Вы находитесь на странице: 1из 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/329443844

BlockChain for IoT Security and Management: Current Prospects, Challenges


and Future Directions

Preprint · December 2018


DOI: 10.13140/RG.2.2.26556.49289

CITATIONS READS
0 1,146

4 authors, including:

Shanto Roy Mehedi Hassan


Green University of Bangladesh Islamic University of Technology
23 PUBLICATIONS   22 CITATIONS    4 PUBLICATIONS   0 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

People Identity Verification in Cloud View project

Intelligent of Learning Things (IoLT) View project

All content following this page was uploaded by Shanto Roy on 06 December 2018.

The user has requested enhancement of the downloaded file.


BlockChain for IoT Security and Management:
Current Prospects, Challenges and Future Directions
Shanto Roy∗ , Md. Ashaduzzaman† , Mehedi Hassan ‡ , and Arnab Rahman Chowdhury§
Department of Computer Science and Engineering∗†‡§
Green University of Bangladesh, Dhaka-1207, Bangladesh
Email: shantoroy∗ @ieee.org, asadayon† @gmail.com, mehedi‡ @cse.green.edu.bd, arnab§ @cse.green.edu.bd

Abstract—The paper presents an in detailed case study of in- The primary objectives of this survey are as follows:
tegrating BlockChain (BC) in IoT ecosystems in order to achieve • To analyze the necessity of BlockChain for IoT security,
security and privacy. Since the use in cryptocurrency, BlockChain
has gained tremendous attraction due to the versatile application privacy, integration and management
prospects it raises. As internet of things (IoT) is emerging towards • To discuss the prospects of using BC in IoT ecosystems
the smart city requirements, device or data security seems to be • To raise issues considering different scopes, limitations
a major concern. Therefore, BlockChain based decentralized and and future directions of utilizing BlockChain in sensor
distributed system can meet the privacy preserving management networks
in IoT ecosystems. In this paper, we discuss the necessity of
utilizing BlockChain for IoT security, privacy, management. We The rest of the paper is organized as follows: Section II
present a literature overview of current progresses and security presents an initial overview of BC. Section III discusses the
enhancement in sensor networks using BlockChain; their scope, necessity, requirements and ways of integrating BC in IoT
prospects and limitations as well. Finally, we suggest some future ecosystem. Then Section IV implies the security achievement
directions to indicate further areas of improvement.
in IoT ecosystem due to the integration of BC. Later, Section V
keywords- BlockChain, IoT, Security, Privacy, Authentication
looks into the implications and applications of utilizing BC in
I. I NTRODUCTION different hybrid IoT ecosystems. Finally, Section VI elaborates
the scopes, limitations and future directions following a final
BlockChain is no longer a jargon now-a-days and this concluding section.
system has been adapted through implementation in different
application areas. BC is an open distributed digital ledger sys- II. B LOCK C HAIN OVERVIEW
tem that records immutable timestamp blocks one after another A. Background
within a chain. Every single block is added to the ledger after BlockChain, devised by Satoshi Nakamoto in 2008 [7], is
a mining process that is verified by the participating nodes. an immutable and distributed public ledger of transactions.
This is how BlockChain removes the requirement of a trusted The idea of BC was proposed for Bitcoin to answer the
third party with this distributed record-keeping and verification double-spending problems in crypto currency. BC is composed
system. of a constantly increasing set of information, called blocks.
In recent decade, internet of things aka IoT has emerged The most recent block is added to the BC in sequential
with a view to targeting further automation in systems where order which consists of transaction data, a timestamp and
all nodes, devices and sensor networks are ubiquitously inter- cryptographic hash value of the previous block. Since BC
connected. IoT has made life more easier with smart trans- is a distributed ledger, no individual authority manage the
portation, smart healthcare, smart agriculture and other smart ledger, rather legitimacy of each block is authenticated by
city approaches [1] [2]. As billions of devices are being con- the participating peers. A miner, any peer in the peer-to-peer
nected to the continuously growing networks, security appears network, is accountable for mining blocks for BC by finding
to be a major concern in this arena. Most of the devices are a solution for a computationally exhaustive cryptographic
resource constraint and heavy cryptographic approaches are puzzle called proof-of-work (POW). Newly mined block is
difficult to implement thereby. broadcasted to the all nodes of the network. After verifying
Recent research works show that employing BC seems the block by all the miners, it is added to the BC. After
to be a cure for security concerns regarding IoT [3]. The inclusion of a block in the BC, it is quite arduous work to
present IoT ecosystem is a centralized system where devices modify data from the block because it necessitates to modify
are managed, identified and authenticated centrally that raises all the subsequent blocks. And any block to be attached to
the scalability issue [4]. Therefore, BC provides a distributed a BC it necessitates consensus of the majority nodes of the
authentication and management system that can enforce the network.
privacy and security as well. Deviating from the centralized
system, BC provides automotive security, authentication and B. Design Goal
trust management in both distributed [5] and decentralized [6] 1) Decentralization: BC is decentralized public ledger be-
IoT ecosystem. cause the data is stored across its peer-to-peer network. As
there is no centralized node to store data, BC abolishes the D. BlockChain Structure
vulnerability of single point of failure. Decentralization cuts The structure of different BC systems may differ in element.
off the requirement of a 3rd party as well. Characteristically in the block, it consists of hash value of the
2) Autonomy: No individual entity can control the BC. last generated block, the key data involved in this block, the
To store, transfer or update any data in the BC, it requires value of nonce obtained by solving any consensus algorithm
consensus of the majority of nodes in the network. By adopting such as the PoW or PoS puzzle, a timestamp server and
decentralized consensus technique, it guarantees the reliability other information. Key data of the blocks may differ from
and consistency without requiring any trusted third-party, thus application to application, for example: smart contract records,
providing autonomy. bank transaction records, data from IOT devices, insurance
3) Transparency: BC systems maintain a high level of claim processing data etc. Time stamp data is the proof of
transparency. If any data is required to entry or update into the the user that at the time of each transaction, the bulk of the
ledger, it should be validated and authenticated by the system. participating nodes granted it was first received.
Thats why any fraudulent transactions cannot be included into
the ledger. E. Consensus Algorithms
4) Security: A cryptographic signature distinctive to each In BC system there is no trusted third party authority who
block, and a consensus mechanism, the protocol which the regulates how the system work, how any change or update
nodes in the network validate each block, are the two aspects can be made. Rather all the nodes in the network resolve
which make the system innately secure. Users of the system disagreements or protection against security violations, keep
uses public key cryptography to make a digital signature of its track of the flow of funds and ensure an indisputable exchange
transaction. So if any information is modified, the signature to avoid fraudulent activities. The consensus mechanism is the
will become unacceptable. Being a decentralized system, there process by which all the nodes agree on common content and
is no single point of failure and data can be altered from the message added to the block is correct.
a single place as all the peers in the network store the 1) Proof of Work (PoW): Proof-of-Work (PoW) is a tech-
information. It will require huge amounts of resource intensive nique to finding solution of puzzles which is used to verify the
computing to alter every entity of a fixed BC. trustworthiness of the data. The mathematical puzzles require
5) Collective Verification: In BC model, a particular trans- a lot of computational power to solve. Output of the puzzle is
action is added after it is verified by other participating nodes. a hash which is used to verify any transaction. The nodes who
Collective verification and identification revoke the necessity are responsible for calculating the solution for the PoW called
of a third party in BC based systems. miners. If a miner succeeds to crack the puzzle, the new block
6) Anonymity: It is theoretically intractable to discover the is formed. PoW is a defense mechanism against DoS attack.
identity of real user of an account in BC system because the Because attackers should invest lots of computational power
identity is obscured behind cryptography. BC uses Public Key and time to solve the puzzle. Difficulties of the puzzles are
Cryptography for authenticating users and controlling access. adjusted so that it can limit the rate at which new block can
Changeable Private Key (PK) is used to sign each transaction be generated. It will create a provisional fork in the network
digitally for source authentication and identification by the if several nodes discover a suitable solution at the same time.
users which provides anonymity. In that cases, neighboring nodes accept the blocks which have
7) Privacy: BC system offers a great deal of privacy the longest version of the chain existing at any time.
and security in decentralized peer-to-peer networks. Many 2) Proof of Stake (PoS): The problem of PoW mechanism
promising research like zCash on Ethereum have enhanced is that it takes huge amount of computing power which is
the privacy for BC technology. BC technology has gained its waste of resources and reduced throughput in the entire BC
popularity due to its offering privacy in decentralized network. system. To overcome the problem Proof-of-Stake (PoS) mech-
anism is introduced which doesnt take so much computing
C. Working Procedure power. In this system if any node wants to create a block, it
1) Broadcasting transaction: A transaction requested by needs to pay a certain amount of crypto currency which is
any node is first encrypted using PKs and then broadcasted considered as stake. If the block is validated by the peers of
to a Peer-to-Peer network. the network, the creator of the block get incentives as bonus.
2) Transaction validation: The nodes of the network vali- On the contrary, if the block is not included in the system,
dates the transaction along with authentication of the requester the creator losses some amount of crypto currency. Thus PoS
node using Public Key Cryptography. will provide defense against malicious attacks as attackers will
3) Block validation: All the verified pending transactions lose stake if they fail.
are combined together to form a block and it is broadcasted to There are other more consensus mechanisms such as PoA
the entire network. The block is then validated by the receiving (Proof of Authority), PoET (Proof of Elapsed Time), DPoS
nodes which execute consensus algorithm like Proof-of-Work (Delegated Proof of Stake), PBFT (Practical Byzantine Fault
(PoW) or Proof-of-Stake (PoS) in the block. Tolerance) and so on are used in different BC systems. PoA
4) Appending to BC: A validated block is included in the is slightly different from PoS system where it stakes the real
BC in a stable and irreversible way. identities of the nodes in the system instead of fiscal value.
Permitted BC system uses PoET consensus mechanism. DPoS
depends on a group of delegates to authenticate blocks on
behalf of all nodes in the network. PBFT exploits pre-selected
validators to decide consensus for the network.
F. Types of Blockchains
At present there are three types of BC systems.
1) Public Blockchains: In public BC systems there are no
restrictions on accessing the BC. Anyone can send transaction
and participate in consensus mechanism using internet. Bitcoin
and Ethereum are the two major BC systems which are Public
BC.
2) Private Blockchains: Private BC are restricted in man- Fig. 1. Graphical Time-line of Evolution of BC
ner. If any node wants to join the BC system, an invitation from
the administrator is needed. Participant and validator access is example, in case of Bitcoin or other crypto-currencies mining,
regulated. miners join in a distributed network waiting and competing
3) Consortium BC: There are no individual organization for their chance to solve a puzzle and be able to process the
monitoring it, rather a group of companies respectively func- transaction on first come first serve basis. The computation
tion a node on such a network. So, Consortium BC can be requires additional graphics processor units (GPUs) and as
seen as partially decentralized networks. a result the computational pool requires high end physical
III. B LOCK C HAIN FOR I OT E COSYSTEMS devices. Therefore, we see, cost is the primary limitation that
should be considered while implementing BC in other systems.
A. Prospects of BC with IoT
BC has recently attracted a lot more attention in different C. BlockChain Adaptation
sectors due to its efficiency in a decentralized transparent IoT ecosystems constitute low-end resource limited end
system without involving a third-party. Before looking into devices where BC based crypto currency models can be cus-
deep, let’s discuss about the following research questions- tomized for IoT applications [19]. Adapting BC architecture
• Why BC need to be integrated with IoT? with IoT faces some challenging issues as traditional ones
• What might be the pros and cons while adapting BC in require highly configured computing resources. Therefore,
IoT ecosystems? adaption requires further modification in BC model to adapt
• How to integrate BC with IoT keeping in mind about the IoT ecosystems. First of all consensus model require further
low power resource constraint environments? modifications as present ones are costly in terms of computing
The answer to the first question refers to the requirement resource and energy consumption [20]. Although, BC and IoT
of security enforcement along with identity verification in both comprise a distributed or decentralized system, the design
a decentralized or distributed system. Furthermore, there are goals, scopes and challenges are pretty much different. How-
versatile scopes and opportunities while integrating both tech- ever, considering the opportunities and prospects of applying
nologies [4], [8]–[14]. After the very first implementation BC in IoT motivates to renovate adaptive BC model as BC
of BC in Bitcoin, the design goals attracted researchers to not only just provide additional privacy and security but also
implement transparent open ledger based records in other restrict the requirement of central trustful management system
computing arenas such as cloud computing [14], mobile edge which is less fault tolerant and hard to scale as well [21].
computing [15] [16], fog computing [3] [17] with better
D. BlockChain integration with IoT
optimized frameworks. As IoT is itself a distributed and
decentralized system, researchers became more interested to BC and IoT are emerging technologies that will play a vital
integrate BC with IoT ecosystems. We will discuss the answers role in future networks. Both of the techs have different design
of other research questions in the later parts of this paper. goals, conceptual perspectives and implementation method-
Figure 1 presents a graphical timeline of how BC has been ologies that should be integrated to achieve more secure and
adapting with technologies since its’ birth. efficient systems [21] [22] [23].
[24] introduced a new consensus system named proof
B. Security and Transparency vs Cost of concept (PoC) that substitutes traditional algorithms. The
BlockChain requires a consensus algorithm to ensure agree- proposed work relates a gateway to be the BC node (also a thin
ment on identification and verification in a distributed system. client) through which low-end resource constraint devices can
However, the traditional BC employed in Bitcoin is costly communicate with BC network. Another employed strategies
due to the involvement of crypto puzzle solving process. in IoT ecosystem are proof of trust (PoT) and proof of luck
Moreover, it requires additional computation power. As a result (PoL), introduced by [17], where authors developed a three-
traditional BC is suitable for distributed networks where there tier system ”IoT-Fog-Cloud”. In this work, the communication
are miners to solve these cryptographic puzzles [18]. For is secured using the Trustful Space-Time Protocol (TSTP).
To synchronize, maintain and communicate with thousands cantly compared to the BC implementation used in Bitcoin.
of IoT devices in server-client model, BC technology is used It requires no mining and thus incurs no additional delays in
by [25]. RSA cypto technique is used by the authors where processing generated transactions.
public key is stored in Ethereum, a software based BC tech-
nology to build and deploy decentralized applications where IV. S ECURITY IN BC BASED I OT E COSYSTEM
public key is stored in individual devices. To evaluate the Installation of existing IoT devices vulnerable to privacy
performance and applicability of the proposed work, authors and security concerns. BC strengthen the security of these
developed smart contacts to store data coming for home IoT devices by safeguarding critical security data which is
devices like electric meters and smart phones. a part of GHOST Project [29]. BC is used for security
[26] proposes an architecture for IoT devices based on IoT devices which have low processing capabilities. Network
BC technology upholding security and privacy benefits but security requirements are split into confidentiality, integrity,
reducing bandwidth overheads and delays. As a demonstrative authenticity and availability. Identity management require-
case study for extensive IoT applications, they examined on a ments are separated into authentication, authorization, ac-
smart home application. This lightweight architecture contains countability and revocation. Privacy requirements are split
smart homes, a sensor network ecosystem and cloud storage into data privacy, anonymity, pseudonymity and unlinkability.
that coordinates data transactions with BC using distributed Trust requirements are divided into device, entity, and data
trust methods. trust. Finally, resilience requirements are split into two specific
BC is even used in decentralized IoT ecosystems for secur- issues relating to robustness against attacks and resilience
ing storage using homomorphic computations [27]. Named as against failures.
BeeKeeper the project is able to process data without getting [30] have categorized different security issues depending
known to user’s data. The architecture is also able to increase upon the high-level, intermediate-level, and low-level IoT lay-
additional computation power when new high-end devices ers. For leveraging IoT security at different levels, authors have
participate in the network. Collective verification and tamper scrutinized the mechanism which is suggested by some prolific
proof system delivers a privacy preserving Bc-IoT architecture. literature and provided some possible solution regarding IoT
In [1], a BC-based security framework is proposed to offer a attacks by implementing and mapping possible solution which
protected communication platform in a smart city. There are is proposed in the literature. In addition to that they have
several significant features like as improved trustworthiness, used blockchain techniques to address and solve IoT security
better fault tolerance competency, faster and effective process, problems. Some future research issues and challenges are
scalability are provided by it. also identified which will help the research community to
address security related isuues and provide reliable, efficient,
E. Lightweight BlockChain Design and scalable IoT security solutions.
As PoW is costly in terms of resource and energy, [15] Cyber-physical systems (CPS) have serious security issues,
proposes an edge computing based framework for mobile BC especially in machine-to-machine (M2M) communications.
where authors demand mobile edge computing as the solution Sophisticated BC structure was designed between the public
of solving PoW. area and private area to address the security issues [31]. A cot-
Since block is computationally expensive and it has limited ton spinning production was taken as a case study to validate
scalability it seems complex to adjust in IoT ecosystems. this design. It solves the safety of scalation of machines ef-
While designing lightweight consensus system, [4] proposed a fectively in the production process and secures communication
lightweight BC based system named LSB applying distributed of data between the machines. [32] proposes a self-propelled
throughput management to ensure the self-scalability of the security architecture based on BC for the interconnected smart
network. The mechanism provides security and privacy by ap- vehicular ecosystem. They used emerging automotive services
plying public key cryptography, digital signature and hashing. as a case study to demonstrate the efficiency of the proposed
In LSB, the data flow is kept separated from the transaction architecture. Furthermore, they discusses the robustness of
flow. To protect the overlay against a malicious Overlay Block their architecture against typical security attacks.
Manager (OBM), the authors proposed consensus-period so Security and transparency without requiring a third party
that only one block can be generated at a period and being is the primary attraction of integrating BC with IoT. Se-
adjusted by DTM. curity measurements are primarily concerned with the CIA
Another lightweight BC based architecture for IoT is pro- triad (confidentiality, integrity and availability). The following
posed that virtually eliminates the overheads of classic BC, discussion and Table I reflects the employed strategies for
while maintaining most of its security and privacy benefits different security requirements in recent works.
[28]. High resource devices create an overlay network in order
to implement a publicly accessible distributed BlockChain A. Privacy or Confidentiality
that ensures end-to-end security and privacy. To reduce the In order to maintain the privacy issue, various symmetric
block validation processing time, proposed architecture uses (AES, IDEA) and asymmetric (ECC, RSA) key cryptosystems
distributed trust. Simulations demonstrate that proposed ar- and tokenization [33] have been used widely in each and every
chitecture decreases packet and processing overhead signifi- communication system. Therefore, in case of IoT ecosystem
as well, encryption is the usual way of ensuring confidentiality E. Authorization
of data while communicating each other [4] [8]. In BC based Authorization is another security measurement that refers to
system, nodes can easily acknowledge the identity of other the user privileges over resources such as files, data, services or
nodes within a system and transaction data can be encrypted application module etc. [36] proposes a BC based conceptual
using public key or with a previously shared symmetric key. architecture for mobile communication services that provides
The number of IoT devices per person is increasing so privacy preserving authorization for mobile devices. In this
rapidly that it requires sophisticated security measures. Even work, authors used a registration-confirmation system through
though BC supports integrity and non-repudiation, data is not which a device will get an ID for authorization. Moreover, the
preserved because it can be seen for verification and mining model also ensures reduced pricing and cost for services using
purposes. Hence, Attribute-based encryption (ABE) techniques a single contract based billing system that is independent in
were introduced to slightly change the BC protocol to ensure terms of different wireless communication services. In case
privacy [19]. of smart systems, BC should be lightweight and the blocks
require modifications for additional data. In order to meet that
B. Integrity
requirement, [8] utilized a policy header along with shared
In BC based IoT ecosystem, hash of different fields of a keys for authorization of smart IoT devices in smart home
transaction block is a proper way to maintain data integrity [4] systems.
[8]. In [34], messages are signed with the associated private
key (using Elliptic Curve Digital Signature Algorithm) of the F. Access Control
corresponding node to ensure trust and data integrity. Proof of A distributed trustworthy access control is required in IoT
Trust (PoT) has been used in a multi-tier based IoT ecosystem ecosystems. Without proper access control the whole network
for data integrity verification [17]. become vulnerable to initiate protection mechanism against
In [35], a framework based on BC technology is proposed malicious attacks. A smart-contract based access control mech-
for Data Integrity Service which provide more trustworthy data anism provides solution to the addressed problem [37]. The
integrity authentication for the IoT data of both the data owners access control proposed by authors is primarily based on the
and data consumers. This framework doesnt rely on Third Ethereum smart contract for decentralized application platform
Party Auditors for the verification of data integrity which may [38].
compromise credibility. Moreover, it provides some benefits
like no individual party can diminish the process, enhancement G. Identity Verification
of efficacy of data integrity verification with growing number Cyber-security in the IoT seems to be a major concern
of clients, maintenance of trading data with data consumers, since number of interconnected devices is increasing expo-
and implementation of pay per transaction Data Integrity nentially. BC provides scalability, heterogeneity and mobility
Service. that requires initiating new identity management operations
in distributed and trustless environments. It is also necessary
C. Availability to uniquely identify a particular device based on its intrinsic
Availability in IoT ecosystem largely depends on handling digital properties. BC-based Identity Framework for IoT (BI-
the requests from only authorized nodes in a trusted envi- FIT) achieves identity self-management by end users by au-
ronment so that malicious requests can be discarded [4] [8]. tonomously extracting appliances signatures and creating BC-
DDoS attack in a BC based system is almost impossible based identifiers for their appliance owners [39]. It correlates
if the participating nodes in a network is authenticated and the appliance signatures aka low-level identities and owners
authorized; making it difficult to enter in the network by identities as well with a view to using them in authentication
masquerading. management process within the IoT ecosystem.

D. Authentication H. Non-repudiation
BC provides authentication by default as the whole system The concept of non-repudiation refers to the transparent
is decentralized and every node or member in the network is transaction logging system acknowledged by both parties. In
verified by others. In smart home systems, a lightweight BC a public BC based IoT system, all the transactions are logged
system proposed by [4] enforces all the nodes to have a stored and recorded in the public ledger so that no one can deny the
genesis transaction in the BC for authentication. A particular completion of a transaction [4].
node is authenticated if it has the private key corresponding to
V. I MPLICATION OF INTEGRATING B LOCK C HAIN
the public key of a transaction stored previously in the genesis
transaction. As it is quite difficult to build an efficient cen- A. Cloud and IoT Ecosystem
tralized authentication system, [34] proposed a decentralized Cloud, fog and edge computing are the associated central-
system named- Bubble of Trust; to identify and authenticate ized frameworks for managing IoT devices and data. [15]
nodes in BC based IoT ecosystem. A node uses a ticket during proposes an edge computing based framework for mobile BC
initialization to authenticate itself and an object ID signed by to solve PoW keeping in mind about the energy profiling for
its private key is used for identification. mining [40]. Considering a multi-tier system [3] Fog node
TABLE I
E MPLOYED STRATEGIES FOR S ECURITY REQUIREMENTS IN BC BASED I OT E COSYSTEMS

Requirement Employed Strategies References


Confidentiality Different lightweight symmetric and asymmetric encryption systems are implemented to ensure privacy of all [4] [8]
transactions.
Integrity Hash of different field in a block is used to verify the integrity of transactions. Proof of Trust is another solution [4] [8] [34] [17] [35]
to verify integrity in multi-tier systems.
Availability Availability is achieved through proper authentication and authorization so that malicious outsider cannot cause [4] [8] [25]
potential attacks by entering in the network.
Authentication BC provides authentication in decentralized system by identifying stored corresponding keys in a transaction [4] [34]
process while being recorded in the open ledger. Authentication can also be achieved using ticket or token
management system.
Authorization Registration management in BC, policy headers and shared keys etc. provide authorization for current IoT [8] [36]
ecosystems.
Non-repudiation Transparent logging in public BC records every transaction so that none of the party can deny. [4]
Access Control Smart contract based access control mechanisms are required. [8] [37] [38]

works as middle layer integrating IoT and cloud. [17] utilizes a technology that creates a network among vehicles which
PoT and PoL in IoT and Fog respectively that ensures an allows them to discover and share their information to produce
overall integration of BC in the entire network. Even mobile value-added services. In near future, authors will concentrate
computing for mobichain (for BC based secure transaction) on sharing economy of mobile vehicles and try to integrate
seems to be a good solution in M-Commerce [16]. the BC technology with wearable devices.
In [41] the authors propose a system design for IoT, based
on BC which conveys a fine-grained access control and data C. Smart Home
management of time- series sensor data of numerous IoT At present, every smart home is equipped with high-end
applications. This system provide a secure and robust access devices connected altogether that act as miners in a BC based
control management and assistance of the storage of time- smart home system [8]. The authors demonstrate about four
series IoT data at the brink of the network via a locality- core components in smart home to implement the mechanism-
aware decentralized storage system. [14] discussed on a model transactions, local BC, home miner, and local storage. Using
named ChainAnchor that helps commissioning an IoT device layered security various attacks including DDoS are prevented
into a cloud ecosystem. It has autonomous registration pro- in smart homes. The architecture seems energy efficient as the
cess along with device manufacturing provenance information encryption and hashing are done by only selected miners.
anonymously.
D. Smart Healthcare
B. Smart Transport Healthcare and online patient monitoring [44] can be inte-
Internet of Vehicles (IoV) or smart transport using BC grated with BC within a trusted network [45] [46]. This helps
[32] encompasses connected vehicle services like vehicle to maintain privacy & security of patients data and to ensure
management, infotainment, driving assistance, safety, traffic risk control as well [47].
management and data communication between nodes. Many
mishaps can be prevented and lives can be saved by the E. Smart Agriculture
efficient communication. Hence, including only the authen- Smart food supply chain is a part of smart agriculture and it
ticated nodes in the network in order to prevent malicious needs transparent information management with transparency,
activities like tampering the emergency message or sending neutrality, reliability and security [48]. Authors proposed a
false information by using the promising and evolving BC traceable BC based food supply chain for real-time food
technology [42]. Smart contract feature of BC can perform any tracing. Environmental monitoring is another essential part in
specific task when triggered. It can provide real-time update. ICT E-agriculture at local and regional scale [49].
Decentralized structure makes it more secure, efficient and
accurate. It is assumed that Using BC in transportation can F. Smart Industry
eliminate the involvement of third party in the utilization of Autonomous transactions of data from machine to machine
private transport and ride sharing. in industrial system require BC to ensure transparency of
While examining the application of the ad-hoc vehicular exchanged data [50]. As IoT already have tremendous impact
communication network, [43] found that the existing systems over industry, merging BC with IoT can provide trusted
are incapable of supporting some remarkable features of ad- open network delivering suitable output to enhance production
hoc vehicular network. Block-VN model, a new distributed [13]. Also, cloud based platforms that require mobile cloud
BC architecture is proposed by the authors to address the processing like photo ID verifications [51] will achieve more
prodigious features of vehicular network. Block-VN is such transparency using BC based architectures.
G. Smart Grid the trust issues between application customers and network
For secure energy trading, [52] proposed a transaction operations. A BC technology based solution is proposed to
handling mechanism named EnergyChain that eradicates tra- build an open, trusted, decentralized and tamper-proof system
ditional third party based system that predefines a particular for LoRaWAN which provides the indisputable mechanism to
miner to process all the transactions, block creation and block verify that the data of a transaction has existed at a specific
validation. Smart grids should be cost effective as well [53]. time in the network [57].
[6] deals with peer authentication and trust management
VI. D ISCUSSION issues in the framework of Wireless Sensor Networks. They
propose a BC-based model to strengthen legitimacy and verac-
A. Scope
ity of cryptographic authentication data and subordinate peer
1) Integrating Centralized and Decentralized Systems: trust level in WSN.
Recent works on BC shows potentiality in merging central- 4) Shared Economic Applications: Shared economy ap-
ized and decentralized systems making it a hybrid highly plications are becoming popular day by day. We have seen
distributed networks. Both centralization and decentralization enormous success of Airbnb, an online market place and
has their own pros and cons. Therefore, it is wise to integrate hospitality service center and Uber, a peer-to-peer ride sharing,
the advantages of both with a view to building an efficient taxi cab, food delivery, and transportation network company
network. [58]. To establish the shared economy application service more
A hierarchical distributed control system model for edge reliable, organize and secure, IoT and BC technology can be
computing were proposed by [54]. They have inspected the used for the greater instinct. Communication and collection
IEC 61499 standard for distributed control systems, and have of data from sensor and mobile devices and exchanging
proposed the current research regarding the operation of information among IoT devices will be more reliable, fast and
function blocks as smart contracts performed by the BC on cost effective thereby. Moreover, combining BC with IoT will
a management level. create a secure shared economy distributed application.
2) SDN based BlockChain: Two emerging technologies: 5) Customization in Service Provision: Using BC in mobile
SDN and blockchains have been merged to mitigate some communication can reduce the cost of total system and shares
issues such as flexibility, efficiency, availability, security which the cost with the stakeholders [36]. It reduces the risk of
is escalated in IoT network. DistBlockNet [55], a distributed traceability of a users service use. It also provides several
secure SDN architecture using the blockchain technology has communication services to users considering their level of use.
been proposed by the authors. In order to update, verify and
validate the flow rules for the IoT forwarding devices, authors B. Limitations
have proposed a new scheme using the blockchain technology The scope and application opportunity of BC is vast due
where security is automatically adapted without the review of to the convenience of decentralization management and trans-
administrator. Authors have analyzed their proposed work with parency. However, BC is still in it’s infancy period and need
existing one by changing computational metrics and found more research works. Except a few proposed BC system, most
that DistBlockNet is capable of detecting attacks in the IoT are costly in terms of processing, maintenance and power
network in real time with low performance overheads. consumption [29]. Moreover, there are typical scaling issues as
Research shows that, in this era of software defined net- well. In some cases, it just seems that sometimes centralized
working (SDN) and machine learning (ML), BC based IoT maintenance is better than the decentralized ones. Although
ecosystems can achieve high level of security [56] by adapting some research proposes the hybrid utilization as a solution.
to new threat models. Security is another important aspect to keep in mind while
3) Wireless radio network: BC is being utilized in wireless designing BC based systems. Moreover, the so-called 51%
mobile networks as well. A new conceptual architecture has attack seems to be a serious threat to BC based systems
been proposed for authorization of mobile services [36]. It [59]. In this attack, if a node possesses 51% of the overall
separates mobile communication infrastructure and billing computational power, it can tamper the consensus system.
functions and multiple use of mobile communications using However, that is another reason BC should be developed
BC technologies. [57] suggested a conceptual BC based model differently for IoT ecosystem. Furthermore, Due to the versa-
for low power wide area (LPWA) network to address solution tile connectivity and tamper-able environment, various attacks
towards two particular problems- trust of the private network can be drawn over IoT ecosystems varying from smart home
operators and lack of network coverage. The open distributed to industrial automation. However, current research findings
and tamper-proof system provides ensured verifications of include different protection mechanisms as well in the papers.
transaction within a trusted low-end wireless devices network.
In various LPWA technologies, Narrow Band IoT (NB- C. Future Research Directions
IoT) and long range (LoRa) are two main leading competitive 1) Security and Privacy: Several security issues were in-
technologies. NB-IoT network is built and managed by mo- troduced by [4] [60] [56] where they discussed about the
bile operators while LoRa is operated by private companies possible threats including DDoS and linking attack on BC
or organizations. These two comepetitve technologies bring based smart systems. The papers also referred to particular
protection strategies to the individual vulnerabilities. However, ACKNOWLEDGEMENTS
the security arena still requires a lot more contributions in This work has been partially supported by Green University
order to achieve a decentralized trustworthy system. There are of Bangladesh research fund.
further areas to improve as well.
2) Adaptation to S-MQTT/CoAP: Currently there are some L IST OF A BBREVIATIONS
popular communication protocols that are being used widely ABE Attribute Based Encryption
in IoT ecosystems for device-to-device connection. The im- AES Advanced Encryption Standard
provement and new development of lightweight encryption
BC BlockChain
algorithms are required to ensure the security of the BC. It is
also required to design and develop consensus system in hybrid CoAP Constrained Application Protocol
(both centralized and decentralized) mining environment that ECC Elliptic Curve Cryptography
will be able to adapt the secure MQTT or CoAP protocols. IDEA International Data Encryption Algorithm
3) Connectivity and Scaling: Scalability issues should be
IoT Internet of Things
solved in parallel BC [36]. In recent works, scalability was
always found to be a issue that needs immediate efficient so- MQTT Message Queuing Telemetry Transport
lutions. Some works just referred to particular miners selected PoS/W/T/C/L Proof of Stake/Work/Trust/Concept/Luck
previously. However, in these cases, the architecture seem RSA Rivest Shamir Adleman
to be more similar with any centralized system. Some other
works identified inefficiency in performance in the network R EFERENCES
(e.g. less transaction per time) while more devices are being [1] K. Biswas and V. Muthukkumarasamy, “Securing smart cities using
added. Therefore, scalability with trusted connectivity without blockchain technology,” in High Performance Computing and Com-
munications; IEEE 14th International Conference on Smart City;
degrading any performance requires more research attentions. IEEE 2nd International Conference on Data Science and Systems
4) Energy Consumption & Resource Allocation: Although, (HPCC/SmartCity/DSS), 2016 IEEE 18th International Conference on.
there are different approaches to avoid energy consumption in IEEE, 2016, pp. 1392–1393.
[2] T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the use of
BC based systems [40] [24], they are still inefficient in com- blockchain for the internet of things,” IEEE Access, 2018.
parison with the performances provided by lower end devices. [3] J. C. Song, M. A. Demir, J. J. Prevost, and P. Rad, “Blockchain design
High-processing BC nodes to increase the resilience of IoT for trusted decentralized iot networks,” in 2018 13th Annual Conference
on System of Systems Engineering (SoSE). IEEE, 2018, pp. 169–174.
installations directly impacts the total energy consumption of [4] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Lsb: A
the system [29]. It can be kept at moderated levels if only a lightweight scalable blockchain for iot security and privacy,” arXiv
limited amount of BC nodes is used and if a lower difficulty for preprint arXiv:1712.02969, 2017.
[5] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak, “Blockchain: A
the mining algorithm is selected. It is also mandatory to reduce distributed solution to automotive security and privacy,” IEEE Commu-
computational overhead while using different cryptosystems nications Magazine, vol. 55, no. 12, pp. 119–125, 2017.
e.g. ABE techniques in BC powered-IoT [19]. [6] A. Moinet, B. Darties, and J.-L. Baril, “Blockchain based trust
& authentication for decentralized sensor networks,” arXiv preprint
5) BlockChain Standardization: Presents work propose dif- arXiv:1706.01730, 2017.
ferent architectures to meet their requirements. A standard [7] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
model should be proposed for overall IoT ecosystem. [8] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for
iot security and privacy: The case study of a smart home,” in Pervasive
6) BlockChain model Optimization: BC model optimiza- Computing and Communications Workshops (PerCom Workshops), 2017
tion involves redesign and development of the model in order IEEE International Conference on. IEEE, 2017, pp. 618–623.
to adapt IoT ecosystems. Considering all the odds and diffi- [9] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for
the internet of things,” Ieee Access, vol. 4, pp. 2292–2303, 2016.
culties of using BC should attract more research works. Smart [10] M. Conoscenti, A. Vetro, and J. C. De Martin, “Blockchain for the inter-
contract script technology can be used to define automated net of things: A systematic literature review,” in Computer Systems and
trading model in the IoT network. In wireless sensor networks Applications (AICCSA), 2016 IEEE/ACS 13th International Conference
of. IEEE, 2016, pp. 1–6.
fully-scaled LoRaWAN blockchain network can be built to link [11] N. Kshetri, “Can blockchain strengthen the internet of things?” IT
customers gateways and application servers. Professional, vol. 19, no. 4, pp. 68–72, 2017.
[12] S. Underwood, “Blockchain beyond bitcoin,” Communications of the
VII. C ONCLUSION ACM, vol. 59, no. 11, pp. 15–17, 2016.
[13] A. Bahga and V. K. Madisetti, “Blockchain platform for industrial
Having a distributed nature by default, the IoT ecosystem internet of things,” Journal of Software Engineering and Applications,
has a wider scope of using BC for it’s security achieve- vol. 9, no. 10, p. 533, 2016.
[14] T. Hardjono and N. Smith, “Cloud-based commissioning of constrained
ment purpose. Along with the autonomous authentication and devices using permissioned blockchains,” in Proceedings of the 2nd
verification process in a decentralized system, other security ACM International Workshop on IoT Privacy, Trust, and Security.
concerns can be meet by implementing a lightweight BC ACM, 2016, pp. 29–36.
[15] Z. Xiong, Y. Zhang, D. Niyato, P. Wang, and Z. Han, “When mobile
system. The BC model that needs to be adapted with IoT, blockchain meets edge computing: challenges and applications,” arXiv
needs modification in the verifying process as the traditional preprint arXiv:1711.05938, 2017.
consensus algorithms seem costly compared to the resources [16] K. Suankaewmanee, D. T. Hoang, D. Niyato, S. Sawadsitang,
P. Wang, and Z. Han, “Performance analysis and application of mobile
a sensor network have. Also, design of a standard integration blockchain,” in 2018 International Conference on Computing, Network-
of different ecosystems require further research attentions. ing and Communications (ICNC). IEEE, 2018, pp. 642–646.
[17] C. Machado and A. A. M. Fröhlich, “Iot data integrity verification for [39] X. Zhu, Y. Badr, J. Pacheco, and S. Hariri, “Autonomic identity frame-
cyber-physical systems using blockchain,” in 2018 IEEE 21st Interna- work for the internet of things,” in Cloud and Autonomic Computing
tional Symposium on Real-Time Distributed Computing (ISORC). IEEE, (ICCAC), 2017 International Conference on. IEEE, 2017, pp. 69–79.
2018, pp. 83–90. [40] S. Sankaran, S. Sanju, and K. Achuthan, “Towards realistic energy pro-
[18] J. A. Kroll, I. C. Davey, and E. W. Felten, “The economics of bitcoin filing of blockchains for securing internet of things,” in 2018 IEEE 38th
mining, or bitcoin in the presence of adversaries,” in Proceedings of International Conference on Distributed Computing Systems (ICDCS).
WEIS, vol. 2013, 2013, p. 11. IEEE, 2018.
[19] Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kon- [41] H. Shafagh, L. Burkhalter, A. Hithnawi, and S. Duquennoy, “Towards
doz, “Privacy-preserving blockchain based iot ecosystem using attribute- blockchain-based auditable storage and sharing of iot data,” in Proceed-
based encryption,” in 2017 IEEE International Conference on Advanced ings of the 2017 on Cloud Computing Security Workshop. ACM, 2017,
Networks and Telecommunications Systems (ANTS). IEEE, 2017, pp. pp. 45–50.
1–6. [42] A. Arora and S. K. Yadav, “Block chain based security mechanism for
[20] W. Wang, D. T. Hoang, Z. Xiong, D. Niyato, P. Wang, P. Hu, and internet of vehicles (iov),” 2018.
Y. Wen, “A survey on consensus mechanisms and mining management [43] P. K. Sharma, S. Y. Moon, and J. H. Park, “Block-vn: A distributed
in blockchain networks,” arXiv preprint arXiv:1805.02707, 2018. blockchain based vehicular network architecture in smart city,” Journal
[21] M. Banerjee, J. Lee, and K.-K. R. Choo, “A blockchain future for of Information Processing Systems, vol. 13, no. 1, p. 84, 2017.
internet-of-things security: a position paper,” Digital Communications [44] S. Roy, A. Rahman, M. Helal, M. S. Kaiser, and Z. I. Chowdhury,
“Low cost rf based online patient monitoring using web and mobile
and Networks, 2017.
applications,” in Informatics, Electronics and Vision (ICIEV), 2016 5th
[22] M. A. Walker, A. Dubey, A. Laszka, and D. C. Schmidt, “Platibart: International Conference on. IEEE, 2016, pp. 869–874.
a platform for transactive iot blockchain applications with repeatable [45] M. Mettler, “Blockchain technology in healthcare: The revolution starts
testing,” in Proceedings of the 4th Workshop on Middleware and here,” in e-Health Networking, Applications and Services (Healthcom),
Applications for the Internet of Things. ACM, 2017, pp. 17–22. 2016 IEEE 18th International Conference on. IEEE, 2016, pp. 1–3.
[23] E. F. Jesus, V. R. Chicarino, C. V. de Albuquerque, and A. A. d. A. [46] A. Ekblaw, A. Azaria, J. D. Halamka, and A. Lippman, “A case study for
Rocha, “A survey of how to use blockchain to secure internet of things blockchain in healthcare:medrec prototype for electronic health records
and the stalker attack,” Security and Communication Networks, vol. and medical research data,” in Proceedings of IEEE open & big data
2018, 2018. conference, vol. 13, 2016, p. 13.
[24] K. R. Özyılmaz and A. Yurdakul, “Integrating low-power iot devices [47] X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare data
to a blockchain-based infrastructure: work-in-progress,” in Proceedings gateways: found healthcare intelligence on blockchain with novel privacy
of the Thirteenth ACM International Conference on Embedded Software risk control,” Journal of medical systems, vol. 40, no. 10, p. 218, 2016.
2017 Companion. ACM, 2017, p. 13. [48] F. Tian, “A supply chain traceability system for food safety based on
[25] S. Huh, S. Cho, and S. Kim, “Managing iot devices using blockchain haccp, blockchain & internet of things,” in Service Systems and Service
platform,” in Advanced Communication Technology (ICACT), 2017 19th Management (ICSSSM), 2017 International Conference on. IEEE, 2017,
International Conference on. IEEE, 2017, pp. 464–467. pp. 1–6.
[26] A. Dorri, S. S. Kanhere, and R. Jurdak, “Blockchain in internet of things: [49] Y.-P. Lin, J. R. Petway, J. Anthony, H. Mukhtar, S.-W. Liao, C.-F.
challenges and solutions,” arXiv preprint arXiv:1608.05187, 2016. Chou, and Y.-F. Ho, “Blockchain: The evolutionary next step for ict
[27] L. Zhou, L. Wang, Y. Sun, and P. Lv, “Beekeeper: A blockchain-based e-agriculture,” Environments, vol. 4, no. 3, p. 50, 2017.
iot system with secure storage and homomorphic computation,” IEEE [50] J. Mattila, T. Seppälä, C. Naucler, R. Stahl, M. Tikkanen, A. Bådenlid,
Access, 2018. J. Seppälä et al., “Industrial blockchain platforms: An exercise in use
[28] A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an optimized case development in the energy industry,” The Research Institute of the
blockchain for iot,” in Proceedings of the Second International Confer- Finnish Economy, Tech. Rep., 2016.
ence on Internet-of-Things Design and Implementation. ACM, 2017, [51] A. R. Shovon, S. Roy, T. Sharma, and M. Whaiduzzaman, “A restful
pp. 173–178. e-governance application framework for people identity verification in
[29] C. S. Kouzinopoulos, G. Spathoulas, K. M. Giannoutakis, K. Votis, cloud,” in International Conference on Cloud Computing. Springer,
P. Pandey, D. Tzovaras, S. K. Katsikas, A. Collen, and N. A. Nijdam, 2018, pp. 281–294.
“Using blockchains to strengthen the security of internet of things,” in [52] S. Aggarwal, R. Chaudhary, G. S. Aujla, A. Jindal, A. Dua, and
International ISCIS Security Workshop. Springer, 2018, pp. 90–100. N. Kumar, “Energychain: Enabling energy trading for smart homes using
[30] M. A. Khan and K. Salah, “Iot security: Review, blockchain solutions, blockchains in smart grid ecosystem,” in Proceedings of the 1st ACM
and open challenges,” Future Generation Computer Systems, vol. 82, MobiHoc Workshop on Networking and Cybersecurity for Smart Cities.
ACM, 2018, p. 1.
pp. 395–411, 2018.
[53] F. Lombardi, L. Aniello, S. De Angelis, A. Margheri, and V. Sassone, “A
[31] S. Yin, J. Bao, Y. Zhang, and X. Huang, “M2m security technology of blockchain-based infrastructure for reliable and cost-effective iot-aided
cps based on blockchains,” Symmetry, vol. 9, no. 9, p. 193, 2017. smart grids,” 2018.
[32] Y. Yuan and F.-Y. Wang, “Towards blockchain-based intelligent trans- [54] A. Stanciu, “Blockchain based distributed control system for edge
portation systems,” in Intelligent Transportation Systems (ITSC), 2016 computing,” in Control Systems and Computer Science (CSCS), 2017
IEEE 19th International Conference on. IEEE, 2016, pp. 2663–2668. 21st International Conference on. IEEE, 2017, pp. 667–671.
[33] S. Roy, A. R. Shovon, and M. Whaiduzzaman, “Combined approach [55] P. K. Sharma, S. Singh, Y.-S. Jeong, and J. H. Park, “Distblocknet: a
of tokenization and mining to secure and optimize big data in cloud distributed blockchains-based secure sdn architecture for iot networks,”
storage,” in Humanitarian Technology Conference (R10-HTC), 2017 IEEE Communications Magazine, vol. 55, no. 9, pp. 78–85, 2017.
IEEE Region 10. IEEE, 2017, pp. 83–88. [56] F. Restuccia, S. DOro, and T. Melodia, “Securing the internet of things
[34] M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of in the age of machine learning and software-defined networking,” IEEE
trust: A decentralized blockchain-based authentication system for iot,” Internet of Things Journal, 2018.
Computers & Security, vol. 78, pp. 126–142, 2018. [57] J. Lin, Z. Shen, C. Miao, and S. Liu, “Using blockchain to build trusted
[35] B. Liu, X. L. Yu, S. Chen, X. Xu, and L. Zhu, “Blockchain based data lorawan sharing server,” International Journal of Crowd Science, vol. 1,
integrity service framework for iot data,” in Web Services (ICWS), 2017 no. 3, pp. 270–280, 2017.
IEEE International Conference on. IEEE, 2017, pp. 468–475. [58] S. Huckle, R. Bhattacharya, M. White, and N. Beloff, “Internet of things,
[36] S. Kiyomoto, A. Basu, M. S. Rahman, S. Ruj, D. Kim, J. Yun, S. Kim, blockchain and shared economy applications,” Procedia computer sci-
N. Farooqi, A. A. Alotaibi, and M. C. Angelides, “On blockchain-based ence, vol. 98, pp. 461–466, 2016.
authorization architecture for beyond-5g mobile services.” [59] D. Bradbury, “The problem with bitcoin,” Computer Fraud & Security,
[37] Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan, “Smart vol. 2013, no. 11, pp. 5–8, 2013.
contract-based access control for the internet of things,” arXiv preprint [60] N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of attacks on ethereum
arXiv:1802.04410, 2018. smart contracts (sok),” in Principles of Security and Trust. Springer,
[38] V. Buterin et al., “A next-generation smart contract and decentralized 2017, pp. 164–186.
application platform,” white paper, 2014.

View publication stats

Вам также может понравиться