• Corpus ID: 21589

Blockchain in internet of things: Challenges and Solutions

@article{Dorri2016BlockchainII,
  title={Blockchain in internet of things: Challenges and Solutions},
  author={Ali Dorri and Salil S. Kanhere and Raja Jurdak},
  journal={ArXiv},
  year={2016},
  volume={abs/1608.05187}
}
The Internet of Things IoT is experiencing exponential growth in research and industry, but it still suffers from privacy and security vulnerabilities. [] Key Method The described method is investigated on a smart home application as a representative case study for broader IoT applications. The proposed architecture is hierarchical, and consists of smart homes, an overlay network and cloud storages coordinating data transactions with BC to provide privacy and security.

Figures and Tables from this paper

Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure
TLDR
This paper applies a BC technology known as Hyperledgder Fabric, to an IoT network, and introduces an execute-order technique for transactions that separates the transaction execution from consensus, resulting in increased efficiency and security protection.
Integration of Blockchain and IoT: An Enhanced Security Perspective
TLDR
This paper explores the applicability ofBC for ensuring enhanced security and privacy in the IoT ecosystem and assesses the implementation of BC for IoT Security and identifies associated challenges and proposes solutions for BC enabled enhanced security for the IoTcosystem.
Enhancing IoT Security and Privacy Using Distributed Ledgers with IOTA and the Tangle
TLDR
This paper lays out an architecture for incorporating a concept similar to Blockchain - the technology that underpins the cryptocurrency Bitcoin and many other cryptocurrencies to provide decentralized security and privacy for IoT devices.
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things
TLDR
This article investigates typical security and privacy issues in IoT and develops a framework to integrate blockchain with IoT, which can provide great assurance for IoT data and various functionalities and desirable scalability including authentication, decentralized payment, and so on.
Lightweight Blockchain to Improve Security and Privacy in Smarthome
TLDR
This work provides lightweight BlockChain with two prominent consensus mechanism PoW – Proof of Work and PoS – proof of Stake for smart IoT devices and Smart Home Device is ensures providing best-in-class Security and Privacy for smart home Appliances.
Blockchain for IoT security and privacy: The case study of a smart home
TLDR
This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
A Study on Leveraging Blockchain Technology for IoT Security Enhancement
  • S. M. Muzammal, R. Murugesan
  • Computer Science
    2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA)
  • 2018
TLDR
The adoption of IoT in various fields and its applications to automate and improve living conditions, along with security and privacy risks arising from organization and functioning of different IoT components are reviewed.
Sliding Window Blockchain Architecture for Internet of Things
TLDR
A sliding window blockchain (SWBC) architecture is proposed that modifies the traditional blockchain architecture to suit IoT applications and increases security and minimizes memory overhead while consuming fewer resources.
Blockchain-based security management of IoT infrastructure with Ethereum transactions
TLDR
This paper brings forward a new definitive, intimate, and lightweight masonry for IoT-based blockchain technology which forsakes the memory overhead and centralized system, while security and privacy benefits are maintaining.
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things
TLDR
The development of an integrated IoT system implementing the permissioned blockchain Hyperledger Fabric (HLF) to secure the edge computing devices by employing a local authentication process and the proposed model provides traceability for the data generated by the IoT devices.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 16 REFERENCES
Privacy and Security Challenges in Internet of Things
  • M. Das
  • Computer Science
    ICDCIT
  • 2015
TLDR
This paper discusses security and privacy challenges in IoT scenarios and applications with special emphasis on resource-constrained environments' security objectives and privacy requirement, and proposes a generic construction of secure protocol suitable for constrained environments with respect to IoT scenariosand applications.
Privacy-Aware Authentication in the Internet of Things
TLDR
This work builds upon the idea of an RFID-based IoT realized by means of standardized and well-established Internet protocols and demonstrates how the IPsec standard can be applied in a privacy-aware manner.
Smart Locks: Lessons for Securing Commodity Internet of Things Devices
TLDR
This work examines the security of home smart locks: cyber-physical devices that replace traditional door locks with deadbolts that can be electronically controlled by mobile devices or the lock manufacturer's remote servers and proposes several defenses that mitigate the attacks.
IoT-Privacy: To be private or not to be private
TLDR
A privacy management scheme that enables the user to estimate the risk of sharing private data like smart meter data is proposed and robust sensitivity detection, analysis and privacy content quantification scheme from statistical disclosure control aspect and information theoretic model is developed.
openPDS: Protecting the Privacy of Metadata through SafeAnswers
The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and
Bitcoin: A Peer-to-Peer Electronic Cash System
TLDR
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
Bitcoin meets strong consistency
TLDR
This paper proposes a new system, PeerCensus, which acts as a certification authority, manages peer identities in a peer-to-peer network, and ultimately enhances Bitcoin and similar systems with strong consistency.
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
TLDR
This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC, and shows that an insider attack can cause significant instability in the CACC vehicle stream.
Introduction to Cryptography
  • M. Aziz, S. Akbar
  • Computer Science
    2005 International Conference on Microelectronics
  • 2005
TLDR
In today's world of communications it is very necessary to implement some kind of security, whether it is implemented through hardware like FPGAs, μ-Controllers, or through software in your PCs.
Dirichlet Reputation Systems
  • A. Jøsang, J. Haller
  • Computer Science
    The Second International Conference on Availability, Reliability and Security (ARES'07)
  • 2007
TLDR
A type of reputation system based on the Dirichlet probability distribution which is a multinomial Bayesian probability distribution is presented which provides great flexibility and usability, as well as a sound basis for designing reputation systems.
...
1
2
...