Block Chain: A Game Changer For Securing Iot Data: August 2019
Block Chain: A Game Changer For Securing Iot Data: August 2019
net/publication/335029128
CITATION READS
1 418
2 authors, including:
SEE PROFILE
All content following this page was uploaded by Dr Busireddy Venkata Ramana Reddy on 08 August 2019.
Abstract
Internet of Things (IoT) is now in its initial stage, but very soon, it is going to influence
almost every day-to-day items we use. The more it will be included in our lifestyle, more
will be the threat of it being misused. There is an urgent need to make IoT devices secure
from getting cracked. Very soon IoT is going to expand the area for the cyber-attacks on
homes and businesses by transforming objects that were used to be offline into online
systems. Existing security technologies are just not enough to deal with this problem.
Block chain has emerged as the possible solution for creating more secure IoT systems in
the time to come. In this paper, first an overview of the blockchain technology and its
implementation has been explained; then we have discussed the infrastructure of IoT
which is based on Block chain network and at last a model has been provided for the
security of internet of things using blockchain. Index Terms—Internet of things, Block
chain, Security, Devices, Network.
Keywords: We would like to encourage you to list your keywords in this section
1. Introduction
Block chain technology is now getting too much of attention from software scientists
since it has been cre- ated. Fig 1 shows the basic pillars of blockchain technology in
internet world. Actually, it has the ability to revolutionize and optimize the global
infrastructure of the technologies connected with each other through internet. It has
mainly two fields that are going to be influenced by it which are:
time [6]. The purpose of this research paper is to provide guidance for the use of block
chain technology, through cases to make a more secure and trustable IoT model.
C. Implementing a Blockchain
Block chain can be mainly deployed in 3 domains [1].
Public: Un-permissioned area, each and every node can send or read
transaction and can take part in the consensus process without the requiring
any permission. Bitcoin and Ethereum come under this category.
Consortium area: It comes under partial permission, only defined nodes can
take part in the consensus process. The permission to read or send may be
made public or may be provided only to few authorized nodes.
Private: It is the permission area, only the organization to whom the network
of blockchain belongs can write transaction to it. Reading of transaction may
be public or restricted to few nodes depending upon the requirement. This
type of system is generally deployed in industries.
A. Secure communication
In some cases, IoT devices have to communicate for the purpose exchanging data
required to process a trans- action and to store it in a ledger. These ledgers can also be
used to store encryption keys to make the exchanges more confidential. IoT de- vice sends
an encrypted message using the public key of the destination device, which is then stored
in the block- chain network. The sender then asks its node to get public key of the
receiver from the ledger. Then the sender encrypts the message using public key of the
receiver, in this way, only the receiver will be able to decrypt the sent message using their
private key [13].
B. Authentication of users:
The sender digitally signs the message before sending them to other devices. The
receiving device then gets the public key from the ledger and uses it to verify the digital
signature of the received message. We have describe the digital signature work at below:
First, the sender calculates hash of a message that is then encrypted with its
private key.
The digital signature along with the message is transmitted.
The receiver then decrypts the digital signature using the public key of sender
stored in the ledger to obtain the hash value as calculated by the sender.
The message is valid only if the calculated hash and the protected hash of the
message are same.
The trust on retrieved messages is improved if the digital signature of each
message is stored into the ledger.
regularly and reboot each and every IoT device in the network with latest and trusted
configurations.
Fig.7. shows a series of IOT devices interconnected with each other on a network.
Securing them with a blockchain network makes the system decentralized, in which there
is no single authority which can approve any transaction. Each and every device will have
a copy of the ever growing chain of data. This means that whenever someone wishes to
access the device and do some transaction, then all the members of the network must
validate it. After the validation is done, the performed transaction is stored in a block and
is sent to all the nodes of the network. All this make the system more secure and
impossible for the un-authorized sources to breach into the security.
VI. CONCLUSION
In this article, we have provide guidance for the use of blockchain technology,
through cases to make a more secure and trustable IoT model. Because of the high-end
hardware requirements for the internet of things, we concluded that internet of things is
not going to be a full member of a blockchain network. But internet of things is definitely
going to be benefited from the functionalities introduced by the blockchain technology
through the APIs offered by the nodes of the network or by any specialized
intermediaries. Through these functionalities internet of things could be made highly
secure. We have discussed the new and emerging blockchain technology cybersecurity
point. Block chain technology, mostly using and concentrating the finance area research
work, as we know Bitcoin is a cryptocurrency which is based on blockchain technology.
But in our article we try to introduce blockchain technology for internet of things to make
secure data transmission between the internet connected devices. For this we have provide
oview of blockchain technology, security issues on IoT environment and also discuss and
propose blockchain is as a solution of IoT Security.
References
[1] Singh, Dhananjay, Gaurav Tripathi, and Antonio J. Jara. "A survey of Internet-of-Things:
Future vision, architecture, challenges and services." Internet of Things (WF-IoT), 2014 IEEE
World Forum.
[2] Atzori, and Morabito, ―The internet of things: A survey‖, Computer Networks, 54(15), 2787–
2805, 2010.
[3] Humayed, Abdulmalik, "Cyber-Physical Systems Security—A Survey." arXiv preprint
arXiv:1701.04525 (2017).
[4] Meinel, Holger, and Wolfgang Bösch, "Radar Sensors in Cars." Automated Driving. Springer
International Publishing, 2017. 245-261.
[5] Uden, Lorna, and Wu He, "How the Internet of Things can help knowledge management: a
case study from the automotive domain," Journal of Knowledge Management 21.1 (2017).
[6] Sot iriadis, Stelios, Kostantinos St ravoskoufos, and Euripides GM Pet rakis, "Future Internet
Systems Design and Implementation: Cloud and IoT Services Based on IoT-A and
FIWARE." Designing, Developing, and Facilitating Smart Cities, Springer International
Publishing, 2017. 193-207.
[7] http://www.informationsecuritybuzz.com/expertcomments/symantec-report-hijacked-iot-
devices-ddos/
[8] On Public and Private Blockchains, ―https://blog.ethereum.org/2015/08/07/on-public-and-
privateblockchains/,‖2017
[9] IOTA http://iotatoken.com/
[10] Machine-to-Machine, https://en.wikipedia.org/wiki/Machine_to_machine
[11] Madhusudan Singh, ―Perspective, Challenges, and Future of Automotive Security Enriched
with Blockchain Technology‖, IEEE Transportation Electrification Community
WebinarAbstract,06 Dec, 2017.
https://register.gotowebinar.com/register/615741393405074560 2
[12] Understanding Autonomous Organizations on the Blockchain
https://www.linkedin.com/pulse/understanding-autonomousorganizations-blockchain-paul-
kohlhaas
[13] C. Decker and R. Wattenhofer, ―A fast and scalable payment network with bitcoin duplex
micropayment channels,‖ In Stabilization, Safety, and Security of Distributed Systems pages
3–18. Springer, 2015
[14] Das, Manik Lal, "Privacy and Security Challenges in Internet of Things," Distributed
Computing andInternet Technology. , pp. 33-48, 2015.
[15] Joseph Bonneau, ―Research Perspectives and Challenges for Bitcoin and Cryptocurrencies,‖
IEEE SECURITY AND PRIVACY (forthcoming May 2015),
http://www.jbonneau.com/doc/BMCNKF15-IEEESP bitcoin.pdf.