Blockchain in internet of things: Challenges and Solutions
@article{Dorri2016BlockchainII, title={Blockchain in internet of things: Challenges and Solutions}, author={Ali Dorri and Salil S. Kanhere and Raja Jurdak}, journal={ArXiv}, year={2016}, volume={abs/1608.05187} }
The Internet of Things IoT is experiencing exponential growth in research and industry, but it still suffers from privacy and security vulnerabilities. [] Key Method The described method is investigated on a smart home application as a representative case study for broader IoT applications. The proposed architecture is hierarchical, and consists of smart homes, an overlay network and cloud storages coordinating data transactions with BC to provide privacy and security.
285 Citations
Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure
- Computer ScienceArXiv
- 2020
This paper applies a BC technology known as Hyperledgder Fabric, to an IoT network, and introduces an execute-order technique for transactions that separates the transaction execution from consensus, resulting in increased efficiency and security protection.
Integration of Blockchain and IoT: An Enhanced Security Perspective
- Computer ScienceArXiv
- 2020
This paper explores the applicability ofBC for ensuring enhanced security and privacy in the IoT ecosystem and assesses the implementation of BC for IoT Security and identifies associated challenges and proposes solutions for BC enabled enhanced security for the IoTcosystem.
Enhancing IoT Security and Privacy Using Distributed Ledgers with IOTA and the Tangle
- Computer Science2019 6th International Conference on Signal Processing and Integrated Networks (SPIN)
- 2019
This paper lays out an architecture for incorporating a concept similar to Blockchain - the technology that underpins the cryptocurrency Bitcoin and many other cryptocurrencies to provide decentralized security and privacy for IoT devices.
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things
- Computer ScienceIEEE Wireless Communications
- 2018
This article investigates typical security and privacy issues in IoT and develops a framework to integrate blockchain with IoT, which can provide great assurance for IoT data and various functionalities and desirable scalability including authentication, decentralized payment, and so on.
Lightweight Blockchain to Improve Security and Privacy in Smarthome
- Computer Science
- 2020
This work provides lightweight BlockChain with two prominent consensus mechanism PoW – Proof of Work and PoS – proof of Stake for smart IoT devices and Smart Home Device is ensures providing best-in-class Security and Privacy for smart home Appliances.
Blockchain for IoT security and privacy: The case study of a smart home
- Computer Science2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
- 2017
This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
A Study on Leveraging Blockchain Technology for IoT Security Enhancement
- Computer Science2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA)
- 2018
The adoption of IoT in various fields and its applications to automate and improve living conditions, along with security and privacy risks arising from organization and functioning of different IoT components are reviewed.
Sliding Window Blockchain Architecture for Internet of Things
- Computer ScienceIEEE Internet of Things Journal
- 2020
A sliding window blockchain (SWBC) architecture is proposed that modifies the traditional blockchain architecture to suit IoT applications and increases security and minimizes memory overhead while consuming fewer resources.
Blockchain-based security management of IoT infrastructure with Ethereum transactions
- Computer ScienceIran J. Comput. Sci.
- 2019
This paper brings forward a new definitive, intimate, and lightweight masonry for IoT-based blockchain technology which forsakes the memory overhead and centralized system, while security and privacy benefits are maintaining.
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things
- Computer ScienceSensors
- 2021
The development of an integrated IoT system implementing the permissioned blockchain Hyperledger Fabric (HLF) to secure the edge computing devices by employing a local authentication process and the proposed model provides traceability for the data generated by the IoT devices.
References
SHOWING 1-10 OF 16 REFERENCES
Privacy and Security Challenges in Internet of Things
- Computer ScienceICDCIT
- 2015
This paper discusses security and privacy challenges in IoT scenarios and applications with special emphasis on resource-constrained environments' security objectives and privacy requirement, and proposes a generic construction of secure protocol suitable for constrained environments with respect to IoT scenariosand applications.
Privacy-Aware Authentication in the Internet of Things
- Computer ScienceCANS
- 2015
This work builds upon the idea of an RFID-based IoT realized by means of standardized and well-established Internet protocols and demonstrates how the IPsec standard can be applied in a privacy-aware manner.
Smart Locks: Lessons for Securing Commodity Internet of Things Devices
- Computer ScienceAsiaCCS
- 2016
This work examines the security of home smart locks: cyber-physical devices that replace traditional door locks with deadbolts that can be electronically controlled by mobile devices or the lock manufacturer's remote servers and proposes several defenses that mitigate the attacks.
IoT-Privacy: To be private or not to be private
- Computer Science2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
- 2014
A privacy management scheme that enables the user to estimate the risk of sharing private data like smart meter data is proposed and robust sensitivity detection, analysis and privacy content quantification scheme from statistical disclosure control aspect and information theoretic model is developed.
openPDS: Protecting the Privacy of Metadata through SafeAnswers
- Computer SciencePloS one
- 2014
The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and…
Bitcoin: A Peer-to-Peer Electronic Cash System
- Computer Science
- 2008
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
Bitcoin meets strong consistency
- Computer Science, MathematicsICDCN
- 2016
This paper proposes a new system, PeerCensus, which acts as a certification authority, manages peer identities in a peer-to-peer network, and ultimately enhances Bitcoin and similar systems with strong consistency.
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
- Computer ScienceIEEE Communications Magazine
- 2015
This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC, and shows that an insider attack can cause significant instability in the CACC vehicle stream.
Introduction to Cryptography
- Computer Science2005 International Conference on Microelectronics
- 2005
In today's world of communications it is very necessary to implement some kind of security, whether it is implemented through hardware like FPGAs, μ-Controllers, or through software in your PCs.
Dirichlet Reputation Systems
- Computer ScienceThe Second International Conference on Availability, Reliability and Security (ARES'07)
- 2007
A type of reputation system based on the Dirichlet probability distribution which is a multinomial Bayesian probability distribution is presented which provides great flexibility and usability, as well as a sound basis for designing reputation systems.