Skip to main content

A Blockchain Based Solution for Securing Data of IoT Devices

  • Conference paper
  • First Online:
Service-Oriented Computing – ICSOC 2019 Workshops (ICSOC 2019)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 12019))

Included in the following conference series:

Abstract

In today’s time, the number of IoT devices are increasing rapidly. We everyday hear about Amazon echo, Google Mini, Smart watches etc. These devices collect confidential data of a person and as most of these systems follow centralized architecture approach, So most of the data on internet is basically managed by some central authority or organization. Though these organizations have strict policy regarding data misuse or changing of data without consent but one can’t overlook the fact that these organizations have the ability to do so. Blockchain helps solve such problem as it is not managed by single party if somebody tries to change data in his Blockchain then the hash of the particular block will no longer match and the particular Blockchain will become invalid and other Blockchain will still be intact and therefore users data won’t be compromised. But due to high resource requirement, it becomes problem to run complete Blockchain node on all IoT devices mainly on low power or memory devices. In this paper, we have developed decentralized architecture leveraged from Blockchain technology coupled with an alternative centralized cloud architecture which is a classic client/server architecture with an underlying Blockchain at back-end support with smart contract application written in Solidity language at Ethereum platform. We implement this framework and show how this architecture prevent data misuse by using functionality of Blockchain without requiring the all IoT devices to actually run a Blockchain node. For an end-user experience, it will appear to be same as a normal web app and from the developers perspective, the smart contract application will have similar software design to current web apps thus allowing an easy transition for both of centralized and decentralized methods while still retaining the trust of decentralization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  2. Pan, J., et al.: EdgeChain: an edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet Things J. 6(3), 4719–4732 (2018)

    Article  MathSciNet  Google Scholar 

  3. Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in Internet of Things: challenges and solutions. arXiv preprint arXiv:1608.05187 (2016)

  4. Fedak, G., Bendella, W., Alves, E.: Blockchain-based decentralized cloud computing. iExec Corporation (2018). https://iex.ec/wp-content/uploads/pdf/iExec-WPv3.0-English.pdf. Accessed 7 Mar 2019

  5. Popov, S.: The tangle, 131 (2016)

    Google Scholar 

  6. Yang, R., et al.: Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 21(2), 1508–1532 (2019)

    Article  Google Scholar 

  7. Nakamoto, S.: A peer-to-peer electronic cash system. Bitcoin (2008). https://bitcoin.org/bitcoin.pdf

  8. Zheng, Z., et al.: Blockchain challenges and opportunities: a survey. Work Paper 2016 (2016)

    Google Scholar 

  9. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, pp. 1–32 (2014)

    Google Scholar 

  10. Ferrag, M.A., et al.: Blockchain technologies for the Internet of Things: research issues and challenges. IEEE Internet Things J. 6(2), 2188–2204 (2018)

    Article  Google Scholar 

  11. Banerjee, M., Lee, J., Choo, K.K.R.: A blockchain future for Internet of Things security: a position paper. Digital Commun. Netw. 4(3), 149–160 (2018)

    Article  Google Scholar 

  12. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)

    Article  Google Scholar 

  13. Conoscenti, M., Vetro, A., De Martin, J.C.: Blockchain for the Internet of Things: a systematic literature review. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE (2016)

    Google Scholar 

  14. Singla, V., et al.: Develop leave application using blockchain smart contract. In: 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE (2019)

    Google Scholar 

  15. Samaniego, M., Deters, R.: Blockchain as a service for IoT. In: IEEE International Conference on Internet of Things (iThings) and IEEE GreenComputing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE (2016)

    Google Scholar 

  16. Top IoT Vulnerabilities. In: OWASP, Top IoT Vulnerabilities, May 2016. https://www.owasp.org/index.php/TopIoTVulnerabilities. Accessed 8 Sept 2018

  17. Johansson, L., Olsson, O.: Improving intrusion detection for IoT networks-a snort GPGPU modification using OpenCL. Master’s thesis 2018, Department of CSE, Chalmers University of Technology and University of Gothenburg, June 2018. https://pdfs.semanticscholar.org/045c/ed267e49cd32dbac61d9ec337e95df88eece.pdf

  18. Kaur, J.: A semi supervised hybrid protection for network and host based attacks. J. Eng. Appl. Sci. 12, 3108–3112 (2017)

    Google Scholar 

  19. Qu, C., et al.: Blockchain based credibility verification method for IoT entities. Secur. Commun. Netw 2018, 1–11 (2018)

    Article  Google Scholar 

  20. Al-Garadi, M.A., et al.: A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv preprint arXiv:1807.11023 (2018)

  21. Mohanty, B.: Do we need only AI or IoT or ML or BlockChain or all of them together? February 2019. http://www.bikashmohanty.com/topics/do-we-need-only-ai-or-iot-or-ml-or-blockchain-or-all-of-them-together.html. Accessed 2 Mar 2019

  22. Kaur, J.: Wired LAN and wireless LAN attack detection using signature based and machine learning tools. In: Perez, G.M., Mishra, K.K., Tiwari, S., Trivedi, M.C. (eds.) Networking Communication and Data Knowledge Engineering. LNDECT, vol. 3, pp. 15–24. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-4585-1_2

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaspreet Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, J., Singla, V., Kalra, S. (2020). A Blockchain Based Solution for Securing Data of IoT Devices. In: Yangui, S., et al. Service-Oriented Computing – ICSOC 2019 Workshops. ICSOC 2019. Lecture Notes in Computer Science(), vol 12019. Springer, Cham. https://doi.org/10.1007/978-3-030-45989-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45989-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45988-8

  • Online ISBN: 978-3-030-45989-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics