0% found this document useful (0 votes)
38 views12 pages

Secure Blockchain With Internet of Things (S-Biot) For Modern World Application

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views12 pages

Secure Blockchain With Internet of Things (S-Biot) For Modern World Application

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

on

Secure Blockchain with Internet of Things (S-BIoT) for


Modern World Application

Presented By:
Asst. Prof. Ashok Kumar Yadav
Associate. Prof. Sangeeta Gupta
Prof. Y. Ramadevi
Mr. Chandra Sekhar Yadav

Department of Information Technology


Rajkiya Engineering College Azamgarh
December, 2020
Introduction to S-BIoT
 Remote driven devices are on a high rise in the modern world, leading to data flooding across the Internet. Such
devices include electronic, and non-electronics one's that are all controlled through a remote and the data is recorded
via sensors that can be analyzed at a later point of time to trace the log of all operations.

 There may arise a need to enable multiple authorized users to gain access to the log records to identify suspicious
activities carried out by intruders who attack confidential data to derive commercial benefit out of it.

 This situation may arise in various applications like smart home, smart agriculture, smart wearable's, smart
automobiles etc. Hence, there is a need to strengthen the security aspects to overcome the unprecedented loss of
confidential information.

 Integration of the decentralized property of blockchain with data capturing aspects of IoT across a heterogeneous
environment in a secure way.

 There are various vulnerabilities in these both technologies and we will be discussing how these two technologies can
be coupled together to form real world applications.
Challenges in IoT
 Security: Since all the information collected by various IoT devices are exchanged over the internet which
basically follows the centralized paradigm, there is always chance that some of the confidential information may
be tampered by the attacker.
 Limited Resources: As IoT uses devices like sensors which have very low storage capacity, so an IoT based
application will not work properly if there is humongous amount of data.
Blockchain Solving IoT Problems
 Decentralization – All the information will be stored across multiple peers.
 Immutability – The transactions in blockchain are cryptographically secured so that it cannot be tampered.
 Timestamping – All the transactions in Blockchain are timestamped to eliminate any chance of attack.
 High storage capacity – Blockchain solves the problem of limited resources in IoT because it has a large
capacity to store and verify data using special data structures like Merkle Tree.
Integration of Blockchain with IoT
Challenges in Blockchain Technology
 Scalability issue – The performance of the S-BIoT system largely depends on the number of nodes present in
system. As the number of nodes increases, there is always a degradation in the performance of application.
 High computing resources - As the number of nodes increases, more computation will be required for mining
the blocks and hence more computational resources will be required.
 Choice of consensus - Consensus algorithm are very important algorithms in the Blockchain Technology. But it
is very critical and difficult to decide that which consensus will be appropriate for which type of application.
 Regulation challenge in Blockchain - There is a regulatory challenge in terms of integrated applications of
Blockchain Technology. For example, USA is using "free and fair" blockchain model while China is
using "Regulated and Controlled model".
Consensus Mechanism in Blockchain
 Consensus algorithms are the core concept of Blockchain Technology.
 Some of the requirements of a good consensus algorithm is discussed below-
1. Validity : It ensures that only one proposed value is decided.
2. Agreement : All non-faulty nodes must come to a common decision.
3. Integrity : It ensures that each node must decide exactly one value.
4. Termination : It ensures that every node must eventually decides a value. It is also called liveliness of nodes.
 Some of the known consensus algorithms are Proof of Work (PoW), Proof of Stake (PoS), Proof of Burn (PoB),
Paxos, RAFT, Practical Byzantine Fault Tolerence (PBFT), etc.
Vulnerability in Blockchain
Attack Description Possible countermeasures
Brute force attack To perform double-spending the blocks are Place observers within the network Alert the nodes about
privately mined.
possible ongoing double-spending.
Goldfinger or The opponent controls in excess of 50% of the Place observers within the network, Communicating double-
>50% hash power hash rate.
spending alert among all peers TwinsCoin, large mining
pools,
PieceWork disincentivize
Race attack or Double same bitcoins spent in multiple transactions send Place observers with in the network,
spending two conflicting transactions in rapid succession
Communicating double-spending alerts among peers,
Direct incoming connections should disable.
Finney attack After receiving pre-mined block, deceptive Expectation of several transaction’s confirmations.
minor broadcasts that block, and create a situation
for double-spending.
one-confirmation It is done by combination double-spending attack Expectation of several transaction’s confirmations.
attack or Vector 76 and Finney attack.
Selfish mining or block Misuse Bitcoin fork to grab unfair rewards ZeroBlock technique, Timestamp based techniques like
discarding
freshness preferred, DECOR+ protocol
Routing attacks Isolate an array of nodes from the Bitcoin Monitor RTT (round trip time), Increasing the variety of
network, delaying in block’s propagation.
nodes connections use of gateway in different Autonomous
Systems.
DDoS A co-operative attack to exhaust available Proof-of-Activity (PoA) protocol, Quick verification
network resources
Signature-based authentication
Sybil Attacker try to create more than one virtual Two-party mixing protocol like Xim
identity.
Other Applications of S-BIoT
 Smart Agriculture.
 Smart City.
 Smart Home.
 Educational Institutes.
 Tracking Patient's health like blood pressure, heart beat , pulses etc.
 Waste Management.
 Fake medicine detection.
 Healthcare services.
 Smart transportation.
References
 [1] Christidis, Konstantinos, and Michael Devetsikiotis. "Blockchains and smart contracts for the internet of things." Ieee Access 4 (2016): 2292-
2303.
 [2] S. Huh, S. Cho and S. Kim (2017). Managing IoT devices using blockchain platform, 19th International Conference on Advanced
Communication Technology (ICACT), Bongpyeong, 2017, pp. 464-467, doi: 10.23919/ICACT.2017.7890132.
 [3] Yadav, Ashok Kumar, and Karan Singh. "Comparative Analysis of Consensus Algorithms of Blockchain Technology." In Ambient
Communications and Computer Systems, pp. 205-218. Springer, Singapore, 2020.
 [4] Liao, Chun-Feng, Sheng-Wen Bao, Ching-Ju Cheng, and Kung Chen. "On design issues and architectural styles for blockchain-driven IoT
services." In 2017 IEEE international conference on consumer electronics-Taiwan (ICCE-TW), pp. 351-352. IEEE, 2017.
 [5] Malik, Sidra, Volkan Dedeoglu, Salil S. Kanhere, and Raja Jurdak. "TrustChain: Trust management in blockchain and IoT supported supply
chains." In 2019 IEEE International Conference on Blockchain (Blockchain), pp. 184-193. IEEE, 2019.
 [6] Yazdinejad, Abbas, Reza M. Parizi, Ali Dehghantanha, Qi Zhang, and Kim-Kwang Raymond Choo. "An energy-efficient SDN controller
architecture for IoT networks with blockchain-based security." IEEE Transactions on Services Computing (2020).
 [7] Yadav, Ashok Kumar, and Karan Singh. "Comparative Analysis of Consensus Algorithms and Issues in Integration of Blockchain with IoT."
In Smart Innovations in Communication and Computational Sciences, pp. 25-46. Springer, Singapore, 2020.
 [8] Xu, Lei, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, and Weidong Shi. "DIoTA: Decentralized-Ledger-Based Framework for Data
Authenticity Protection in IoT Systems." IEEE Network 34, no. 1 (2020): 38-46.
 [9] Wu, Jun, Mianxiong Dong, Kaoru Ota, Jianhua Li, and Wu Yang. "Application-aware consensus management for software-defined intelligent
blockchain in IoT." IEEE Network 34, no. 1 (2020): 69-75.
 [10] Xiong, Zehui, Yang Zhang, Nguyen Cong Luong, Dusit Niyato, Ping Wang, and Nadra Guizani. "The best of both worlds: A general
architecture for data management in blockchain-enabled Internet-of-Things." IEEE Network 34, no. 1 (2020): 166-173.
Questions??
THANK YOU

You might also like