scholarly journals Secure Access Control to IoT Devices using Blockchain

2019 ◽  
Vol 8 (2) ◽  
pp. 3064-3070 ◽  

Internet of Things (IoT) is growing at an exponential rate but the area of privacy and security in IoT still remains unexplored. The existing algorithms or methods are mainly centralized and hence they are vulnerable due to their single point authentication topology. As it has been estimated that by 2020 there will be more ‘things’ than people on this earth the problem of security becomes a major concern in IoT networks, as a person having control to an IoT network will be able to control a large portion of an organization. Blockchain has recently been used to provide security to peer-to-peer networks. Blockchains are computationally expensive, heavyweight and are considered unsuitable for IoT architecture. In this paper a new lightweight and secure architecture for IoT by using Ethereum Blockchain retaining most of its security providing powers is proposed. Since Blockchain is decentralized it solves the single point authentication problem existing in IoT networks. A Smart Home System as a representative case study has been implemented for broader IoT applications. The two parameters measured are temperature and intrusion detection. The proposed model tackles some more challenges that exist in IoT networks. The Qualitative evaluation of the proposed architecture highlights how it tackles various attacks.

2021 ◽  
pp. 1-23
Author(s):  
Matteo Pompermaier

This article aims to retrace the extent of single women's engagement in the credit market. To this end, it relies on a series of more than 1,900 probate inventories drawn up between 1790 and 1910 in the two Swedish cities of Gävle and Uppsala. These two cities represent an ideal case study, because the process of industrialisation and economic development resulted in two differently structured credit markets. The research centres initially on the problem of studying women's agency from probate inventories. It analyses the main characteristics of spinsters and widows as they emerge from the sources and compares them with married women. Subsequently, the article analyses how marital status shaped women's economic lives, affecting how they participated in the credit market. For this purpose, it focuses specifically on banking and peer-to-peer exchanges (in particular, promissory notes). Spinsters favoured more conservative strategies relying more often on the services provided by banks, while widows seemed to have played an additional, and more significant, role as lenders in peer-to-peer networks. The study also confirms that unmarried women were only rarely active as borrowers.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 945 ◽  
Author(s):  
Rafael Torres Moreno ◽  
Jorge Bernal Bernabe ◽  
Jesús García Rodríguez ◽  
Tore Kasper Frederiksen ◽  
Michael Stausholm ◽  
...  

Privacy enhancing technologies (PETs) allow to achieve user’s transactions unlinkability across different online Service Providers. However, current PETs fail to guarantee unlinkability against the Identity Provider (IdP), which becomes a single point of failure in terms of privacy and security, and therefore, might impersonate its users. To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied both to online and offline scenarios. Namely, distributed cryptographic techniques based on threshold cryptography are used to split up the role of the Identity Provider (IdP) into several authorities so that a single entity is not able to impersonate or track its users. The architecture leverages PET technologies, such as distributed threshold-based signatures and privacy attribute-based credentials (p-ABC), so that the signed tokens and the ABC credentials are managed in a distributed way by several IdPs. This paper describes the Olympus architecture, including its associated requirements, the main building blocks and processes, as well as the associated use cases. In addition, the paper shows how the Olympus oblivious architecture can be used to achieve privacy-preserving M2M offline transactions between IoT devices.


2020 ◽  
Vol 7 (10) ◽  
pp. 10102-10110
Author(s):  
Brittany D. Davis ◽  
Janelle C. Mason ◽  
Mohd Anwar
Keyword(s):  

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Shujuan Zhang ◽  
Zhen Jin ◽  
Juan Zhang

Passive worms are prone to spreading through Peer-to-Peer networks, and they pose a great threat to the security of the network. In this paper, considering network heterogeneity and the number of hops a search can reach, we propose a novel mathematical model to study the dynamics of the propagation of passive worms. For the proposed model, the basic reproduction number R0 is derived by employing the existence of the positive equilibrium. And the stabilities of the worm-free equilibrium and positive equilibrium are analyzed. Moreover, we verify the rationality of the model established by comparing the stochastic simulation with the numerical simulation. Finally, we examine the effect of the number of hops on the spread of passive worms and discuss the various immunization strategies. We find that if R0>1, the propagation speed of passive worms is accelerated with the increase of hop count d; if R0<1, the number of infected peers decreases rapidly with the increase of the value of d and drops to zero eventually. Results show that the network topology and the number of hops can affect the spread of passive worms.


Mousaion ◽  
2019 ◽  
Vol 36 (4) ◽  
Author(s):  
Mahlaga Johannes Molepo ◽  
Archie Leonard Dick

This article presents a proposed model for framing the policies of Tshwane University of Technology’s (TUT) libraries. The authors draw on a focused literature review across various disciplines as well as empirical evidence collected from a purposive sample of 40 participants in a case study. The qualitative evaluation method is used to evaluate a set of models. A self-developed set of criteria is used as a tool to test the models towards a selection of elements and features that are then used to table the proposed model for TUT’s libraries. The evaluated models were categorised to produce models for academic library activities, models for higher education as well as models that depict changes in society’s knowledge system. The adapted model proposes a multiple reality constructionist approach to improve a shared understanding of what constitutes knowledge in democratic South Africa. It was found that there are inconsistencies and a lack of clarity on the role of TUT’s libraries in transformation initiatives of the university. The main argument is that the future role of TUT’s libraries should include taking part in other processes of the knowledge system such as knowledge production, application and use. The main value of the article is to provide a comprehensive strategic outlook that guides the transformation of TUT’s libraries. This will assist to frame TUT’s libraries policies in light of changes taking place in higher education.


Author(s):  
B. Mejías ◽  
P. Van Roy

Distributed systems with a centralized architecture present the well known problems of single point of failure and single point of congestion; therefore, they do not scale. Decentralized systems, especially as peer-to-peer networks, are gaining popularity because they scale well, and do not need a server to work. However, their complexity is higher due to the lack of a single point of control and synchronization, and because consistent decentralized storage is difficult to maintain when data constantly evolves. Self-management is a way of handling this higher complexity. In this paper, the authors present a decentralized system built with a structured overlay network that is self-organized and self-healing, providing a transactional replicated storage for small or large scale systems.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2042 ◽  
Author(s):  
Yiming Jiang ◽  
Chenxu Wang ◽  
Yawei Wang ◽  
Lang Gao

With the rapid development of the internet of things (IoT), traditional industries are setting off a massive wave of digitization. In the era of the Internet of Everything, millions of devices and links in IoT pose more significant challenges to data management. Most existing solutions employ centralized systems to control IoT devices, which brings about the privacy and security issues in IoT data management. Recently, blockchain has attracted much attention in the field of IoT due to its decentralization, traceability, and non-tamperability. However, it is non-trivial to apply the current blockchain techniques to IoT due to the lack of scalability and high resource costs. Different blockchain platforms have their particular advantages in the scenario of IoT data management. In this paper, we propose a cross-chain framework to integrate multiple blockchains for efficient and secure IoT data management. Our solution builds an interactive decentralized access model which employs a consortium blockchain as the control station. Other blockchain platforms customized for specific IoT scenarios run as the backbone of all IoT devices. It is equivalent to opening the off-chain channels on the consortium blockchain. Our model merges transactions in these channels for confirmation based on the notary mechanism. Finally, we implement a prototype of the proposed model based on hyperledge Fabric and IOTA Tangle. We evaluate the performance of our method through extensive experiments. The results demonstrate the effectiveness and efficiency of our framework.


Sign in / Sign up

Export Citation Format

Share Document