Blockchain Security Using Merkle Hash Zero Correlation Distinguisher For The IoT in Smart Cities
Blockchain Security Using Merkle Hash Zero Correlation Distinguisher For The IoT in Smart Cities
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
2327-4662©2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
execution of the chain reaction. First, a Revocable Chameleon data in IoT. Blockchain is one of the promising technologies to
Hash (RCH) was designed to identify the collision without any address IoT issues. Several existing Blockchain-based methods
cooperation. Periodical expiration was also conducted to were developed to enhance security. But, the conventional
prevent any abuse of redaction power. But, the computational Blockchain-based systems for IoT fail to preserve the intelligent
complexity was not reduced by using a consensus mechanism. execution of the chain reaction. However, the computational
In order to overcome the issue. In this work, a Merkle Hash Tree complexity and running time were not minimized. The packet
is introduced in the proposed BSMH-ZCD model. Transactions delivery ratio was not minimized in traditional methods. It failed
in the blockchain via hashes are transmitted publicly in the to obtain information security. To solve the above-mentioned
blockchain network and include supplementary information existing problem, the novel BSMH-ZCD model with the new
about the sender and recipient. The proposed model also uses features of Merkle Hash Zero Correlation Distinguisher (MH-
data encryption via Correlation Distinguisher and Add Rotate ZCD) is introduced in this work. Contrary to existing work, the
XOR block ciphers. Here, double encryption is said to be BSMH-ZCD model aims to achieve higher security, and
ensured by applying the ARX block ciphers and then encrypting minimize the run time and computational overhead.
the symmetric key using the Zero Correlation Distinguisher. Specifically, Merkle Hash Tree (MHT) is applied to minimize
Security can then be attained with minimal computational the running time, while the Zero Correlation Distinguisher
complexity for IoT devices involving big data by utilizing both (ZCD) is used to obtain a higher security level.
techniques.
With the rapid advancement of this digital age, a smart city Research Contribution:
requires effective and sustainable solutions in different sectors. The proposed model research contributions are summarized as
Previous work describes the role played by big data, IoT, and follows:
the necessity of requiring smart city construction utilizing • The main contribution of the proposed BSMH-ZCD model
blockchain technology [3]. The corresponding features were is developed for improving security with lesser run time
analyzed, and final solutions were provided by introducing the and computational overhead.
security aspects, equipment enhancements, and so on. The • The novelty of Merkle Hash Tree (MHT) is applied in the
recent advancements in wireless communications have resulted blockchain framework to permit the hash of the block to
in a wide variety of devices being connected to the Internet, identify the chains of before generated blocks. Then, the
forming the IoT. Routing that establishes a communication path traversal of the entire tree is avoided with aid of hashing
between the IoT source and a destination device is one of the with minimum running time.
major problems currently faced. A Blockchain-based • The Merkle Hash Tree (MHT) and Zero Correlation
Contractual Routing Protocol for a network involving large Distinguisher (ZCD) are utilized in the proposed BSMH-
numbers of un-trusted IoT devices was designed in [4]. ZCD model with lesser computational overhead. Initially,
However, the packet delivery ratio was found to be MHT is applied to create the hash value for each
comparatively less with existing techniques. Considering the transaction. Then, ZVD is used to perform the data
packet delivery ratio, the development of blockchain encryption and decryption operation for the blockchain
technologies requires newer tools for private data management, based on the hash value with minimum computational
therefore ensuring an increased level of security and privacy to complexity.
individual users [5]. To combat such pollution, smart cities have • The innovation of ZCD is employed the proposed BSMH-
become relatively popular over the past few years. The word ZCD model to obtain a higher security level in smart cities.
“smart” is associated with advantages on certain levels of It is designed with two portions of hash values such as left
innovative applications to ensure smooth communal sharing [6] half and right half. It includes the addition, rotation, and
with respect to three dimensions, i.e. humans, technology, and XOR operations for block data encryption/decryption in
organizations. IoT devices to efficiently minimize the attack complexity
Analysis of the resource requirements for DIDs on IoT devices and enhance security in smart cities.
shows that implementing a blockchain on the IoT is rather The rest of this work is organized as follows. Section 2 presents
complex due to resource constraints [7]. To address this issue, a related works in terms of the novel findings and shortcomings
local peer network was used to restrict the frequency of related to this study. Section 3 introduces the problem
transactions entering the global blockchain, utilizing a scalable statement. Section 4 explains the flow diagram along with the
local ledger [8]. Furthermore, the peer validations at both the algorithm for the proposed Merkle Hash Zero Correlation
local and global levels were found to not be compromised. New Distinguisher (MH-ZCD) method for ARX block ciphers.
IoT-based blockchain technology gives up the memory Section 5 includes a comprehensive evaluation of the proposed
constraint and provides a centralized system, in addition to the method’s performance, along with the dataset descriptions.
provisioning of both security and privacy aspects [9]. A survey Section 6 presents the mathematical evaluations and a
of the blockchain-based mechanisms used to provide security comparison of our model to state-of-the-art works. Section 7
for the Internet of Things indicates that the data can be concludes the paper.
safeguarded from data tampering [10]. However, a large amount
of energy is consumed in verifying each block, preventing its II. RELATED WORKS
usage with resource-constrained IoT applications. Another secured mechanism using a blockchain-based
mechanism was presented in [11], whereby validation via edge
Motivation: service providers was achieved by provider identification and
The talented IoT technology is a significant part to ensure the service verification to remove un-trusted services. Smart
security of information exchange. Tiny sensor devices are contracts were also used to validate the service providers and
integrated with IoT for sensing, processing the information from service codes with minimum computational overhead on IoT
the dissimilar environmental conditions. Security is a devices. Finally, even throughput was achieved by utilizing a
challenging issue for authorized users able to access reliable
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
consortium blockchain and proof of authority. As one solution, for searching encryption to attest and monitor nodes [33]. The
Blockchain Structures (BSs) were designed to provide resource estimation was designed by a rule-based scaling
credibility verification [12]. BSswere is used for ensuring system in [34]. Unsupervised Deep Quadruplet Hashing with
response time, storage efficiency, and verification. However, Isometric Quantization (UDQH-IQ) was designed in [35] for
blockchains are found to be highly power-intensive, which solving the absence of local similarity of image pairs. In order
lowers throughput and limits power-constrained IoT devices. to improve the technology through IoT, crucial research studies
A blockchain system using a credit-based consensus mechanism and investigations have been done [36]. However, to achieve the
for IoT was presented in [13] to address these issues. This full potential of IoT lot of challenges and issues need to be
mechanism not only ensured system security but also provided addressed. The integration of blockchain technology with IoT
transaction efficiency concurrently. In order to overcome the was developed in [37]. However, intrinsic features of IoT result
issue, the novel blockchain model named BSMH-ZCD is in several challenges, namely decentralization, poor
developed to improve transaction efficiency. While a data interoperability, privacy, and security vulnerabilities.
authority management model was designed in [14] to safeguard Blockchain technology (BCT) is a promising solution [38] for
sensitive data confidentially, information security was providing security and protecting privacy on a large scale. A
achieved. A secure access control mechanism using the comprehensive survey of the existing blockchain protocols was
Ethereum blockchain for IoT networks was investigated in [15] introduced in [39] for the Internet of Things (IoT) networks. An
to measure temperature and intrusion detection. A more architecture for capability-based IoT access control utilizing the
thorough review of the use of blockchain with IoT is presented blockchain and decentralized identifiers is developed in [40] to
in [16]. A multi-agent simulation platform using certain manage the identity and access control for IoT devices.
management policies was designed in [17]. Performance However, the existing IoT access control solutions are mainly
patterns were analyzed via neighboring patterns to ensure based on conventional identity management schemes and use
security [18]. A taxi driver fraud detection system based on a centralized architectures. Blockchain and IoT as Blockchain of
routing mark is presented in [19]. An astringent analysis of taxi Things (BCoT) were analyzed in [41] for handling the issue of
mobility patterns with velocity values, spatiotemporal privacy, security, traceability, and reliability. Blockchain
distribution, hotspots, and trip durations proves to be of great Technology (BCT) -based applications were introduced in [42]
use for wireless researchers and government organizations [20]. for ensuring the security of the applications in IoT. Blockchain
A 3D clustering technique was utilized in [21] to obtain the technologies were investigated in [43] for IoT but, failed to
mobility patterns involved in the design of a taxi driver pattern improve the security. Deep Learning (DL) and blockchain-
system. The designed technique failed to reduce the running empowered security framework were introduced in [44] to
time. To address the issue, the BSMH-ZCD uses the Merkle enhance security and privacy. A blockchain-based decentralized
Hash Tree to minimize the running time. authentication modeling scheme called BlockAuth was
A method proposed in [22] utilizes IoT devices to obtain developed in [45] for achieving security performance. The
industrial-grade reliability for transferring information with the novel blockchain-based access control protocol named
aid of blockchain technologies. This method is a more efficient DBACP-IoTSG was introduced in [46] for evaluating the
transaction copy of the collected data from a smart home. The computational time. Blockchain-based security and privacy
method proposed in [23] utilizes a multivariate correlation systems were introduced in [48] to measure the performance of
analysis model to provide security for a smart home network. IoT. But, the running time was not considered. The
This model can analyze the traffic increase in the network and improvements of effective and efficient smart contract
identify the correlation between traffic features, therefore mechanisms were developed in [49] with higher security.
ensuring security and throughput to a greater extent. An However, it failed to balance the improved speed and security.
efficient deep CNN framework with hierarchical weighted The existing method of common issues such as failure to
fusion is introduced in [24] for surveillance videos. However, achieve higher security. However, computational complexity
the overhead was not reduced. A secure and fast image and running time, the packet delivery ratio was not decreased.
cryptosystem is presented in [25] for preserving the privacy of Many existing blockchain algorithms were developed to
patients but fails to enhance efficiency. A robust image hashing improve security. But, it failed to apply the Add Rotate XOR
with ring partition and invariant vector distance is introduced in block ciphers to enhance the security. The above state-of-the-
[26]. art works issue is addressed and motivated by, Merkle Hash
A novel trust assessment framework called STRAF was Zero Correlation Distinguisher for ARX block ciphers is
designed in [27] for estimating the trustworthiness of cloud presented in this paper. Then, the proposed model is needed for
services. A lightweight secure transport protocol denoted iTLS controlling personal information in smart city management
is introduced in [28] for end-to-end secure communication in services with higher security. The following sections provide a
IP-based IoT. Moreover, the Augmented Data Recognizing detailed description of the proposed method.
(ADR) algorithm is proposed with a wireless network [29], yet
III. PROBLEM DEFINITION
the processing time is not reduced. A new Chinese Remainder
Theorem (CRT)-based data storage mechanism was developed Many organizations lack the technical skills and expertise to
in [30] to store the user data securely in the cloud. However, the design a blockchain-based IoT system since Blockchain-as-a-
computational complexity was not reduced. To address the Service (BaaS) with IoT is still a developing area. Because
issue, the BSMH-ZCD applies the ZCD to minimize the blockchain-based IoT systems are only as secure as the system’s
computational complexity. access point, legal and compliance problems often occur in the
While an SDN-based decentralized security architecture was blockchain IoT networks. The issue of trust in blockchain-based
proposed to solve the security attack detection problems [31]. In IoT systems is difficult when no verification and audit
addition, an ARX block ciphers ZCD was designed in [32] to mechanism is utilized, particularly if they deal with sensitive
transform linear approximations into an integral distinguisher. information. In these systems, encryption of each object is
In a distributed network, a protocol is seamlessly incorporated required to prevent data leakages; thus, the issues in the
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
integration of IoT and blockchain need to be urgently addressed. citizens to reduce the overall criminal activities in the city.
Recently, much data has accumulated in blockchain-based IoT Smart contracts are effective small computer programs stored
systems, and only a limited part is valuable to obtain knowledge on a blockchain, which will perform a transaction under
and create action. Smart cities are deploying online services in specified conditions.
diverse sectors, such as transportation (intelligent road Instead of saving the IoT Novel Corona Virus patient data over
networks, connected cars, and public transport), public utilities the blockchain, a cloud storage server is used to save the traffic
(smart electricity, water, and gas distribution), education, health data. The first entity of cloud storage includes different
and social care, and public safety. Security from a hacker is the categorizes the users’ (taxi drivers and patients) data in
main concern in smart automation systems, whereby hackers indistinguishable blocks correlated with a distinctive block
can copy personal and official data if they gain access to a smart number, the cloud storage server. Figure 1 shows the sample
device. The other big concern with smart home systems is data blockchain framework.
privacy is due to the availability of consumer data by device and
platform manufacturers. This necessitates higher trust and
transparency between manufacturers and users of smart devices. 𝑏𝑙𝑜𝑐𝑘 1 𝑏𝑙𝑜𝑐𝑘 2 𝑏𝑙𝑜𝑐𝑘 𝑛
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
𝐻5678
𝐻78 >>> 𝑟1
⊞
<<< 𝑟2
𝑇𝜆||𝜆′ (𝑟) ⨁
⨁
𝐻56
𝐻 𝐻𝑟,𝐿 𝐻𝑟,𝑅
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
corresponding decryption process are said to be robust against The final entity of the proposed method comprises two types of
malicious nodes referred from [36]. datasets from taxi service drivers and Novel Corona Virus
The third entity is the smart city surveillance providers in the patients with wearable IoT devices. The IoT devices collect all
proposed method. it includes data on traffic or taxi drivers to data from the taxi driver, including trip ID, call type, origin of
perform surveillance or to offer data when malfunctioning has call, and origin stand from the drivers, and data. The proposed
been identified. Smart city surveillance providers deal with the ZCD (Zero Correlation Distinguisher) effectively transmits
analysis of fake activities once they receive an alert message information from sender to receiver with high security by using
from the network. Next, the integrated text is obtained using the the thread model and with minimum delay. The taxi drivers
pseudo-code shown below. themselves are the owners of their data and are responsible for
either granting or revoking data access from the smart city
Algorithm 2. Hash Block and Zero Correlation Sharing surveillance providers. Next, the pseudo-code representation of
Input: Transaction ‘𝑇 = 𝑇1 , 𝑇2 , … , 𝑇𝑛 ’, Block ‘𝐵 = Zero Correlation Distinguisher (ZCD) for block Data
𝐵1 , 𝐵2 , … , 𝐵𝑛 ’ Decryption is shown below.
Output: obtain integrated text
Function INTEGRATED_TEXT (𝑑𝑎𝑡𝑎𝑓𝑖𝑙𝑒 ) Algorithm 3. Zero Correlation Distinguisher (ZCD) for
1. If user choose anonymity over blockchain then Block Data Decryption
2. Generate a hash of the left and right portion Input: Encrypted file ‘𝐶’
3. Calculate ‘𝑇𝜆||𝜆′(𝑟) ’ Output: Decrypted ‘𝑑𝑎𝑡𝑎𝑓𝑖𝑙𝑒 ’
4. Mix hash of left and right portion with ZCD to form an Function DECRYPTION
integrated text 1. Let𝐺𝐶𝐷 ← 𝐷𝑒𝑐𝑟𝑦𝑝𝑡(𝐻𝑟−1,𝐿 , 𝐻𝑟−1,𝑅 )
5. End if 2. Let𝑑𝑎𝑡𝑎𝑓𝑖𝑙𝑒 ← 𝐷𝑒𝑐𝑟𝑦𝑝𝑡(𝐶, 𝑍𝐶𝐷)
6. End function 3. End function
This algorithm shows that the integration of a hash block and This algorithm shows that the main advantage of the ZCD for
zero-correlation sharing is used to form integrated text. If the blockchain technology is that it tracks billions of connected
user selects anonymity over the blockchain, then a hash of the devices and enables effective transaction processing and
left and right portions is either generated or does nothing. The coordination between devices. It has the additional advantage of
zero-correlation sharing is calculated upon the successful performing a distributed transaction ledger for several IoT
generation of a hash of the left and right portions. Finally, it is transactions at a time and is said to be computationally efficient.
integrated with the hashes of the left and right portions. This is why the distributed transaction ledger, being tamper-
The fourth entity is smart contracts in the proposed framework. proof, is said not to be manipulated by malicious users because
Smart contracts include generating agreements for any IoT it does not reside in a single location. This decentralized
devices, these are performed when given conditions are met. For approach, besides eradicating the single point of failure, makes
example, consider setting the conditions for a unique trip to the consumer or user data more private with the aid of
follow a certain route. Once an IoT device does not follow the cryptographic algorithms used by blockchains. Thus, IoT
indicated route, the smart contract will send an alert message to solutions ensure secure messaging between devices in an IoT
the authorized person or smart city surveillance provider. It will network by the BSMH-ZCD. Figure 6 demonstrates the flow
also store the abnormal route in the cloud so that the providers diagram of the proposed framework.
can also receive the taxi driver’s normal/abnormal route or a
patient’s normal/abnormal data if required for later use. Here,
Input Dataset
the actual decryption is performed. Figure 5 shows the flow
diagram of a Zero Correlation Distinguisher (ZCD) for data
decryption.
Initialize number of transaction and
block
Sender‘𝑆’ Receiver‘𝑅’
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
Figure 6 shows the flow chart of the proposed framework for TABLE 2 EXPERIMENTAL SETUP
obtaining secure data access in IoT devices. Parameter Value
Number of Executions [2] 15,30,45,60,75,90, 105,120, 135,150
VI.EXPERIMENTSETUP Number of blocks [2] 9, 18, 27, 36, 45, 54, 63, 72, 81, 90
Number of taxi drivers [47] 442
In this work, taxi service trajectory data extracted from [47]
were used to conduct a fair performance analysis between the Number of IoT devices [47] 442
proposed BSMH-ZCD for IoT in smart cities and existing Number of Patient data[47] 100,200,300,400,500,600,700,800,900,1
000
methods, namely the TrustChain approach [1], SRB [2], and
DBACP-IoTSG [46]. The performance analysis was conducted
using the CloudSim simulator in the JAVA platform. The proposed BSMH-ZCD method takes a different number of
The purpose of the taxi service trajectory dataset is to increase executions (15 to 150) and blocks (9 to 90) from the dataset to
security, which consists of both the training and test data. It conduct the experimental evaluation. The experimental
includes an accurate dataset describing the complete year (from evaluation of the BSMH-ZCD method was compared against
01/07/2013 to 30/06/2014) of the (busy) trajectories performed three conventional works, namely the Trust Chain approach [1],
by 442 taxis running in Porto, Portugal. These taxis are said to SRB [2], and DBACP-IoTSG [46].
be operated with a taxi dispatch central device, using mobile VII.DISCUSSION
data terminals installed in the vehicles. The sizes of the training
and test data were 11296 and 437 KB, respectively. Comparative experiments were conducted to measure the
Each ride was classified into three classes: 1) taxi central based, performance of the proposed system using the introduced
2) stand-based, and 3) non-taxi central based. The first-class Blockchain Secured Merkle Hash Zero Correlation
provide an anonymized ID or information sets made available Distinguisher (BSMH-ZCD) for IoT in smart cities against three
from a telephone call. The second and third classes refer to existing methods, the TrustChain approach [1], SRB [2],
services that were demanded directly from the taxi drivers. Nine DBACP-IoTSG [46]. A performance analysis was conducted
features are included in each data sample that, in turn, for the following three metrics, Running time, Computational
correspond to one completed trip, as shown in Table 1. overhead, and Security
The experimental evaluation of BSMH-ZCD was conducted A. Performance analysis of running time
using a Novel Corona Virus 2019 Dataset reportedbyKaggle The time consumed to execute the overall process was taken as
[48]. The dataset includes eight files containing daily level data the first metric in the analysis of blockchain security for big data
on the number of affected cases, recovery, and deaths from generated by IoT applications in smart cities. In other words, the
Covid-19. It considers time-series records and the number of running time refers to the time consumed to generate the
cases on a given day as a collective number. We considered the security mechanism, which is mathematically formulated as:
COVID_open_line_list for the experiments. The dataset is 𝑅𝑇 = ∑𝑛𝑖=1 𝐸𝑥𝑒𝑖 ∗ 𝑇𝑖𝑚𝑒[𝐻𝑟,𝐿 + 𝐻𝑟,𝑅 ] (6)
comprised of 44 features, including ID, age, sex, city, country, where the running time ‘𝑅𝑇’ is recorded according to the
province, etc., and 13174 instances. number of executions ‘𝐸𝑥𝑒𝑖 ’ considered for conducting the
experiment and the time consumed for ensuring security. The
TABLE 1 TAXI SERVICE TRAJECTORY DATASET DATA SAMPLE time consumed is the summation of the hash generated for the
S.
Attributes Data type Description left ‘𝐻𝑟,𝐿 ’ and right half portions ‘𝐻𝑟,𝑅 ’, respectively. It is
No
1 Contains a unique identifier
measured in terms of milliseconds (ms).
TRIP_ID String
for each trip BSMH-ZCD [Proposed] Trust Chain approach [1]
2 Identifies the way used to
demand this service. 2.5 SRB [2] DBACP-IoTSG [46]
‘A’ – trip was dispatched from
central
CALL_TYPE Character 2
‘B’ – trip was demanded
Running time (ms)
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
30
25
20 BSMH-ZCD [Proposed] Trust Chain approach [1]
15
350 SRB [2] DBACP-IoTSG [46]
10
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
utilizing their resulting hash. After obtaining the hash for each
BSMH-ZCD [Proposed] Trust Chain approach [1]
data through the Merkle Hash Tree, the Zero Correlation 90
Distinguisher performs the data encryption and decryption SRB [2] DBACP-IoTSG [46]
80
operation for the blockchain based on the hash value. Thus, with
80
Corona Virus 2019 Dataset, respectively.
VIII CONCLUSION
60
This work introduces the Blockchain Secured Merkle Hash Zero
40 Correlation Distinguisher (BSMH-ZCD) model as a solution to
security threats while considering the computational limitations
20
of IoT. The proposed model was designed with the innovation
0 of Merkle Hash Tree and Zero Correlation Distinguisher. For
9 18 27 36 45 54 63 72 81 90 each transaction, the Merkle Hash Tree produces a hash value,
Number of blocks then the Zero Correlation Distinguisher performs the data
encryption and decryption operation with the left and right
Fig.11 Security analyses via packet delivery ratio portions of the hash value. It is deal with personal information
in smart city management services with minimum run time. The
Figure 11 shows the performance graphical analysis of security, ARX block cipher or the addition, rotation, and XOR operations
and Figure 12 displays the packet delivery ratio with different are performed to achieve efficient secure data access in the IoT
numbers of patient data for the Novel Corona Virus 2019 devices via encryption and decryption. Therefore, the attack
Dataset. The higher the packet delivery ratio, the higher the complexity is minimized in smart cities. The BSMH-ZCD
security is vice versa. According to the mathematical model provides better performance of improved security and
calculations and graphical representation, the packet delivery reduced the running time and computational overhead.
ratio was found to be higher by applying BSMH-ZCD when However, because the privacy preservation rate is not
compared to [1] and [2]. Let us consider 9 data blocks in the considered in the discussion section, our future works will
first iteration. By applying the BSMH-ZCD model 8 of blocks examine blockchain-based decentralized trust management and
are being sent to the cloud server then the packet delivery ratio secure the usage control scheme of IoT big data to solve the trust
is 88.88%. The 77.77%, 66.66% and 55.55% are achieved by and security issues of IoT big data management. The designed
using existing [1], [2] and [46]. Likewise, ten runs are method comprises data gathering, invoking, transfer, storage,
performed and the results are observed for each method. The and usage processed over the blockchain smart contract. A huge
performance of the proposed BSMH-ZCD model is compared amount of data is used and the performance of BlockBDM
to other existing methods. scheme is providing feasible, secure and scalable for
decentralized trust management of IoT big data. It is used to
improve the storage trust.
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2022.3171237, IEEE
Internet of Things Journal
IEEEINTERNETOFTHINGS,VOL.XX,NO.XX,MM2020
[37] H. -N. Dai, Z. Zheng and Y. Zhang, "Blockchain for Internet of Things: A
Survey," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8076-8094,
Oct. 2019,
[38] W. Viriyasitavat, L. D. Xu, Z. Bi and D. Hoonsopon, "Blockchain
Technology for Applications in Internet of Things—Mapping From System
Design Perspective," in IEEE Internet of Things Journal, vol. 6, no. 5, pp.
8155-8168, Oct. 2019
[39] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras and H.
Janicke, "Blockchain Technologies for the Internet of Things: Research
Issues and Challenges," in IEEE Internet of Things Journal, vol. 6, no. 2,
pp. 2188-2204, April 2019
[40] Yue Liu, Qinghua Lu, Shiping Chen, Qiang Qu, Hugo O’Connor, Kim-
Kwang Raymond Choo, He Zhang, Capability-based IoT access control
using blockchain, Digital Communications and Networks,2020, ISSN
2352-8648
[41] Hong-Ning Dai, Zibin Zheng, Yan Zhang, “Blockchain for Internet of
Things: A survey”, IEEE Internet of Things Journal, v. 6, no.5, pp-8076 –
8094, 2019
[42] Wattana Viriyasitavat, Li Da Xu; Zhuming Bi, Danupol Hoonsopon,
“Blockchain Technology for Applications in Internet of Things—Mapping
From System Design Perspective”, IEEE Internet of Things Journal,v.6,
no. 5, pp- 8155 – 8168, 2019
[43] Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee,
Abdelouahid Derhab, Leandros Maglaras, Helge Janicke, “Blockchain
technologies for the internet of things: Research issues and challenges”,
IEEE Internet of Things Journal, v.6, no.2, pp- 2188 – 2204, 2019
[44] Shailendra Rathore, Jong Hyuk Park, Hangbae Chang, “Deep Learning and
Blockchain-Empowered Security Framework for Intelligent 5G-Enabled
IoT”, IEEE Access, v.9, pp- 90075 – 90083,2021.
[45] Ma Zhaofeng, Meng Jialin, Wang Jihui, Shan Zhiguang, “Blockchain-
Based Decentralized Authentication Modeling Scheme in Edge and IoT
Environment”, IEEE Internet of Things Journal, v. 8, no. 4, pp- 2116 –
2123, 2021
[46] Basudeb Bera, Sourav Saha, Ashok Kumar Das, Athanasios V. Vasilakos,
“Designing Blockchain-Based Access Control Protocol in IoT-Enabled
Smart-Grid System”, IEEE Internet of Things Journal, v. 8, no.7, pp- 5744
– 5761, 2021.
[47] Luis Moreira-Matias "Taxi Service Trajectory Dataset" URL:
http://www.geolink.pt/ecmlpkdd2015challenge/dataset.html (Last
accessed on 02 Feb 2020)
[48] Kaggle.com. 2020. Novel Corona Virus 2019 Dataset. [online] Available
at: <https://www.kaggle.com/sudalairajkumar/novel-corona-virus-2019-
dataset> [Accessed 20 September 2020].
[49] Mohamed Amine Ferrag, Lei Shu, “The Performance Evaluation of
Blockchain-based Security and Privacy Systems for the Internet of Things:
A Tutorial”, IEEE Internet of Things Journal, 2021, pp-1-25.
[50] Security Challenges and Opportunities for Smart Contracts in Internet of
Things: A Survey”, IEEE Internet of Things Journal, v. 8, no. 15, 2021, pp-
12004 – 12020.
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Technische Universitaet Muenchen. Downloaded on May 28,2022 at 14:12:23 UTC from IEEE Xplore. Restrictions apply.