Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure

@article{Reijsbergen2022ProtectingTI,
  title={Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure},
  author={Dani{\"e}l Reijsbergen and Aung Maw and Sarad Venugopalan and Di Yang and Tien Tuan Anh Dinh and Jianying Zhou},
  journal={2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)},
  year={2022},
  pages={1-9}
}
Smart cities deploy large numbers of sensors and collect a tremendous amount of data from them. For example, Advanced Metering Infrastructures (AMIs), which consist of physical meters that collect usage data about public utilities such as power and water, are an important building block in a smart city. In a typical sensor network, the measurement devices are connected through a computer network, which exposes them to cyber attacks. Furthermore, the data is centrally managed at the operator’s… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 60 REFERENCES

Blockchain for IoT security and privacy: The case study of a smart home

This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.

Specification-based intrusion detection for advanced metering infrastructures

A specification-based intrusion detection sensor that can be deployed in the field to identify security threats in real time and is argued that these trees are a simple, yet powerful tool to analyze complex security and privacy problems.

ICS-BlockOpS: Blockchain for operational data security in industrial control system

A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services

This paper surveys IoT-enabled cyber attacks, found in all application domains since 2010, and methodologically analyze representative attacks that demonstrate direct, indirect, and subliminal attack paths against critical targets.

CIoTA: Collaborative IoT Anomaly Detection via Blockchain

CIoTA is proposed, a lightweight framework that utilizes the blockchain concept to perform distributed and collaborative anomaly detection for devices with limited resources via self-attestation and consensus among IoT devices.

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

An overview of real cyber attack incidents in traditional energy networks and those targeting the smart metering network is shown and a threat taxonomy is presented considering: 1) threats in system-level security; 2) threats and/or theft of services; and 3) threats to privacy.

Specification-based Intrusion Detection for home area networks in smart grids

This paper presents a layered specification-based Intrusion Detection Systems for HA# designed to target ZigBee technology, and addresses the physical and medium access control (MAC) layers.

Towards an Optimized BlockChain for IoT

  • A. DorriS. KanhereR. Jurdak
  • Computer Science
    2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)
  • 2017
A lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy benefits, is proposed.

A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures

This paper presents AMIDS, an AMI intrusion detection system that uses information fusion to combine the sensors and consumption data from a smart meter to more accurately detect energy theft.
...