Revolutionary Applications of Blockchain Enabled Privacy and Access Control 1st Edition Surjit Singh 2024 Scribd Download

Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

Download the full version of the ebook at ebookname.

com

Revolutionary Applications of Blockchain Enabled


Privacy and Access Control 1st Edition Surjit
Singh

https://ebookname.com/product/revolutionary-applications-of-
blockchain-enabled-privacy-and-access-control-1st-edition-
surjit-singh/

OR CLICK BUTTON

DOWNLOAD EBOOK

Download more ebook instantly today at https://ebookname.com


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Take control of your online privacy Second Edition Kissell

https://ebookname.com/product/take-control-of-your-online-privacy-
second-edition-kissell/

ebookname.com

Blockchain Applications in Healthcare Innovations and


Practices Volume 1 1st Edition Tanupriya Choudhury

https://ebookname.com/product/blockchain-applications-in-healthcare-
innovations-and-practices-volume-1-1st-edition-tanupriya-choudhury/

ebookname.com

Role Based Access Control Second Edition David F.


Ferraiolo

https://ebookname.com/product/role-based-access-control-second-
edition-david-f-ferraiolo/

ebookname.com

Media Literacy Keys to Interpreting Media Messages 4th


Edition Art Silverblatt

https://ebookname.com/product/media-literacy-keys-to-interpreting-
media-messages-4th-edition-art-silverblatt/

ebookname.com
Empire of Ancient Greece Jean Kinney Williams

https://ebookname.com/product/empire-of-ancient-greece-jean-kinney-
williams/

ebookname.com

Holistic Nursing A Handbook for Practice 4th Edition


Barbara Montgomery Dossey

https://ebookname.com/product/holistic-nursing-a-handbook-for-
practice-4th-edition-barbara-montgomery-dossey/

ebookname.com

Essential reproduction 7th Edition M H Johnson

https://ebookname.com/product/essential-reproduction-7th-edition-m-h-
johnson/

ebookname.com

Handbook of Energy Audits Sixth Edition Albert Thumann

https://ebookname.com/product/handbook-of-energy-audits-sixth-edition-
albert-thumann/

ebookname.com

Radar Systems Analysis and Design Using MATLAB 3ed.


Edition Bassem R. Mahafza

https://ebookname.com/product/radar-systems-analysis-and-design-using-
matlab-3ed-edition-bassem-r-mahafza/

ebookname.com
Don t Waste Your Life Study Guide John Piper

https://ebookname.com/product/don-t-waste-your-life-study-guide-john-
piper/

ebookname.com
Revolutionary
Applications of
Blockchain-Enabled
Privacy and Access
Control

Surjit Singh
Thapar Institute of Engineering and Technology, India

Anca Delia Jurcut


University College Dublin, Ireland

A volume in the Advances in


Information Security, Privacy, and
Ethics (AISPE) Book Series
Published in the United States of America by
IGI Global
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA, USA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: [email protected]
Web site: http://www.igi-global.com

Copyright © 2021 by IGI Global. All rights reserved. No part of this publication may be
reproduced, stored or distributed in any form or by any means, electronic or mechanical, including
photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the
names of the products or companies does not indicate a claim of ownership by IGI Global of the
trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

Names: Singh, Surjit, 1981- editor. | Jurcut, Anca, 1984- editor.


Title: Revolutionary applications of blockchain-enabled privacy and access
control / Surjit Singh, and Anca Jurcut, editors.
Description: Hershey, PA : Information Science Reference, an imprint of IGI
Global, [2021] | Includes bibliographical references and index. |
Summary: “This book provides the latest research findings, solutions and
relevant theoretical frameworks in the area of blockchain technologies,
information security, and privacy in computing and communication for
professionals who want to improve their understanding of the recent
challenges, design, and issues in these areas”-- Provided by publisher.
Identifiers: LCCN 2020047973 (print) | LCCN 2020047974 (ebook) | ISBN
9781799875895 (hardcover) | ISBN 9781799886730 (softcover) | ISBN
9781799875901 (ebook)
Subjects: LCSH: Blockchains (Databases)--Security measures.
Classification: LCC QA76.9.B56 R48 2021 (print) | LCC QA76.9.B56 (ebook)
| DDC 005.74--dc23
LC record available at https://lccn.loc.gov/2020047973
LC ebook record available at https://lccn.loc.gov/2020047974

This book is published in the IGI Global book series Advances in Information Security, Privacy,
and Ethics (AISPE) (ISSN: 1948-9730; eISSN: 1948-9749)

British Cataloguing in Publication Data


A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book is new, previously-unpublished material.


The views expressed in this book are those of the authors, but not necessarily of the publisher.

For electronic access to this publication, please contact: [email protected].


Advances in Information
Security, Privacy, and Ethics
(AISPE) Book Series
ISSN:1948-9730
EISSN:1948-9749

Editor-in-Chief: Manish Gupta State University of New York, USA


Mission
As digital technologies become more pervasive in everyday life and the Internet is
utilized in ever increasing ways by both private and public entities, concern over
digital threats becomes more prevalent.
The Advances in Information Security, Privacy, & Ethics (AISPE) Book
Series provides cutting-edge research on the protection and misuse of information
and technology across various industries and settings. Comprised of scholarly
research on topics such as identity management, cryptography, system security,
authentication, and data protection, this book series is ideal for reference by IT
professionals, academicians, and upper-level students.

Coverage
• Technoethics IGI Global is currently accepting
• Telecommunications Regulations manuscripts for publication within this
• Risk Management series. To submit a proposal for a volume in
• Information Security Standards this series, please contact our Acquisition
• Cookies Editors at [email protected] or
• Security Classifications visit: http://www.igi-global.com/publish/.
• Network Security Services
• Electronic Mail Security
• Computer ethics
• Security Information Management

The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is published by IGI
Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titles
available for purchase individually; each title is edited to be contextually exclusive from any other title within the series.
For pricing and ordering information please visit http://www.igi-global.com/book-series/advances-information-security-
privacy-ethics/37157. Postmaster: Send all address changes to above address. Copyright © 2021 IGI Global. All rights,
including translation in other languages reserved by the publisher. No part of this series may be reproduced or used in any
form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or information and
retrieval systems – without written permission from the publisher, except for non commercial, educational use, including
classroom teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global.
Titles in this Series
For a list of additional titles in this series, please visit:
http://www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157

Handbook of Research on Digital Transformation and Challenges to Data Security and


Privacy
Pedro Fernandes Anunciação (Polytechnic Institute of Setúbal, Portugal) Cláudio Roberto
Magalhães Pessoa (Escola de Engenharia de Minas Gerais, Brazil) and George Leal Jamil
(Informações em Rede Consultoria e Treinamento, Brazil)
Information Science Reference • © 2021 • 529pp • H/C (ISBN: 9781799842019) • US
$285.00

Limitations and Future Applications of Quantum Cryptography


Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India) Alka Agrawal
(Babasaheb Bhimrao Ambedkar University, Lucknow, India) Brijesh K. Chaurasia (Indian
Institute of Information Technology, India) and Raees Ahmad Khan (Indian Institute of
Information Technology, India)
Information Science Reference • © 2021 • 305pp • H/C (ISBN: 9781799866770) • US
$225.00

Advancements in Security and Privacy Initiatives for Multimedia Images


Ashwani Kumar (Vardhaman College of Engineering, India) and Seelam Sai Satyanarayana
Reddy (Vardhaman College of Engineering, India)
Information Science Reference • © 2021 • 278pp • H/C (ISBN: 9781799827955) • US
$215.00

Blockchain Applications in IoT Security


Harshita Patel (Vellore Institute of Technology, India) and Ghanshyam Singh Thakur
(Maulana Azad National Institute of Technology, India)
Information Science Reference • © 2021 • 275pp • H/C (ISBN: 9781799824145) • US
$215.00

For an entire list of titles in this series, please visit:


http://www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157

701 East Chocolate Avenue, Hershey, PA 17033, USA


Tel: 717-533-8845 x100 • Fax: 717-533-8661
E-Mail: [email protected] • www.igi-global.com
Editorial Advisory Board
Hamed Ahmadi, University of York, UK
Malika Bendechache, Dublin City University, Ireland
Morshed Chowdhury, Deakin University, Australia
Luca Davoli, University of Parma, Italy
Robert Gyorodi, University of Oradea, Romania
Nhien An Le Khac, University College Dublin, Ireland
P. Sateesh Kumar, Indian Institute of Technology, Roorkee, India
Tanesh Kumar, University of Oulu, Finland
Sergii Kushch, University of Limerick, Ireland
Fei Liu, La Trobe University, Australia
Damien Manuel, Deakin University, Australia
Katina Michael, Arizona State University, USA & University of Wollongong, Australia
Avishek Nag, University College Dublin, Ireland
Mehmet Orgun, Macquarie University, Australia
Sushmita Ruj, Indian Statistical Institute, Kolkata, India
Sandeep Shukla, Indian Institute of Technology, Kanpur, India
Hitesh Tewari, Trinity College Dublin, Ireland
Table of Contents

Preface.................................................................................................................. xv

Acknowledgment............................................................................................... xxii

Chapter 1
Blockchain Advances and Security Practices in WSN, CRN, SDN,
Opportunistic Mobile Networks, Delay Tolerant Networks ..................................1
Eranda Harshanath Jayatunga, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Pasika Sashmal Ranaweera, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Indika Anuradha Mendis Balapuwaduge, Faculty of Engineering,
University of Ruhuna, Sri Lanka

Chapter 2
Towards Utilizing Blockchain for Countering Distributed Denial-of-Service
(DDoS) .................................................................................................................35
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India
Virender Ranga, National Institute of Technology, Kurukshetra, India
Nikhil Tripathi, Technical University of Darmstadt, Germany
Abhijith Kalayil Shaji, Otto von Guericke University Magdeburg,
Germany
Avani Sharma, Malaviya National Institute of Technology, Jaipur, India

Chapter 3
BLOFF: A Blockchain-Based Forensic Model in IoT .........................................59
Promise Agbedanu, University College Dublin, Ireland
Anca Delia Jurcut, University College Dublin, Ireland


Chapter 4
Forensic Investigation-Based Framework for SDN Using Blockchain ................74
Sonam Bhardwaj, National Institute of Technology, Kurukshetra, India
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India

Chapter 5
The Mobility Open Blockchain Initiative: Identity, Members, Technologies,
and Future Trends ................................................................................................99
Loreen M. Powell, Bloomsburg University of Pennsylvania, USA
Jessica Schwartz, University of the Cumberlands, USA
Michalina Hendon, University of the Cumberlands, USA

Chapter 6
Revolutionizing the Stock Market With Blockchain ..........................................119
Namrata Dhanda, Amity University, Noida, India
Anushka Garg, Amity University, Noida, India

Chapter 7
Blockchain-Based Food Supply Chain Management.........................................134
Dhana Srinithi Srinivasan, PSG College of Technology, India
Karpagam Manavalan, PSG College of Technology, India
Soundarya R., PSG College of Technology, India
Thamizhi S. I., PSG College of Technology, India

Chapter 8
Blockchain and PUF-Based Secure Transaction Procedure for Bitcoin ............172
Sivasankari Narasimhan, Mepco Schlenk Engineering College, India

Chapter 9
Blockchain Revolution: Adaptability in Business World and Challenges in
Implementation ..................................................................................................189
Archana Sharma, Institute of Management Studies, Noida, India
Purnima Gupta, Institute of Management Studies, Noida, India

Chapter 10
A Reliable Hybrid Blockchain-Based Authentication System for IoT Network 219
Ambika N., Department of Computer Applications, Sivananda Sarma
Memorial RV College, Bangalore, India


Chapter 11
The Detection of SQL Injection on Blockchain-Based Database ......................234
Keshav Sinha, Birla Institute of Technology, India
Madhav Verma, B.I.T Sindri, Dhanbad, India

Compilation of References ..............................................................................263

About the Contributors ...................................................................................289

Index ..................................................................................................................295
Detailed Table of Contents

Preface.................................................................................................................. xv

Acknowledgment............................................................................................... xxii

Chapter 1
Blockchain Advances and Security Practices in WSN, CRN, SDN,
Opportunistic Mobile Networks, Delay Tolerant Networks ..................................1
Eranda Harshanath Jayatunga, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Pasika Sashmal Ranaweera, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Indika Anuradha Mendis Balapuwaduge, Faculty of Engineering,
University of Ruhuna, Sri Lanka

The internet of things (IoT) is paving a path for connecting a plethora of smart
devices together that emerges from the novel 5G-based applications. This evident
heterogeneity invites the integration of diverse technologies such as wireless sensor
networks (WSNs), software-defined networks (SDNs), cognitive radio networks
(CRNs), delay tolerant networks (DTNs), and opportunistic networks (oppnets).
However, the security and privacy are prominent conundrums due to featured
compatibility and interoperability aspects of evolving directives. Blockchain is the
most nascent paradigm instituted to resolve the issues of security and privacy while
retaining performance standards. In this chapter, advances of blockchain technology
in aforesaid networks are investigated and presented as means to be followed as
security practices for pragmatically realizing the concepts.


Chapter 2
Towards Utilizing Blockchain for Countering Distributed Denial-of-Service
(DDoS) .................................................................................................................35
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India
Virender Ranga, National Institute of Technology, Kurukshetra, India
Nikhil Tripathi, Technical University of Darmstadt, Germany
Abhijith Kalayil Shaji, Otto von Guericke University Magdeburg,
Germany
Avani Sharma, Malaviya National Institute of Technology, Jaipur, India

Distributed denial of service (DDoS) attacks have been a matter of serious concern
for network administrators in the last two decades. These attacks target the resources
such as memory, CPU cycles, and network bandwidth in order to make them
unavailable for the benign users, thereby violating availability, one of the components
of cyber security. With the existence of DDoS-as-a-service on internet, DDoS
attacks have now become more lucrative for the adversaries to target a potential
victim. In this work, the authors focus on countering DDoS attacks using one of
the latest technologies called blockchain. In inception phase, utilizing blockchain
for countering DDoS attacks has proved to be quite promising. The authors also
compare existing blockchain-based defense mechanisms to counter DDoS attacks
and analyze them. Towards the end of the work, they also discuss possible future
research directions in this domain.

Chapter 3
BLOFF: A Blockchain-Based Forensic Model in IoT .........................................59
Promise Agbedanu, University College Dublin, Ireland
Anca Delia Jurcut, University College Dublin, Ireland

In this era of explosive growth in technology, the internet of things (IoT) has become
the game changer when we consider technologies like smart homes and cities, smart
energy, security and surveillance, and healthcare. The numerous benefits provided by
IoT have become attractive technologies for users and cybercriminals. Cybercriminals
of today have the tools and the technology to deploy millions of sophisticated attacks.
These attacks need to be investigated; this is where digital forensics comes into play.
However, it is not easy to conduct a forensic investigation in IoT systems because of
the heterogeneous nature of the IoT environment. Additionally, forensic investigators
mostly rely on evidence from service providers, a situation that can lead to evidence
contamination. To solve this problem, the authors proposed a blockchain-based
IoT forensic model that prevents the admissibility of tampered logs into evidence.


Chapter 4
Forensic Investigation-Based Framework for SDN Using Blockchain ................74
Sonam Bhardwaj, National Institute of Technology, Kurukshetra, India
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India

Software-defined networking (SDN) is a promising networking technology that


provides a new way of network management to the customers. SDN provides more
programmable and flexible network services. SDN breaks the vertical integration
of control and data planes and promotes centralized network management. This
unique characteristic of SDN offers security features to deal with the malicious
activities. However, architectural design of SDN makes it vulnerable to several
attacks. Therefore, it is important to investigate the crime through various forensic
techniques. This work discusses a literature study of some possible forensic techniques.
A framework is also presented for forensic investigation of SDN environment in
attack scenario. The proposed framework includes the collection of evidence and
preserves them against any damage. During investigation, protection of evidence and
chain of custody are of utmost importance to avoid misleading of the investigators.
The safe storage strategy as well as maintaining the custody link can be achieved
through blockchain technology.

Chapter 5
The Mobility Open Blockchain Initiative: Identity, Members, Technologies,
and Future Trends ................................................................................................99
Loreen M. Powell, Bloomsburg University of Pennsylvania, USA
Jessica Schwartz, University of the Cumberlands, USA
Michalina Hendon, University of the Cumberlands, USA

Technological advancements in the transportation/automotive industry are continually


increasing due to competition and consumer demands. The mobile open blockchain
initiative (MOBI) is one way organizations are coming together to share innovating
ways to revolutionize the transportation/automotive industry. This chapter explains
the events that lead to the innovation of an open consortium, MOBI, and its members
and highlights some of the cutting-edge technologies and innovative methods where
blockchain is being adopted by the transportation/automotive industry.

Chapter 6
Revolutionizing the Stock Market With Blockchain ..........................................119
Namrata Dhanda, Amity University, Noida, India
Anushka Garg, Amity University, Noida, India

This chapter explores the drawbacks of conventional centralized share exchange


frameworks, like those of higher transaction costs, central and vulnerable regulation to


exploitation, and lack of revelation to business behavior and practices by introducing


a revolutionary model that utilizes blockchain to establish a decentralized stock
exchange and a transparent persistent economy. The suggested model utilizes exclusive
contracts to implement the validity of the privileges of the owner and the proper
accomplishment and settlement of the transactions, thereby mitigating the need for
a centralized authority to ensure the accuracy of the stock exchange mechanism.
The experimental findings convincingly demonstrate that the decentralized solution
can provide lower transaction costs by progressively replacing brokerage costs and
centralized officials’ commissions with mining charges, which reward the miners
for their backbreaking work in maintaining the system and enforcing the laws.

Chapter 7
Blockchain-Based Food Supply Chain Management.........................................134
Dhana Srinithi Srinivasan, PSG College of Technology, India
Karpagam Manavalan, PSG College of Technology, India
Soundarya R., PSG College of Technology, India
Thamizhi S. I., PSG College of Technology, India

Blockchain is an emerging technology that is based on the concept of distributed


ledgers. It allows for pervasive transactions among different parties and eliminates
the need for third-party intermediaries. Several of blockchain’s characteristics make
it suitable for use in the agriculture sector. Some of the potential applications of
blockchain include efficient management of the food supply chain and value-based
payment mechanisms. The products of agriculture are usually the inputs for a multi-
actor distributed supply chain, in which case the consumer is usually the final client.
The food chain involves several actors including farmers, shipping companies,
distributors, and groceries. This makes the entire system to be distributed with
multiple actors playing different roles throughout the chain. This currently used
system is inefficient and unreliable in various aspects. This project aims to leverage
blockchain technology to solve and address discrepancies involved in food supply
chains.

Chapter 8
Blockchain and PUF-Based Secure Transaction Procedure for Bitcoin ............172
Sivasankari Narasimhan, Mepco Schlenk Engineering College, India

In the blockchain, the transaction hashes are implemented through public-key


cryptography and hash functions. Hence, there is a possibility for the two users to
choose the same private key knowingly or unknowingly. Even the intruders can
follow the particular user’s bitcoin transaction, and they can masquerade as that
user by generating the private and public key pairs of him. If it happens, the user
may lose his transaction. Generally, bitcoin technology uses random numbers from
1 to 2256. It is a wide range, but for a greater number of users, there should be one


another solution. There is a possibility of digital prototyping which leads to the loss
of more accounts. This chapter provides the device-specific fingerprint technology
known as physical unclonable function (PUF) to be employed for authentication in
a blockchain-based bitcoin environment. The random unique response from PUF
ensures correct transaction. In this chapter, a new tetrahedral oscillator PUF has
been introduced intrinsically. All the blockchain operations are carried out and
verified with PUF response.

Chapter 9
Blockchain Revolution: Adaptability in Business World and Challenges in
Implementation ..................................................................................................189
Archana Sharma, Institute of Management Studies, Noida, India
Purnima Gupta, Institute of Management Studies, Noida, India

As the base of bitcoin, the blockchain has received widespread consideration


recently. Blockchain stands for an immutable ledger which permits transactions to
occur in a decentralized ways. Applications based on blockchain are numerous for
instance financial services, industrial and supply chain services, legal and healthcare
services, IoT and blockchain integration, bigdata analytics, and so on. Nevertheless,
there are still numerous confronts of blockchain technology like security and fork
problems that have to be resolved. This research highlights an inclusive indication
on blockchain technology with blockchain architecture in the first phase. And in
the second phase, the security challenges and problems associated with blockchain
are highlighted. It further proposes and measures up to various typical consensus
algorithms used in different blockchains. Research has been concluded with the
potential prospects of blockchain as future trends.

Chapter 10
A Reliable Hybrid Blockchain-Based Authentication System for IoT Network 219
Ambika N., Department of Computer Applications, Sivananda Sarma
Memorial RV College, Bangalore, India

IoT is an assembly of equipment of different calibers and functionality working towards


a single goal. A blockchain is a computerized record that contains the whole history
of exchanges made on the system. A multi-WSN arrangement model is structured.
The hubs of the IoT are isolated into base stations, group heads, and conventional
hubs as per their capacities, which encourage the administration and participation
of the hubs. A hybrid blockchain model is proposed. To fit the multi-WSN arrange
model better, as indicated by the various capacities and energies of various hubs,
neighborhood blockchain and open blockchain are sent between group head hubs and
base stations individually, and a crossbreed blockchain model is framed. A shared
validation plot for IoT hubs is proposed. For group head hubs, the creators utilize
the worldwide blockchain for validation, and for customary hubs, they utilize the


nearby blockchain for confirmation. The proposal aims in increasing reliability by


1.17% and minimizes sinkhole attack by 2.42% compared to previous contribution.

Chapter 11
The Detection of SQL Injection on Blockchain-Based Database ......................234
Keshav Sinha, Birla Institute of Technology, India
Madhav Verma, B.I.T Sindri, Dhanbad, India

In today’s world, the storage of data needs a huge amount of space. Meanwhile,
cloud and distributed environments provide sufficient storage space for the data. One
of the challenging tasks is the privacy prevention of storage data. To overcome the
problem of privacy, the blockchain-based database is used to store the data. There
are various attacks like denial of service attacks (DoS) and insider attacks that are
performed by the adversary to compromise the security of the system. In this chapter,
the authors discussed a blockchain-based database, where data are encrypted and
stored. The Web API is used as an interface for the storage and sharing of data.
Here, they are mainly focused on the SQL injection attack, which is performed by
the adversary on Web API. To cope with this problem, they present the case study
based on the Snort and Moloch for automated detection of SQL attack, network
analysis, and testing of the system.

Compilation of References ..............................................................................263

About the Contributors ...................................................................................289

Index ..................................................................................................................295
xv

Preface

Nowadays, Blockchain technology is an emerging topic due to its ability to provide


decentralized storage of information, transparency, immutability and to establish trust
in an open networked system. It is expected that the applications using blockchain
for data security and privacy will soon replace the existing technologies that provide
centralized storage. There are prospects of applying blockchain technology in many
industries including digital currency, Internet of Things (IoT), healthcare, supply
chain management, banking, retail, insurance, logistics and public sectors. In fact,
the management, access control, circulation, and sharing of any high-valued data
should use blockchains.
In simple words, blockchain can be seen as a distributed database of online records
on a peer-to-peer network that comprises a list of ordered blocks chronologically.
Typically used in financial transactions for the Bitcoin cryptocurrency, the peer-to-
peer blockchain technology records transactions without exception, in exchange to
form an online ledger system. In other words, this is a decentralized and trustworthy
system that is not relying on any third party. Trust relation among distributed nodes
is established by mathematical methods and cryptography technologies instead of
semi-trusted central institutions. The benefit of such a system is that it is distributed,
permission-based and secure, hence it is called to be a public blockchain network.
Distribution allows for a shared form of record keeping, meaning that each person
within a business network has the possibility to verify the transaction made via the
blockchain and, with permission, they can trail the record back to its source. The
block is immutable, no one has sole ownership, and no one can delete the record of a
transaction within the chain. It also facilitates data audit and accountability by having
the capability to trace tamper-resistant historical record in the ledger. Depending
on the actual deployment, data in the ledger can be stored in the encrypted form
using different cryptographic techniques; hence, preserving data privacy. Further, it
provides the pseudo-anonymity property, i.e. in the sense that the users are able to
protect their real identities. Moreover, smart contracts (i.e. a kind of self-executing
program deployed on the distributed blockchain network) can be used to support
diverse functions for different application scenarios. For example, the conditions and
Preface

terms of smart contract can be introduced by users and the smart contract will only
be executed if these terms/ conditions are fulfilled. Hence, this hands over control
to the owner of the data. Furthermore, no malware can infect the system through a
node because others in the ledger will detect the attack and deny the unauthorized
access. The blockchain can incorporate various classes of transactions or records,
so its usability can extend beyond the initial financial scope drafted with Bitcoin
cryptocurrency, to digital communications, product identification, to even customer
claims.
Although research and innovation can enable businesses to use blockchain in a
broad range of applications, the use of blockchain technology for information security
and privacy appears to be the most obvious application area. Security and privacy
are the main concern in the network and communications-based areas including IoT,
5G, Edge and Cloud Computing, Software Defined Networking, Wireless Networks
and any application that is using these paradigms such as banking systems, retail,
logistics and public sectors. The issues related to security include confidentiality,
privacy, access control, integrity, and availability. For example, in the cloud, the data
of users is stored away from their site and the users do not have direct control over
it. Strong cryptographic techniques are thus needed. The controlled disclosure of
personal information of the users comes under the privacy requirements. Only the
authorized entities should be provided information about the cloud users. Access
control is used in computer security to regulate the access to critical or valuable
resources such as data, services, computational systems, storage space, and so
on. The rights of users to access resources are typically expressed through access
control policies, which are evaluated at access request time against the current access
context. If there is any change in the stored data, the owner of data should be able
to identify this change. Also, if there is any loss or corruption of stored data, there
should be a way to retrieve this.
To promote the development and research of blockchain applications, to guarantee
the security of these applications, and further to facilitate the research for the access
control and privacy techniques, Revolutionary Applications of Blockchain-Enabled
Privacy and Access Control (1) explains several concepts of blockchain related
to WSN, CRN, SDN, Opportunistic Mobile Networks, Delay Tolerant Networks,
Internet of Things (IoT), Forensic investigation; (2) provides complete coverage
of the various tools, platforms and techniques used in blockchain; and (3) covers
a variety of applications with real world case studies in areas such as supply chain
management, stock market, banking, and attack prevention and detection techniques.
Revolutionary Applications of Blockchain-Enabled Privacy and Access Control
includes 11 chapters that presents contributions from around the globe on recent
advances and findings in the domain of blockchain technology, Internet of Things,
networks and communication, forensic, attack detection and prevention. Chapters

xvi
Preface

include theoretical analysis, practical implications, and extensive surveys with


analysis on methods, algorithms, and processes for new methods development.
A brief description of the chapters of this handbook is given as follows.

CHAPTER DESCRIPTION

Chapter 1

The Internet of Things (IoT) is paving a path for connecting a plethora of smart
devices together that emerges from the novel 5G based applications. This evident
heterogeneity invites the integration of diverse technologies such as Wireless Sensor
Networks (WSNs), Software Defined Networks (SDNs), Cognitive Radio Networks
(CRNs), Delay Tolerant Networks (DTNs), and Opportunistic Networks (oppnets).
However, the security and privacy are prominent conundrums seemed due to featured
compatibility and interoperability aspects of evolving directives. Blockchain is the
most nascent paradigm instituted to resolve the issues of security and privacy while
retaining performance standards. In this chapter, advances of blockchain technology
in aforesaid networks are investigated and presented as means to be followed as
security practices for pragmatically realizing the concepts.

Chapter 2

Distributed Denial of Service (DDoS) attacks have been a matter of serious concern
for network administrators since last two decades. These attacks target the resources
such as memory, CPU cycles and network bandwidth in order to make them unavailable
for the benign users, thereby, violating Availability, one of the components of cyber
security. With the existence of DDoS-as-a-service on Internet, DDoS attacks have
now become more lucrative for the adversaries to target a potential victim. This
chapter focuses on countering DDoS attacks using one of the latest technologies
called blockchain. Though in inception phase, utilizing blockchain for countering
DDoS attacks has proved to be quite promising. This chapter also compares existing
blockchain-based defense mechanisms to counter DDoS attacks and analyze them.
Towards the end of the work, the possible future research directions in this domain
are presented.

Chapter 3

In this era of explosive growth in technology, the Internet of Things (IoT) has
become the game changer when we consider technologies like smart homes and

xvii
Preface

cities; smart energy, security and surveillance and healthcare. The numerous
benefits provided by IoT, it has become an attractive technology for users and
cybercriminals. Cybercriminals of today have the tools and the technology to
deploy millions of sophisticated attacks. These attacks need to be investigated;
this is where digital forensics comes into play. However, it is not easy to conduct
a forensic investigation in IoT systems because of the heterogeneous nature of the
IoT environment. Additionally, forensic investigators mostly rely on evidence from
service providers. A situation that can lead to evidence contamination. To solve this
problem, this chapter proposes a blockchain-based IoT forensic model that prevents
the admissibility of tampered logs into evidence.

Chapter 4

Software-defined networking (SDN) is a promising networking technology that


provides a new way of network management to the customers. SDN provides more
programmable and flexible network services. SDN breaks the vertical integration
of control and data planes and promotes centralized network management. This
unique characteristic of SDN offers security features to deal with the malicious
activities. However, architectural design of SDN makes it vulnerable to several
attacks. Therefore, it is important to investigate the crime through various forensic
techniques. This chapter discusses a literature study of some possible forensic
techniques. A framework is also presented for forensic investigation of SDN
environment in attack scenario. The proposed framework includes the collection of
evidences and preserve them against any damage. During investigation, protection
of evidences and chain of custody are of utmost importance to avoid misleading of
the investigators. The safe storage strategy as well as maintaining the custody link
can be achieved through blockchain technology.

Chapter 5

Technological advancements in the transportation/automotive industry are continually


increasing due to competition and consumer demands. The Mobile Open Blockchain
Initiative (MOBI) is one-way organizations are coming together to share innovating
ways to revolutionize the transportation/automotive industry. This chapter explains
the events that leading to the innovation of an open consortium, MOBI and its
members, and highlights some of the cutting-edge technologies and innovative
methods blockchain is being adopted by the transportation/automotive industry.

xviii
Preface

Chapter 6

This chapter explores the drawbacks of conventional centralized share exchange


frameworks, like those of higher transaction costs, central and vulnerable regulation to
exploitation and lack of revelation to business behavior and practices, by introducing
a revolutionary model that utilizes blockchain to establish a decentralized stock
exchange and a transparent persistent economy. The suggested model utilizes exclusive
contracts to implement the validity of the privileges of the owner and the proper
accomplishment and settlement of the transactions, thereby mitigating the need for
a centralized authority to ensure the accuracy of the stock exchange mechanism.
The experimental findings convincingly demonstrate that the decentralized solution
can provide lower transaction costs by progressively replacing brokerage costs and
centralized officials ‘ commissions with mining charges which reward the miners
for their backbreaking work in maintaining the system and enforcing the laws.

Chapter 7

Blockchain is an emerging technology that is based on the concept of distributed


ledgers. It allows for pervasive transactions among different parties and eliminates
the need for third-party intermediaries. Several of blockchain’s characteristics
make it suitable for use in the agriculture sector. Some of the potential applications
of blockchain include efficient management of the food supply chain and value-
based payment mechanisms. The products of agriculture are usually the inputs for
a multi-actor distributed supply chain, in which case, the consumer is usually the
final client. The food chain involves several actors including farmers, shipping
companies, distributors, and groceries. This makes the entire system to be distributed
with multiple actors playing different roles throughout the chain. This currently
used system is inefficient and unreliable in various aspects. This project aims to
leverage Blockchain Technology to solve and address discrepancies involved in
Food Supply Chains.

Chapter 8

In the blockchain, the transaction hashes are implemented through public-key


cryptography and hash functions. Hence there is a possibility for the two users to
choose the same private key knowingly or unknowingly. Even the intruders can
follow the particular user’s Bitcoin transaction and they can masquerade that user
by generating the private and public key pairs of him. If it happens the user may
lose his transaction. Generally, Bitcoin technology uses random numbers from 1
to 2256. It is a wide range; but for a greater number of users, there should be one

xix
Preface

another solution. There is a possibility of digital prototyping which leads to the loss
of more accounts. This chapter provides the device-specific fingerprint technology
known as Physical Unclonable Function (PUF) to be employed for authentication
in a blockchain-based bitcoin environment. The random unique response from
PUF ensures correct transaction. In this chapter, a new tetrahedral oscillator PUF
has been introduced intrinsically. All the blockchain operations are carried out and
verified with PUF response.

Chapter 9

As the base of bitcoin, the blockchain has received widespread consideration recently.
Blockchain stands for an immutable ledger which permits transactions to occur in
a decentralized way. Applications based on blockchain are numerous for instance
financial services, industrial and supply chain services, legal and healthcare services,
IoT and blockchain integration, Bigdata analytics, and so on. Nevertheless, there are
still numerous confronts of blockchain technology like security and fork problems
have to be resolved. This chapter highlights an inclusive indication on blockchain
technology with blockchain architecture in first phase. And in second phase, the
security challenges and problems associated with blockchain. Further proposes and
measure up to various typical consensus algorithms used in different blockchains.
Research has been concluded with potential prospects of blockchain as future trends.

Chapter 10

IoT is an assembly of multiple equipments of different caliber and functionality


working towards a single goal. A blockchain is a computerized record that contains
the whole history of exchanges made on the system. A multi-WSN arrangement
model is structured. The hubs of the IoT are isolated into base stations, group heads,
and conventional hubs as per their capacities, which encourage the administration
and participation of the hubs. A hybrid blockchain model is proposed. To fit the
multi-WSN arrange model better, as indicated by the various capacities and energies
of various hubs, neighborhood blockchain and open blockchain are sent between
group head hubs and base stations individually, and a crossbreed blockchain model
is framed. A shared validation plot for IoT hubs is proposed. For group head hubs,
the creators utilize the worldwide blockchain for validation, and for customary
hubs, they utilize the nearby blockchain for confirmation. The proposal aims in
increasing reliability by 1.17% and minimizes sinkhole attack by 2.42% compared
to previous contribution.

xx
Preface

Chapter 11

In Today’s world, the storage of data needs a huge amount of space. In meanwhile
cloud and distributed environments provide sufficient storage space for the data.
One of the challenging tasks is the privacy prevention of storage data. To overcome
the problem of privacy the Blockchain-based database is used to store the data.
There are various attacks like denial of service attacks (DoS), Insider attacks that
are performed by the adversary to compromised the security of the system. This
chapter discusses a blockchain-based database, where data are encrypted and stored.
The Web API is used as an interface for the storage and sharing of data. Here, this
mainly focused on the SQL injection attack which is performed by the adversary
on Web API. To cope with this problem this chapter presents the case study based
on the Snort and Moloch for automated detection of SQL attack, network analysis,
and testing of the system.
This book will be of interest to graduate students, researchers, academicians,
institutions, and professionals that are interested in exploring the diverse applications
of the Blockchain technology, especially in the security and privacy area.

xxi
xxii

Acknowledgment

This Revolutionary Applications of Blockchain-Enabled Privacy and Access Control


is an outcome of the inspiration and encouragement given by several people to whom
we would like to express our gratitude and appreciation.

Firstly, our sincere gratitude goes to the people who contributed their time and
expertise to this book. We highly appreciate their efforts in achieving this project.
The editors would like to acknowledge the help of all the people involved in this
project and, more specifically, the editors would like to thank each one of the
authors for their contributions and the editorial advisory board/reviewers regarding
the improvement of quality, coherence and the content presentation of this book.

Secondly, the editors would like to thank to Mr. Eric Whalen and Ms. Morgan
Brajkovich, Assistant Development Editors; and Ms. Lindsay Wertman, Managing
Director of IGI Global, USA for their continuous support and giving us an opportunity
to edit this book.

Finally, we are thankful to our family members for their support during completion
of this book.

Surjit Singh
Thapar Institute of Engineering and Technology, India

Anca Delia Jurcut


University College Dublin, Ireland
1

Chapter 1
Blockchain Advances and
Security Practices in WSN,
CRN, SDN, Opportunistic
Mobile Networks, Delay
Tolerant Networks
Eranda Harshanath Jayatunga
Faculty of Engineering, University of Ruhuna, Sri Lanka

Pasika Sashmal Ranaweera


Faculty of Engineering, University of Ruhuna, Sri Lanka

Indika Anuradha Mendis Balapuwaduge


https://orcid.org/0000-0003-1792-2645
Faculty of Engineering, University of Ruhuna, Sri Lanka

ABSTRACT
The internet of things (IoT) is paving a path for connecting a plethora of smart
devices together that emerges from the novel 5G-based applications. This evident
heterogeneity invites the integration of diverse technologies such as wireless sensor
networks (WSNs), software-defined networks (SDNs), cognitive radio networks
(CRNs), delay tolerant networks (DTNs), and opportunistic networks (oppnets).
However, the security and privacy are prominent conundrums due to featured
compatibility and interoperability aspects of evolving directives. Blockchain is the
most nascent paradigm instituted to resolve the issues of security and privacy while
retaining performance standards. In this chapter, advances of blockchain technology
in aforesaid networks are investigated and presented as means to be followed as
security practices for pragmatically realizing the concepts.
DOI: 10.4018/978-1-7998-7589-5.ch001

Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Blockchain Advances and Security Practices in WSN, CRN, SDN

INTRODUCTION

All the discussed variants of this chapter are the pioneer technologies that govern the
emerging communication based services and their applications. These directives were
formed to address lacking aspects of different existing technologies with an improved
perspective for elevating performance standards. Though, each distinct directive has
limitations in security, where application of cumbersome but tamper-proof security
mechanisms would obviously degrade the performance of them. Thus, there is a
clear trade-off between latency and applicable security level. In addition, similar to
most existing communication technologies or protocols, verifiable security is only
credible with Trusted Third Parties (TTPs), or certificate authorities. Blockchain,
in contrast, offers a decentralized approach that eliminates the TTP dependency.
Moreover, the transparent yet tamper-proof mechanism in blockchain is enabling it to
be adopted for diverse applications to secure their transactions. Thus, this chapter is
focusing on the technologies of WSN, oppnets, SDN, CRN, and DTNs for adopting
blockchain to their security limitations. The chapter is mainly categorized into the
sections of WSN, SDN, CRN, DTN and oppnets, where various prevailing blockchain
adaptations are discussed summarizing the best security practices.

BACKGROUND

Wireless Sensor Networks (WSNs) are basically ad hoc networks, amalgamating small
devices embedded with sensing capabilities deployed to monitor physical activities in
the surrounding area of interest. These sensor nodes should have the characteristics
of large coverage area, monitoring with high precision, self-organization, random
deployment and fault-tolerance, etc. Due to the possibility of providing low cost
solutions, nowadays Wireless Sensor Networks (WSNs) are getting more and
more attention in many real-world applications. However, the dense deployment
of many sensor nodes cause unique security challenges in its management. In the
meantime, adaptation of many security protocols to overcome those challenges are
not straightforward because of inherent limits for energy consumption at sensor
nodes as well as availability of lower memory and storage space. Therefore, it is
timely important researchers to discuss the trade-off between resource consumption
minimization and security maximization in WSNs.
Flexibility is the key feature of Software Defined Networks (SDNs) that elevate
its standards beyond the conventional networking infrastructures (Kreutz, Ramos, &
Verissimo, 2013). This concept offers advanced network management capabilities
to the network administrator by enabling configuration of networking instances
independent of the hardware layer. Infact, diversification exhibited in networking

2
Blockchain Advances and Security Practices in WSN, CRN, SDN

devices and their plethoric aggregate are contriving compatibility and interoperability
debacles. In SDN, homogeneity of the both core and access networks are improved
with standardizing the hardware specifications; and higher reliance on hardware based
processing is transformed into an autonomous processing approach with software
integration (Kumar et al., 2017). In fact, SDN envisages solutions for complex issues
in traditional networking topologies and routing algorithms by integrating intelligence
to the control plane. In addition, this is a paradigm shift for network operators that
eases their issues with hardware layer and the ability to advance networking features
with novel requirements to broadened avenues. Apart from flexibility, main benefits
of SDN can be specified as: cost effectiveness (monetary), centralization, higher
throughput, dynamic nature that support higher mobility, low communication latency,
optimum network utilization, rapid and efficient load-balancing, fault tolerance, and
adaptable/ context-aware security (Tomovic, Pejanovic-Djurisic, & Radusinovic,
2014; Jaballah, Conti, & Lal, 2019; Scott-Hayward, O’Callaghan, & Sezer, 2013).
Recently, research in the field of wireless communications has been focusing on
the Fifth Generation (5G) cellular systems. Meanwhile, the 5G and beyond wireless
network designers face challenging demands such as more capacity, higher data rates,
lower latency, better connectivity for a massive number of users, lesser cost and
energy, and more importantly improved quality of experience (QoE) (Munsub Ali,
Liu, & Ejaz, 2020). Moreover, with the increase in the number of communication
devices, the requirement for higher bandwidth is essential. However, with the limited
and expensive radio spectrum resources, allocation of new frequency bands is an
extremely difficult task. Therefore, efficient management of the spectrum under
dynamic policies has recently become a prospective research topic.
Although Internet access has evolved as one of basic primary needs of humans,
still there are many rural areas that do not have any network connectivity or sometimes
intermittent. These scenarios demand the development of distributed networking
techniques in an opportunistic manner to provide atleast some level of service with
ad-hoc networks. Consequently, these Opportunistic Networks (oppnets) integrate
diverse communication, computation, sensing, storage and other devices and
resources in the surrounding. The initial set of nodes associated with an oppnet are
called seed nodes. Once other nodes are invited to become potential helpers for the
original oppnet, this seed oppnet nurtures into an expanded oppnet while persisting
various security concerns.
The integration of blockchain with IoT provides many benefits to build a secure,
trusted and robust communication prospects. But the challenge is to identify the
most suitable location in placing blockchain for current IoT settings. With the
amalgamation as third party to keep data in centralized data centers and later a fog
layer to offload the traffic burden from the data centers, the current IoT is a three
tier architecture namely IoT devices layer, Fog layer and the cloud layer. Generally,

3
Random documents with unrelated
content Scribd suggests to you:
Chapter XX.
THE ORDER OF THE LESSER SANCTIFICATION
OF WATER.

A table covered with brocade is placed in the middle of the church


in the customary place, and water in a stoup. And the priest, having
put on epitrachelion and phelonion, and holding in his hand the
honourable cross with an aspergillus, is preceded by the deacon with
the censer, and by two light-bearers with tapers. And having come
before the table, he layeth thereupon the cross, and, taking the
censer, he censeth the water crosswise, and beginneth as
customarily. And the priest having blessed, we begin psalm cxlii.
O Lord, hear my prayer....
Then, God is the Lord, and hath manifested himself unto us....
thrice, in tone iv.
And the present troparia, tone iv.
To the God-bearing one we now earnestly hie, we, sinful and lowly
ones, and bow down, crying in penitence from the depth of the soul,
Help us, O Queen, being pitiful unto us: make speed, we are undone
by the multitude of iniquities: turn not thy servants empty away; for
thee we hold indeed an only trust. Twice.
At no time, will we, unworthy ones, be silent, God-bearing one, to
tell of thy mighty acts; for, hadst thou not prevented with
intercession, who would have delivered us out of so many dangers?
and who would have kept us free until now? We will not turn away
from thee, O Queen; for thou ever savest thy servants from all ills.
Then, psalm l. Have mercy upon me, O God....
Then we sing these troparia, tone vi.
Thou that didst receive the salutation of the Angel, and didst bring
forth thy Creator, save, O Virgin, them that magnify thee.
The first troparion is said twice.
We sing praises unto thy Son, God-bearing one, and cry, O most
pure Queen, deliver thy servants from every danger.
Thou art the boast of kings, of prophets and apostles, and of
martyrs, and the mediatress of the world, All-undefiled one.
Every tongue of the orthodox praiseth, and blesseth, and glorifieth
thy most pure childbirth, O god-wedded Mary.
Grant even unto me, an unworthy one, O my Christ, forgiveness of
trespasses, I beseech thee, through the prayers of her that bore
thee, as being compassionate.
I have put my trust in thee, God-bearing one: save me by thy
prayers, and grant me forgiveness of iniquities.
Quicken me, O thou that didst bring forth the life-giver and
Saviour: save me, by thy prayers, thou blessed trust of our souls.
All-undefiled Virgin, who didst conceive in thy womb the Creator of
all things, save our souls by thy prayers.
God-bearing one all-praised, who by word didst above word bring
forth the Word, pray him to save our souls.
Propitiate towards me the judge and thy Son, me, above every
man most iniquitous, effecting this by thy prayers, O thou Queen.
As it is meet we cry to thee, Hail, God-bearing one, pure ever-
virgin! entreating to be saved by thy prayers.
Deliver me from the everlasting fire and the torments that await
me, O parent of God, that I may bless thee.
Despise not the supplications of thy servants, O Queen all-
extolled, we beseech thee, that we may be delivered from every
besetment,
From ailments, and from all afflictions, and from dangers deliver
us, even us who fly to thy sacred protection.
Strange is the wonder appertaining thee, God-conceiving one; for
the creator of all things, and our God, for our sake and like us, was
born of thee.
Thy temple, God-bearing one, is declared a free hospital for the
sick, and a place of consolation for afflicted souls.
Most holy God-bearing one, who didst bring forth the Saviour,
save thy servants from dangers, and from every other necessity.
Deliver thy servants from every approaching menace, O most pure
Queen, and from every spiritual and bodily harm.
By thy prayers, O God-bearing Virgin, save all them that betake
themselves to thee, and deliver them from every want and affliction.
Who hieth to thy temple, O most pure God-bearing one, and
receiveth not quickly a spiritual and also a bodily healing?
O Compassionate One, who art besought by all saints and by
hosts on high, cleanse me through her that bore thee.
Spare, O Saviour, the souls of our brethren, who have died in
hope of life, and pardon and forgive their iniquities.
Hail, Virgin, propitiation of the world! hail, vase of divine manna
and golden candlestick of light, O Bride of God!
We sing thee, one God in Trinity, uttering the thrice-holy voice, and
praying that we may obtain salvation.
Glory.
O Virgin, who didst bring forth the Saviour, and Master, and Lord
of the world! beseech him to save our souls.
Both now.
Hail, mountain! hail, bush! hail, gate! hail, ladder! hail, divine table!
hail, Queen, aid of all!
Through the prayers, O Gracious One, of thy most pure Mother,
and of all thy Saints, bestow thy mercies upon thy people.
Through the prayers of the glorious Archangels and Angels, and of
the hosts on high, safeguard thy servants, O Saviour.
Through the prayers of thine honourable and glorious Baptist, the
prophet, the forerunner, O Christ, my Saviour, preserve thy servants.
Through the prayers of glorious apostles and martyrs, and of all
thy Saints, bestow thy mercies upon thy people.
Through the prayers of the glorious unmercenary ones, O God-
bearing one, preserve thy servants, as being the protection and
stablishing of the world.
Glory.
Let us glorify the Father, and the Son, and the Holy Ghost, saying,
O Holy Trinity, save our souls.
Both now.
Thou that unspeakably to the uttermost didst conceive and bring
forth thy Creator, save, O Virgin, them that magnify thee.
Then,
Open unto us the gates of mercy, O blessed God-bearing one, that
we perish not who put our trust in thee, but through thee may we be
delivered from dangers; for thou art the salvation of the christian
race.
Then, Let us pray to the Lord.
Priest. For holy art thou, O our God....
Choir. Amen.
Then the present troparia, tone vi.
Now present is the time that halloweth all, and the just Judge
awaiteth us. Then turn thyself to penitence, O soul, exclaiming, as
the harlot did, with tears, O Lord, be merciful to me.
Thou, who to-day the healing fountain in the Virgin’s all-revered
temple hast with waters shower’d, dost with the sprinkling of thy
blessing quell the ailments of the weak, O Christ, physician of our
bodies and our souls.
A virgin who no nuptials knew thou didst bring forth, and thou,
unwedded mother, virgin didst remain, God-bearing Mary: O pray
Christ our God that we be sav’d.
Most pure God-bearing Virgin, do thou direct our works, and pray
for pardon of our trespasses, as we the angelic song upraise,
Holy God, holy mighty one, holy immortal one, have mercy upon
us.
And it is sung as customarily, and, after the trisagion, the deacon
saith, Let us attend.
Priest. Peace to all.
Choir. And to thy spirit.
Reader, the prokimenon, tone iii.
The Lord is mine illumination and my Saviour, whom shall I fear?
Verse. The Lord is the defence of my life, of whom shall I be
afraid?
The epistle to the Hebrews, section cccvi.
Brethren, he that sanctifieth ... ending, them that are tempted[51]
Priest. Peace to thee.
Alleluia, tone vi.
Verse i. My heart uttereth a good word.
Verse ii. I speak of my works unto the King.
The gospel from John, section xiv.
At that time Jesus went up ..., ending, whatsoever disease he had.
[52]

Then the deacon the ectenia.


In peace let us pray to the Lord.
For the peace that is from above....
For the peace of the whole world....
For this holy temple....
For the Most Holy Governing Synod....
For our Most Pious....
That he would assist them and subdue under Their feet....
For this city.... (if it is a monastery)
For this holy habitation....
For healthiness of weather....
For them that voyage, that journey....
That this water may be hallowed by the might, and operation, and
visitation of the Holy Ghost.
That there may come down into this water the cleansing operation
of the supersubstantial Trinity.
That this water may be to the healing of soul and body, and to the
turning aside of every opposing might.
That the Lord God may send down the blessing of Jordan, and
hallow this water.
For all them that need help and assistance from God.
That we may be illuminated with the illumination of understanding
by the consubstantial Trinity.
That the Lord God may declare us sons and inheritors of his
kingdom, through partaking of this water, and through being
sprinkled therewith.
For our deliverance from every affliction....
Help us, save us, have mercy on us....
Commemorating our most holy, most pure....
Choir. To thee, O Lord.
Exclamation.
For to thee is due all glory....
Then this prayer.
O Lord our God, mighty in counsel, and wonderful in works, Maker of
all creation, who keepest thy covenant and thy mercy towards them
that love thee and that keep thy commandments, who acceptest the
piteous tears of all them that are in need; for for this cause thou didst
come in the form of a servant, not terrifying us with phantoms, but
vouchsafing true bodily healing, and saying, Behold, thou art made
whole, sin no more: yea, thou didst with clay restore the eyes of the
blind, and didst bid him wash, and by a word didst make him see, O
thou that breakest the waves of adverse passions, and driest up the
salt sea of this life, and quellest the billows of lusts that are hard to
be endured; do thou thyself, O man-loving King, who hast given unto
us to be invested with a snow-white robe by water and the Spirit, by
the partaking of this water, and by being sprinkled therewith, send
down upon us thy blessing, which taketh away the defilement of
passions. Yea, O Blessed One, we pray thee to visit our infirmities,
and to heal our spiritual and bodily weaknesses by thy mercy:
through the prayers of our altogether most pure, most blessed Lady,
the God-bearing ever-virgin Mary; through the might of the
honourable and life-effecting cross; through the intercessions of the
honourable heavenly bodiless hosts; of the honourable glorious
prophet, forerunner, and baptist, John; of the holy glorious and all-
praised apostles; of our venerable and god-bearing fathers; of our
fathers in the saints, the great hierarchs and ecumenical doctors,
Basil the great, Gregory the theologian, and John Chrysostom; of our
fathers in the saints, Athanasius and Cyril, patriarchs of Alexandria;
of our father in the saints, Spyridon, wonderworker of Trimythes; of
our father in the saints, archbishop Nicolas, wonderworker of
Myrlicia; of our fathers in the saints, Peter, Alexis, Jonas, and Philip,
wonderworkers of all Russia; of the holy and glorious great martyr,
George, the triumphant; of the holy and glorious great martyr,
Demetrius, the myrrh-emitter: of the holy and excellently victorious
martyrs; of the holy and righteous god-progenitors, Joakim and
Anna; of the holy glorious and unmercenary wonderworkers,
Cosmas and Damian, Cyrus and John, Pantelimon and Hermolaus,
Sampson and Diomed, Mocius and Anicetus, Thalaleus and
Tryphon; and of the holy, name, whose memory we keep, and of all
thy Saints.
And preserve, O Lord, thy Servant, our Most Pious, Autocratic,
Great Lord, THE EMPEROR ALEXANDER ALEXANDROVITCH, of
all Russia. Thrice.
And His Consort, the Most Pious Lady, THE EMPRESS MARIA
THEODOROVNA.
And His Heir, the Right-believing Lord, the Cesarevitch and Grand
Duke, NICOLAUS ALEXANDROVITCH, and all the reigning House.
Save, O Lord, and have mercy upon the Most Holy Governing
Synod, give unto them spiritual and bodily health, and be gracious in
all things to this thy ministration of the christian polity. Remember, O
Lord, every episcopate of the right-believers, that rightly divide the
word of thy truth, and every priestly and monastic order, and their
salvation. Remember, O Lord, them that hate and them that love us,
our ministering brethren here present, and them that for a blessed
cause are absent and have desired us, unworthy ones, to pray for
them. Remember, O Lord, our brethren that are in bonds and
afflictions, and have mercy upon them according to thy great mercy,
delivering them from every need. For thou art the fountain of healing,
O Christ our God, and to thee we ascribe glory, with thine
unbeginning Father, and with thy most holy, and good, and life-
creating Spirit, now and ever, and to ages of ages.
Choir. Amen.
Priest. Peace to all.
Choir. And to thy spirit.
Deacon. Bow your heads to the Lord.
Choir. To thee, O Lord.
And the priest secretly the prayer.
Incline thine ear, O Lord, and hearken unto us, thou who didst
vouchsafe to be baptized in Jordan, and didst hallow the waters; and
do thou bless us all, who through the bending of our necks indicate
the representation of service; and count us worthy to be filled with
thy sanctification through the partaking of this water; and may it be
unto us, O Lord, for the healing of soul and body.
Exclamation. For thou art our sanctification, and to thee we
ascribe glory, and thanksgiving, and worship, with thine unbeginning
Father, and with thine all-holy, and good, and life-creating Spirit, now
and ever, and to ages of ages.
Choir. Amen.
Then, taking the honourable cross, he blesseth the water thrice,
dipping it and raising it perpendicularly in the form of a cross, and
singing the present troparion in tone i thrice.
O Lord, save thy people, and bless thine inheritance, granting
victory to our Right-believing EMPEROR, name, over enemies, and
preserving thine estate by thy cross.
And after this they sing this troparion, tone ii.
Make us worthy of thy gifts, O God-bearing Virgin, overlooking our
iniquities, and vouchsafing cures unto them that in faith receive thy
blessing, O thou most pure.
Then the priest kisseth the honourable cross, as also do all the
people, and he sprinkleth all with the sanctified water, and the altar,
and the whole church. And the people sing the present troparia, tone
iv.
Having a fountain of remedies, O holy unmercenary ones, ye
bestow healings unto all that are in need, as being counted worthy of
mighty gifts from the ever-flowing fountain of our Saviour; for the
Lord hath said unto you, as unto co-emulators of the apostles,
Behold, I have given unto you power over unclean spirits so as to
cast them out, and to heal every sickness and every wound.
Therefore in his commandments having virtuously liv’d, freely ye
receiv’d, freely ye bestow, healing the sufferings of our souls and
bodies.
Attend unto the supplications of thy servants, thou altogether
undefiled one, quelling the uprisings of evils against us, and
releasing us from every affliction; for thee we have alone a sure and
certain confirmation, and we have gained thy mediation that we may
not be put to shame, O Queen, who call upon thee, Be instant in
supplication for them that faithfully exclaim to thee, Hail, Queen, thou
aid of all, the joy and safeguard, and salvation of our souls!
Accept the prayers of thy servants, O Queen, and deliver us from
every necessity and grief.
And, after the sprinkling, the ectenia.
Have mercy upon us, O God....
Furthermore let us pray for the preservation of this holy habitation,
and of every city and country, from famine, pestilence, earthquake,
flood, fire, sword, invasion of strangers, and civil war, that our good
and man-loving God may be gracious and favourably disposed to
turn away from us every rage that riseth against us, and to deliver us
from his impending and righteous threatening, and to have mercy
upon us.
Lord, have mercy, xl.
And the priest exclaimeth,
Hear us, O God our Saviour, thou hope of all the ends of the
earth.... and the rest.
Choir. Amen.
Priest. Peace to all.
Choir. And to thy spirit.
Deacon. Let us bow our heads to the Lord.
Choir. To thee, O Lord.
Priest, this prayer with a loud voice.
O most merciful Master, O Lord Jesus Christ our God, through the
prayers of our all-holy Lady, the God-bearing ever-virgin Mary;
through the might of the honourable and life-effecting cross; through
the intercession of the honourable heavenly bodiless hosts; of the
honourable glorious prophet, forerunner, and baptist, John; of the
holy glorious and all-praised apostles; of the holy glorious and
excellently victorious martyrs; of our venerable and god-bearing
fathers; of our fathers in the saints, the great ecumenical doctors and
divines, Basil the great, Gregory the theologian, and John
Chrysostom; of our father in the saints, archbishop Nicolas,
wonderworker of Myrlicia; of our fathers in the saints, Peter, Alexis,
Jonas, and Philip, wonderworkers of all Russia; of the holy and
righteous god-progenitors, Joakim and Anna, and of the holy, name,
whose is the temple, and of all thy Saints, make our prayer
acceptable unto thee; grant unto us forgiveness of our iniquities;
cover us with the shelter of thy wings; remove far from us every
enemy and adversary; give peace to our life; O Lord, have mercy
upon us, and upon thy world, and save our souls, as being good and
the lover of mankind.
Choir. Amen.
And the dismissal.
Chapter XXI.
THE ORDER OF THE GREAT SANCTIFICATION
ON THE HOLY THEOPHANY.

After the priest hath said the prayer behind the ambo, we all go to
the baptismal font, the taper-bearers going in front, and after them
the deacons and priests with the gospel and with incense, while the
brethren sing the present troparia.
Tone viii.
The voice of the Lord crieth upon the waters, saying, O come ye,
and all receive the spirit of wisdom, the spirit of understanding, the
spirit of the fear of God, even Christ, who is made manifest.
Thrice.
To-day the nature of the waters is sanctified, and the Jordan is
divided, and turneth back the flowing of its waters, beholding the
baptism of the Master.
Twice.
As a man thou didst come to the river, O Christ the King, desiring
to receive the baptism of a servant, O thou good one, at the hand of
the Forerunner, because of our sins, O lover of mankind.
Twice.
Glory. Both now. The same tone.
To the voice crying in the wilderness, Prepare ye the way of the
Lord, thou didst come, O Lord, taking the form of a servant, asking
for baptism, thou who knowest not sin. The waters beheld thee, and
were afraid. The Forerunner became trembling, and cried, saying,
How shall the lamp of light be lighted? how shall the servant lay
hands upon the Master? Sanctify thou me and the waters, O
Saviour, thou that takest away the sins of the world.
And straightway, standing by the baptismal font, the deacon saith,
Wisdom.
And the reader, the reading from the prophesy of
Esaias.
Chap. xxxv.
Thus saith the Lord, Let the thirsty desert be glad, let the wilderness
rejoice, and blossom as a rose, and let them bud forth and be
exceedingly glad. And let the desert of Jordan rejoice, and the glory
of Libanus shall be given unto it, and the honour of Carmel, and my
people shall behold the glory of the Lord, and the exaltedness of
God. Strengthen ye the weak hands, and comfort ye the feeble
knees; and say unto them that are faint-hearted in intention, Be ye
strong, and fear not, behold our God will render judgment, he will
come and save us. Then shall the eyes of the blind be opened, and
the ears of the deaf shall hear. Then shall the lame man leap as an
hart, and the tongue of the deaf be distinct; for in the wilderness shall
water break out, and a ravine in a thirsty land. And waterless places
shall become pools, and in a thirsty land shall be a spring of water:
there shall be joy of birds, abodes of syrens, and reeds and pools.
And there shall be a pure way, and it shall be called a holy way; and
the impure shall not pass there, neither shall an impure way be
there, and the dispersed shall walk therein, and shall not wander.
And no lion shall be there, nor of evil beasts shall one enter there,
nor be found there; but the redeemed and chosen of the Lord shall
walk therein. And they shall return and come to Sion with joy and
gladness, and everlasting joy shall be upon their heads: praise, and
gladness, and joy shall penetrate them, and pain, grief, and sighing
shall flee away.
The reading from the prophecy of Esaias.
Chap. lv.
Thus saith the Lord, O every one that thirsteth, come ye to the water,
and as many as have no money, come ye, buy, and eat and drink,
wine and fat, without money and without price. Wherefore do ye
spend money for that which is not bread, and labour for that which
satisfieth not? hearken ye to me, and eat that which is good, and let
your soul delight itself in good things. Incline your ears, and follow in
my ways; hearken unto me, and your soul shall live in good things;
and I will promise unto you an everlasting testament, even faithful
things befitting unto David. Behold, I have given him to be a
testimony among the nations, a prince and a commander among the
nations. Behold, nations that have not known thee shall call upon
thee, and people that have not recognised thee shall have recourse
unto thee, because of the Lord thy God and the holy one of Israel,
for I have glorified thee. Seek ye God, and, when ye have found him,
call upon him, if haply he may draw nigh unto you. Let the impious
forsake his ways, and the transgressing man his counsels; and turn
ye unto the Lord your God, and ye shall be pitied; for in much wise
he forgiveth your sins. For my counsels are not as your counsels,
neither as your ways are my ways, saith the Lord. For as the heaven
standeth far from the earth, so standeth my way from your ways, and
your contemplations from my thoughts. For as the rain or the snow
cometh down from heaven, and returneth not thither, until it soaketh
the earth, and generateth, and increaseth, and giveth seed to the
sower, and bread to the eater, so shall my word be which goeth out
of my lips, and returneth not unto me void, until it accomplisheth all
that I have wished, and furthereth my ways and my commandments.
For ye shall go forth with joy, and be taught with gladness: for the
mountains and the hills shall leap, expecting you with joy, and all the
trees of the field shall clap their hands. And instead of the thorn shall
come up the cypress, and instead of the nettle shall come up the
myrtle; and it shall be to the Lord for a name and for an everlasting
sign, and it shall not be cut off.
The reading from the prophecy of Esaias.
Chap. xii.
Thus saith the Lord, Ye shall draw water with joy out of wells of
salvation. And thou shalt say in that day, Confess ye unto the Lord,
and call upon his name, declare his glory unto the nations, make
mention that his name is exalted. Sing ye the name of the Lord, for
he hath wrought excellent things: declare ye these throughout all
lands. Rejoice and be glad, ye that dwell in Sion, for the holy one of
Israel is exalted in the midst thereof.
Deacon. Wisdom.
Reader, prokimenon, tone iii.
The Lord is mine illumination, and my Saviour, whom shall I fear?
Verse. The Lord is the defence of my life, of whom shall I be
afraid?
The epistle to the Corinthians, section cxliii, from
the paragraph, Chap. x.
Brethren, I would not that ye should be ignorant how that all our
fathers were under the cloud, and all passed through the sea; and
were all baptized unto Moses in the cloud and in the sea; and did all
eat the same spiritual meat, and did all drink the same spiritual drink;
for they drank of the spiritual rock that followed them, and the rock
was Christ.
Alleluia, tone iv.
Verse. The voice of the Lord is upon the waters, the God of glory
thundereth, the Lord is upon many waters.
The gospel from Mark, section ii. Chap. i.
At that time Jesus came from Nazareth of Galilee, and was baptized
of John in Jordan. And straightway coming up out of the water, he
saw the heavens opened, and the Spirit like a dove descending upon
him. And there was a voice from heaven, saying, Thou art my
beloved Son, in whom I am well pleased.
And the deacon saith the ectenia.
In peace let us pray to the Lord.
For the peace that is from above....
For the peace of the whole world....
For this holy temple....
For the Most Holy Governing Synod....
For our Most Pious, Autocratic Great Lord, THE EMPEROR
ALEXANDER ALEXANDROVITCH of all Russia; and for His
Consort, the Most Pious Lady, THE EMPRESS MARIA
THEODOROVNA.
For His Heir, the Right-believing Lord, the Cesarevitch and Grand
Duke NICOLAUS ALEXANDROVITCH; and for all the Reigning
House.
That he would assist Them, and subdue....
For this city, (if it is a monastery, For this holy habitation)....
For healthiness of weather....
For them that voyage, that journey....
That this water may be hallowed by the might, and operation, and
descent of the Holy Ghost, let us pray to the Lord.
That there may come down into these waters the cleansing
operation of the supersubstantial Trinity, let us pray to the Lord.
That there may be bestowed upon them the grace of redemption,
the blessing of Jordan, through the might, and operation, and
descent of the holy Ghost, let us pray to the Lord.
That he would quickly beat down satan under our feet, and destroy
every evil counsel that he conceiveth against us, let us pray to the
Lord.
That the Lord our God may deliver us from every evil device, and
from the essay of the adversary, and may count us worthy of
promised blessings, let us pray to the Lord.
That we may be illuminated with the illumination of understanding
and piety through the descent of the Holy Ghost, let us pray to the
Lord.
That the Lord God would send down the blessing of Jordan, and
hallow these waters, let us pray to the Lord.
That this water may be a gift of sanctification, a loosing of sins, for
the healing of soul and body, and for every befitting need, let us pray
to the Lord.
That this water may well up unto eternal life, let us pray to the
Lord.
That it may be manifested to the destruction of every counsel of
visible and invisible enemies, let us pray to the Lord.
For them that laid and draw thereof for the sanctification of
houses, let us pray to the Lord.
That it may be to the cleansing of soul and body of all that with
faith draw and partake of it, let us pray to the Lord.
That we may be counted worthy to be filled with sanctification
through the partaking of these waters, by the invisible manifestation
of the Holy Ghost, let us pray to the Lord.
That the Lord God may hearken unto the voice of the prayer of us
sinners, and have mercy upon us, let us pray to the Lord.
For our deliverance from every affliction....
Help us, save us, have mercy....
Commemorating our most holy, most pure, most blessed....
While these are being said, the priest saith this
prayer secretly.
Lord Jesus Christ, the only-begotten Son, that art in the bosom of
the Father, O thou true God, fountain of life and immortality, thou
light of light, that camest into the world to enlighten it; do thou dawn
upon our mind by thy Holy Ghost, and accept us offering magnifying
and thanksgiving unto thee for thy wonderful mighty works from
eternity, and for thy saving providence in these last ages, in which
thou hast assumed our impotent and poor substance, and,
condescending to the estate of a servant, who art King of all things,
didst furthermore endure to be baptized in Jordan by the hand of a
servant, that thou, the sinless one, having sanctified the nature of
water, mightest lead us unto regeneration by water and the spirit,
and stablish us in the aforetime liberty. And, celebrating the memory
of this divine mystery, we beseech thee, O man-loving Master,
Sprinkle thou also upon us, thine unworthy servants, according to thy
divine promise, pure water, the gift of thy tenderness, that the prayer
of us sinners over this water may be acceptable through thy grace,
and that thereby thy blessing may be bestowed upon us and upon all
thy faithful people, to the glory of thy holy and adorable name. For to
thee is due all glory, honour, and worship, with thine unbeginning
Father, and with thy most holy, and good, and life-creating Spirit,
now and ever, and to ages of ages.
And he saith to himself, Amen.
And when the deacon hath finished the ectenia, the priest
beginneth this prayer with a loud voice.
Great art thou, O Lord, and wonderful are thy works, and no word
shall be sufficient for the praise of thy wonders.
Thrice.
For thou by thy will hast from, nothingness brought all things into
being, and, by thy power, thou sustainest creation, and, by thy
foreknowledge, directest the world. Thou from four elements hast
formed creation, and hast crowned the circle of the year with four
seasons. All the spiritual powers tremble before thee, the sun
praiseth thee, the moon glorifieth thee, the stars make intercession
with thee, the light hearkeneth unto thee, the depths shudder at thy
presence, the springs of water serve thee. Thou hast stretched out
the heavens as a curtain, thou hast founded the earth upon the
waters, thou hast bounded the sea with sand, thou hast diffused the
air for breathing. The angelic powers minister unto thee, the choirs of
archangels worship thee, the many-eyed cherubim, and the six-
winged seraphim, standing and flying around, cover themselves with
fear of thine unapproachable glory. For thou, being the uninscribable,
unbeginning and unspeakable God, didst come down upon earth,
taking the form of a servant, being made in the likeness of men; for
thou, O Master, through the tenderness of thy mercy, didst not
endure to behold the race of men tormented by the devil, but thou
didst come and save us. We confess thy grace, we proclaim thy

You might also like