center’s workload, resulting in considerable delays [11][3]. Several new mechanisms have been suggested to improve this situation. Ref. [12][4] proposes a method for authentication and privacy using IP-Sec with TLS. Nonetheless, due to its high computing requirements, such a mechanism is inefficient for connected devices with limited computational resources.
IoT researchers [13][5] found a way to provide an access management system based on blockchain technology. A Proof of Concept (PoC) algorithm is a consensus-based method implemented instead of a centralized management server in the suggested approach. By utilizing Ethereum blockchain technology to verify the entity’s identity [14][6], it presents IoT controlling access in a secure manner that addresses issues of delegating access rights. In a previous paper [15][7], blockchain structures (BCS) are proposed as IoT verification methods using layers, intersections, and self-organization. Security performance is assessed based on the efficiency of storage, responsiveness, and validity. Based on the blockchain, ref. [16][8] proposes an IoT security and authentication method. By using this method, single points of failure can be avoided.

2. The Blockchain and Internet IoTof Things Environment

In 2008, a well-known crypto currency called Bitcoin developed and utilized blockchain technology for the first time [17][9]. It is a decentralized ledger technology with a peer-to-peer networking foundation. Figure 2 depicts the workings of a typical blockchain paradigm. In this approach, each node in the blockchain network updates its copy of the ledger. The Internet of Things (IoT) devices can be made more secure, private, and reliable by using blockchain technology for encrypted communication.
Figure 2.
The working mechanism of a typical blockchain.
Conventional centralized systems rely on a single point of control and are hence open to attacks. On the other hand, blockchain is decentralized, meaning no organization has complete authority over the network. Lowering the single points of failure and potential attack routes can improve the security of IoT connectivity. Blockchain also offers an unchangeable, tamper-proof ledger in which data can be safely recorded. As seen in Figure 3, a chain of blocks that is impossible to tamper with without being noticed is created by connecting each data block to the one before it using cryptographic hashes. This guarantees the accuracy of the data transmitted between IoT devices.
Figure 3.
Data connectivity via chain of blocks inside blockchain.
Blockchain-based identity and authentication management allow for secure device authentication. Each IoT device can have a distinct digital identity that is kept on the blockchain and can be used to confirm the validity of the device and its data. The conditions of the agreement are explicitly contained in the smart contract’s code, which is a self-executing contract. Smart contracts can be applied to the Internet of Things to automate processes based on predetermined criteria. To ensure secure and predictable behavior, a smart contract can specify, for instance, that a particular action carried out by an IoT device should only be conducted if certain criteria are met. Thanks to the secure data sharing, multiple parties can share data in a regulated, secure manner. The risk of data breaches and illegal access is decreased since IoT devices can share data directly with authorized parties without the use of middlemen.

3. Secure Internet IoTof Things Frameworks Based on Blockchain

A new method of addressing privacy and security challenges associated with the IoT has been developed using blockchain; [18][10] presents several strategies for preserving privacy within blockchain-based IoT systems. Several strategies to implement differential privacy include encryption, anonymization, private contracts, and mixing.
Study [19][11] looks at blockchain and IoT applications and discusses how the technology can address security concerns. Figure 4 shows the secure IoT framework with blockchain implementation, as the IoT is challenged by insufficient standardization, the limited capacity of cloud servers, low manipulation potential, and costs [4][12]. As a way to facilitate IoT device privacy and security, lightweight scalable blockchain is described in [20][13]. By implementing a blockchain with robust computing performance, decentralization and privacy protection are achieved due to the implementation of an overlay network. IoT networks and blockchain should be integrated to address their challenges [21][14]. A redesigned consensus mechanism called Proof of Block and Trade is proposed. It aims to speed up the validation of trades and blocks by reducing computation time. An IoT device’s memory requirements are reduced by developing a distributed ledger. The authors of [3][15] propose a blockchain-based model that uses lightweight scalable blockchain (LSB) to modify the consensus algorithm, reducing the deployment complexity of Proof of Work. Ref. [22][16] explains how blockchain-based frameworks can be utilized to address problems such as confidentiality, trust, resilience, and autonomy. Blockchain implementation can be assessed using an IoT and edge computing decision structure with the framework. Ref. [23][17] proposes a context-sensitive data allocation mechanism for blockchain-enabled IoT systems. For each data request, the authors compute the rating of allocation (RoA) score using a fuzzy logic mechanism. This preseaper rch investigates the efficiency of blockchain systems and fog architectures.
Figure 4.
Secure IoT framework with blockchain implementation.

4. Blockchain Security Model for 5G-Enabled Internet IoTof Things Networks

In [24][18], a blockchain-based solution for automated certificate revocation in 5G IoT networks is proposed. The system utilizes blockchain technology to ensure the security and privacy of IoT devices and data by providing a reliable and efficient certificate revocation mechanism. The proposed system uses smart contracts and consensus mechanisms to automate the certificate revocation process and maintain the system’s integrity.
A blockchain-based remote data integrity checking scheme (RDIC) for IoT devices in 5G networks is proposed in [25][19]. The proposed scheme utilizes a blockchain to maintain the integrity of the data collected by IoT devices in the network. The system employs a challenge–response protocol and smart contracts to automate the data checking process and ensure the authenticity of the data. The proposed scheme addresses the security and privacy issues associated with data collection and sharing in IoT networks. Another paper proposes a blockchain-based data dissemination scheme for 5G-enabled softwarized UAV networks [26][20]. The proposed scheme utilizes blockchain technology to provide secure and reliable data dissemination between UAVs and other entities in the network. The system employs a consensus mechanism and smart contracts to automate the data dissemination process and maintain the integrity of the system. The proposed scheme is designed to address the security and privacy issues associated with data dissemination in UAV networks.

5. Permissioned Blockchain in Internet Ioof Things

It is possible to achieve the benefits of a trust-free environment, which is also flexible, scalable, and confidential, without the need for centralized authority through the use of Hyperledger Fabric (HLF) [27][21]. Hyperledger Fabric is an open-source blockchain platform developed by the Linux Foundation. It provides a modular and highly flexible framework for building permissioned blockchain networks, making it suitable for various enterprise applications. Hyperledger Fabric offers features like confidentiality, scalability, and flexibility in terms of consensus algorithms and smart contract languages. It is designed to support consortium networks where multiple organizations collaborate while preserving data privacy and security. In the HLF framework, consensus algorithms are open architectures. This allows you to modify the configuration and increase performance. An authorization framework based on the HLF framework is proposed in [28][22] for an IoT network. There is some consideration of IoT-driven data collection and its standard features in [29][23]. In order to address the management issues of big data generated by the IoT, this research proposes the management of big data on a blockchain through a permissioned, decentralized trust management protocol (BlockBDM).

6. Level-Based Internet IoTof Things Blockchain

According to [17][9], a platform is proposed to make smart city communication more secure using blockchain. An IoT and blockchain especially suited for medical use have been proposed in paper [30][24]. With decentralized multi-layer IoT networks, the solution solves the computation and complexity challenges associated with blockchain implementation. To implement the smart city, a blockchain and SDN-based hybrid network architecture is proposed in [31][25]. A core network and edge network are proposed as parts of the proposed architecture to improve efficiencies. Both the strengths of centralized and distributed networks are inherited by this model. In [32][26], the authors present an enhanced privacy and data security framework based on blockchain technologies. Multi-layer management aims to improve response times and utilization. In this framework, mobile agents can perform a hash function, implement encryption, implement aggregation, and decrypt data. As a result, mobile agents are transferred from blockchains to IoTs to complete their tasks. An IoT blockchain framework based on a hierarchical two-tier system is proposed in [33][27] for the IoT car rental system that uses blockchain technology to enhance and measure its scalability. In [34][28], a cloud-based multi-layer architecture that utilizes blockchain is proposed to facilitate the monitoring and management of the Internet of Underwater Things (IoUT). Using selected residual energy super nodes, clusters and groups of sensor nodes are formed. The Bloom filter is used to track super nodes and nodes. In order to communicate, gateways deploy a standard secret key, which is distinct from the super node’s secret key. As a result, the routed data are stored in the blockchain ledger.

References

  1. Felcia, H.J.; Sabeen, S. A Survey on IoT Security: Attacks, Challenges and Countermeasures. Webology 2022, 19, 3741–3763.
  2. Liang, J.; Ma, M.; Yang, G.; Wang, H. Bac-Crl: Blockchain-Assisted Coded Caching Certificate Revocation List for Authentication in Vanets. SSRN Electron. J. 2022, 218, 103716.
  3. Maamar, Z.; Faci, N.; Ugljanin, E.; Baker, T.; Burégio, V. Towards a Cell-Inspired Approach for a Sustainable Internet-of-Things. Internet Things 2021, 14, 100400.
  4. Apthorpe, N.; Huang, D.Y.; Reisman, D.; Narayanan, A.; Feamster, N. Keeping the Smart Home Private with Smart(Er) IoT Traffic Shaping. Proc. Priv. Enhancing Technol. 2019, 2019, 128–148.
  5. Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195.
  6. Pal, S.; Rabehaja, T.; Hill, A.; Hitchens, M.; Varadharajan, V. On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation. IEEE Internet Things J. 2020, 7, 2630–2639.
  7. Qu, C.; Tao, M.; Zhang, J.; Hong, X.; Yuan, R. Blockchain Based Credibility Verification Method for IoT Entities. Secur. Commun. Netw. 2018, 2018, 7817614.
  8. Lau, C.H.; Yeung, K.H.; Yan, F.; Chan, S. Blockchain-based Authentication and Secure Communication in IoT Networks. Secur. Priv. 2023, e319.
  9. Alnahari, M.S.; Ariaratnam, S.T. The Application of Blockchain Technology to Smart City Infrastructure. Smart Cities 2022, 5, 979–993.
  10. Hassan, M.U.; Rehmani, M.H.; Chen, J. Privacy Preservation in Blockchain Based IoT Systems: Integration Issues, Prospects, Challenges, and Future Research Directions. Future Gener. Comput. Syst. 2019, 97, 512–529.
  11. Dai, H.-N.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A Survey. IEEE Internet Things J. 2019, 6, 8076–8094.
  12. Khan, M.A.; Salah, K. IoT Security: Review, Blockchain Solutions, and Open Challenges. Future Gener. Comput. Syst. 2018, 82, 395–411.
  13. Al Hwaitat, A.K.; Almaiah, M.A.; Ali, A.; Al-Otaibi, S.; Shishakly, R.; Lutfi, A.; Alrawad, M. A New Blockchain-Based Authentication Framework for Secure IoT Networks. Electronics 2023, 12, 3618.
  14. Biswas, S.; Sharif, K.; Li, F.; Maharjan, S.; Mohanty, S.P.; Wang, Y. PoBT: A Lightweight Consensus Algorithm for Scalable IoT Business Blockchain. IEEE Internet Things J. 2020, 7, 2343–2355.
  15. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. LSB: A Lightweight Scalable Blockchain for IoT Security and Anonymity. J. Parallel Distrib. Comput. 2019, 134, 180–197.
  16. Xu, X.; Zeng, Z.; Yang, S.; Shao, H. A Novel Blockchain Framework for Industrial IoT Edge Computing. Sensors 2020, 20, 2061.
  17. Yanez, W.; Mahmud, R.; Bahsoon, R.; Zhang, Y.; Buyya, R. Data Allocation Mechanism for Internet-of-Things Systems with Blockchain. IEEE Internet Things J. 2020, 7, 3509–3522.
  18. Hewa, T.; Bracken, A.; Ylianttila, M.; Liyanage, M. Blockchain-based Automated Certificate Revocation for 5G IoT. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–7.
  19. Wang, H.; He, D.; Yu, J.; Xiong, N.N.; Wu, B. RDIC: A Blockchain-Based Remote Data Integrity Checking Scheme for IoT in 5G Networks. J. Parallel Distrib. Comput. 2021, 152, 1–10.
  20. Gupta, R.; Patel, M.M.; Tanwar, S.; Kumar, N.; Zeadally, S. Blockchain-Based Data Dissemination Scheme for 5G-Enabled Softwarized UAV Networks. IEEE Trans. Green Commun. Netw. 2021, 5, 1712–1721.
  21. A Blockchain Platform for the Enterprise (Hyperledger Fabric). Available online: http://hyperledger-fabric.readthedocs.io/ (accessed on 15 September 2021).
  22. Ayğin, N.; Karaköse, M. Genetic Algorithm-Based Optimization of Mass Customization Using Hyperledger Fabric Blockchain. Turk. J. Sci. Technol. 2022, 17, 451–460.
  23. Zhaofeng, M.; Lingyun, W.; Xiaochang, W.; Zhen, W.; Weizhe, Z. Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data. IEEE Internet Things J. 2020, 7, 4000–4015.
  24. Alharbi, S.; Attiah, A.; Alghazzawi, D. Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends. Sustainability 2022, 14, 16002.
  25. Sharma, P.K.; Park, J.H. Blockchain Based Hybrid Network Architecture for the Smart City. Future Gener. Comput. Syst. 2018, 86, 650–655.
  26. Mbarek, B.; Jabeur, N.; Pitner, T.; Yasar, A.-U.-H. MBS: Multilevel Blockchain System for IoT. Pers. Ubiquitous Comput. 2019, 25, 247–254.
  27. Oktian, Y.E.; Lee, S.-G.; Lee, H.J. Hierarchical Multi-Blockchain Architecture for Scalable Internet of Things Environment. Electronics 2020, 9, 1050.
  28. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasurbramanian, V. A Lightweight Blockchain Based Framework for Underwater IoT. Electronics 2019, 8, 1552.
More
Video Production Service