Corpus ID: 237513608

Anti-Tamper Protection for Internet of Things System Using Hyperledger Fabric Blockchain Technology

@article{Iftekhar2021AntiTamperPF,
  title={Anti-Tamper Protection for Internet of Things System Using Hyperledger Fabric Blockchain Technology},
  author={Adnan Iftekhar and Xiaohui Cui},
  journal={ArXiv},
  year={2021},
  volume={abs/2109.07074}
}
  • Adnan Iftekhar, Xiaohui Cui
  • Published 15 September 2021
  • Computer Science
  • ArXiv
Automated and industrial Internet of Things (IoT) devices are increasing daily. As the number of IoT devices grows, the volume of data generated by them will also grow. Managing these rapidly expanding IoT devices and enormous data efficiently to be available to all authorized users without compromising its integrity will become essential in the near future. On the other side, many information security incidents have been recorded, increasing the requirement for countermeasures. While… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 33 REFERENCES
Towards Secure and Decentralized Sharing of IoT Data
TLDR
A new framework named Sash is proposed that couples IoT platforms with blockchain that provides a number of advantages compared to state of the art and devise a "data marketplace" by leveraging the ability of blockchains to handle financial transaction and providing "by design" remuneration to data producers. Expand
Blockchain for the IoT and industrial IoT: A review
TLDR
The basic structure and main features of blockchain are introduced and the security requirements to develop IoT and Industry 4.0 are summarized and some recommendations are proposed to guide future blockchain researchers and developers. Expand
Hyperledger Fabric Access Control System for Internet of Things Layer in Blockchain-Based Applications
TLDR
This work integrates the Hyperledger Fabric blockchain and IoT devices to demonstrate the access control and establish the root of trust for IoT devices, and successfully assess theHyperledger fabric blockchain implementation and access control mechanism on the ARM64 architecture. Expand
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
TLDR
This survey systematically study the three primary technology Machine learning(ML), Artificial intelligence (AI), and Blockchain for addressing the security issue in IoT. Expand
Blockchain-based IoT device identification and management in 5G smart grid
TLDR
This work investigates the unified coding and identification of smart grid IoT devices, as more and more IoT devices in smart grid need to be managed and controlled and proposes a hybrid blockchain mechanism based on 5G MEC smart grid, where both public blockchain and private blockchain are deployed on the MEC gateway/server. Expand
Research on Multidomain Authentication of IoT Based on Cross-Chain Technology
TLDR
The blockchain cross-chain technology is introduced into the cross-domain authentication process of the IoT and an effective cross- domains authentication scheme is proposed based on the improved PBFT algorithm. Expand
Blockchain Based Data Integrity Service Framework for IoT Data
TLDR
A blockchain-based framework for Data Integrity Service is proposed, under which a more reliable data integrity verification can be provided for both the Data Owners and the Data Consumers, without relying on any Third Party Auditor (TPA). Expand
When Internet of Things Meets Blockchain: Challenges in Distributed Consensus
TLDR
The basic concept of blockchain is introduced and illustrating why a consensus mechanism plays an indispensable role in a blockchain enabled IoT system, and two mainstream DAG based consensus mechanisms, the Tangle and Hashgraph, are reviewed to show why DAG consensus is more suitable for IoT system than PoW and PoS. Expand
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things
TLDR
This work proposes xDBAuth, a decentralized Blockchain (BC) based permission delegation and access control framework for the Internet of Things (IoT), and proposes a hierarchy of local and global smart contracts that perform permission delegationand access control for both internal and external user/IoTs devices. Expand
Blockchain data-based cloud data integrity protection mechanism
TLDR
The blockchain-based integrity protection framework is built by the virtual machine proxy model, and the unique hash value corresponding to the file generated by the Merkel hash tree is used to monitor the data change by means of the smart contract on the blockchain. Expand
...
1
2
3
4
...