Abstract
In today’s time, the number of IoT devices are increasing rapidly. We everyday hear about Amazon echo, Google Mini, Smart watches etc. These devices collect confidential data of a person and as most of these systems follow centralized architecture approach, So most of the data on internet is basically managed by some central authority or organization. Though these organizations have strict policy regarding data misuse or changing of data without consent but one can’t overlook the fact that these organizations have the ability to do so. Blockchain helps solve such problem as it is not managed by single party if somebody tries to change data in his Blockchain then the hash of the particular block will no longer match and the particular Blockchain will become invalid and other Blockchain will still be intact and therefore users data won’t be compromised. But due to high resource requirement, it becomes problem to run complete Blockchain node on all IoT devices mainly on low power or memory devices. In this paper, we have developed decentralized architecture leveraged from Blockchain technology coupled with an alternative centralized cloud architecture which is a classic client/server architecture with an underlying Blockchain at back-end support with smart contract application written in Solidity language at Ethereum platform. We implement this framework and show how this architecture prevent data misuse by using functionality of Blockchain without requiring the all IoT devices to actually run a Blockchain node. For an end-user experience, it will appear to be same as a normal web app and from the developers perspective, the smart contract application will have similar software design to current web apps thus allowing an easy transition for both of centralized and decentralized methods while still retaining the trust of decentralization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Pan, J., et al.: EdgeChain: an edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet Things J. 6(3), 4719–4732 (2018)
Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in Internet of Things: challenges and solutions. arXiv preprint arXiv:1608.05187 (2016)
Fedak, G., Bendella, W., Alves, E.: Blockchain-based decentralized cloud computing. iExec Corporation (2018). https://iex.ec/wp-content/uploads/pdf/iExec-WPv3.0-English.pdf. Accessed 7 Mar 2019
Popov, S.: The tangle, 131 (2016)
Yang, R., et al.: Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 21(2), 1508–1532 (2019)
Nakamoto, S.: A peer-to-peer electronic cash system. Bitcoin (2008). https://bitcoin.org/bitcoin.pdf
Zheng, Z., et al.: Blockchain challenges and opportunities: a survey. Work Paper 2016 (2016)
Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, pp. 1–32 (2014)
Ferrag, M.A., et al.: Blockchain technologies for the Internet of Things: research issues and challenges. IEEE Internet Things J. 6(2), 2188–2204 (2018)
Banerjee, M., Lee, J., Choo, K.K.R.: A blockchain future for Internet of Things security: a position paper. Digital Commun. Netw. 4(3), 149–160 (2018)
Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)
Conoscenti, M., Vetro, A., De Martin, J.C.: Blockchain for the Internet of Things: a systematic literature review. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE (2016)
Singla, V., et al.: Develop leave application using blockchain smart contract. In: 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE (2019)
Samaniego, M., Deters, R.: Blockchain as a service for IoT. In: IEEE International Conference on Internet of Things (iThings) and IEEE GreenComputing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE (2016)
Top IoT Vulnerabilities. In: OWASP, Top IoT Vulnerabilities, May 2016. https://www.owasp.org/index.php/TopIoTVulnerabilities. Accessed 8 Sept 2018
Johansson, L., Olsson, O.: Improving intrusion detection for IoT networks-a snort GPGPU modification using OpenCL. Master’s thesis 2018, Department of CSE, Chalmers University of Technology and University of Gothenburg, June 2018. https://pdfs.semanticscholar.org/045c/ed267e49cd32dbac61d9ec337e95df88eece.pdf
Kaur, J.: A semi supervised hybrid protection for network and host based attacks. J. Eng. Appl. Sci. 12, 3108–3112 (2017)
Qu, C., et al.: Blockchain based credibility verification method for IoT entities. Secur. Commun. Netw 2018, 1–11 (2018)
Al-Garadi, M.A., et al.: A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv preprint arXiv:1807.11023 (2018)
Mohanty, B.: Do we need only AI or IoT or ML or BlockChain or all of them together? February 2019. http://www.bikashmohanty.com/topics/do-we-need-only-ai-or-iot-or-ml-or-blockchain-or-all-of-them-together.html. Accessed 2 Mar 2019
Kaur, J.: Wired LAN and wireless LAN attack detection using signature based and machine learning tools. In: Perez, G.M., Mishra, K.K., Tiwari, S., Trivedi, M.C. (eds.) Networking Communication and Data Knowledge Engineering. LNDECT, vol. 3, pp. 15–24. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-4585-1_2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kaur, J., Singla, V., Kalra, S. (2020). A Blockchain Based Solution for Securing Data of IoT Devices. In: Yangui, S., et al. Service-Oriented Computing – ICSOC 2019 Workshops. ICSOC 2019. Lecture Notes in Computer Science(), vol 12019. Springer, Cham. https://doi.org/10.1007/978-3-030-45989-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-45989-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45988-8
Online ISBN: 978-3-030-45989-5
eBook Packages: Computer ScienceComputer Science (R0)