scholarly journals Multi-Layer Blockchain-Based Security Architecture for Internet of Things

Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 772 ◽  
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammad Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.

2022 ◽  
Vol 11 (1) ◽  
pp. 5
Author(s):  
Njabulo Sakhile Mtetwa ◽  
Paul Tarwireyi ◽  
Cecilia Nombuso Sibeko ◽  
Adnan Abu-Mahfouz ◽  
Matthew Adigun

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.


2020 ◽  
Vol 8 (5) ◽  
pp. 2756-2760

In pervasive environment, the opportunity of unidentified objects involving in malevolent interactions increases due to the lack of centralized services. Traditional authentication and access control rules cannot be applied due to limitations of foot print of the objects used in Internet of Things. The proposed model presents authentication and authorization for an IoT-based ad-hoc objects using human notion of trust. The paper presents testing the proposed model with relevant use-cases in patient monitoring healthcare devices and presents the analysis results used in the critical care areas.


Author(s):  
Zhihui Wang ◽  
Jingjing Yang ◽  
Benzhen Guo ◽  
Xiao Zhang

At present, the internet of things has no standard system architecture. According to the requirements of universal sensing, reliable transmission, intelligent processing and the realization of human, human and the material, real-time communication between objects and things, the internet needs the open, hierarchical, extensible network architecture as the framework. The sensation equipment safe examination platform supports the platform through the open style scene examination to measure the equipment and provides the movement simulated environment, including each kind of movement and network environment and safety management center, turning on application gateway supports. It examines the knowledge library. Under this inspiration, this article proposes the novel security model based on the sparse neural network and wavelet analysis. The experiment indicates that the proposed model performs better compared with the other state-of-the-art algorithms.


Author(s):  
Kameswara Rao M. ◽  
S. G. Santhi

The sturdy advancements of internet of things are being changed into a methodology of associating smart things. E-health applications in this vision are a standout amongst IoT's most energizing applications. Indeed, security concerns were the fundamental boundary to the establishment. The encryption of various interlinked substances and the classification of the swapped information are the real concerns which should be settled for clients. This chapter proposes an e-health application using lightweight verification mechanism. The proposed model utilizes nonces as well as keyed-hash message authentication (KHAC) for checking the validity of verification trades.


2021 ◽  
Vol 7 ◽  
pp. e471
Author(s):  
Muhammad Umar Aftab ◽  
Ariyo Oluwasanmi ◽  
Abdullah Alharbi ◽  
Osama Sohaib ◽  
Xuyun Nie ◽  
...  

Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices, vehicular networks, and household devices with internet-based networks. Specifically, the IoT smart devices and gadgets used in government and military are crucial to operational success. Communication and data sharing between these devices have increased in several ways. Similarly, the threats of information breaches between communication channels have also surged significantly, making data security a challenging task. In this context, access control is an approach that can secure data by restricting unauthorized users. Various access control models exist that can effectively implement access control yet, and there is no single state-of-the-art model that can provide dynamicity, security, ease of administration, and rapid execution all at once. In combating this loophole, we propose a novel secure and dynamic access control (SDAC) model for the IoT networks (smart traffic control and roadside parking management). Our proposed model allows IoT devices to communicate and share information through a secure means by using wired and wireless networks (Cellular Networks or Wi-Fi). The effectiveness and efficiency of the proposed model are demonstrated using mathematical models and discussed with many example implementations.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 691
Author(s):  
Patil Abhijit J ◽  
Dr G. Syam Prasad

Wireless sensor networks (WSN’s) are becoming increasingly popular in the current Era. WSN and Smart Devices are key enablers for the Internet of things (IoT) and Fog Computing based applications and it brings IoT applications with enhanced capabilities for sensing and actuation. IOT is a very growing area and having wide scope for research. Integration of WSNs into IoT is today’s need. Adoptions to cloud computing, increasing use of automation of tools, Integration of internet into most activities of human had reached to the stage where Internet of Things based applications are becoming more popular today. Many new applications are now being developed in the field of IoT. The broad areas of application are Home automation, Smart cities, Retail, Agriculture, Manufacturing, Healthcare, Habitat Monitoring, Security and Surveillance etc. With this wide scope the applications are prone to many security threats. Providing Security for IoT and Fog computing-based applications is a Research Challenge. This paper tries to discuss with the common security attacks, Reasons, their counter measures and research directions. We are also proposing a Trust based Security model for implementing application layer level security in IoT and fog.  


Sign in / Sign up

Export Citation Format

Share Document