Abstract
Several consensus algorithms have been proposed as a way of resolving the Byzantine General problem with respect to blockchain consensus process. However, when these consensus algorithms are applied to a distributed, asynchronous network, some suffer with security and/or scalability issues, while others suffer with liveness and/or safety issues. This is because the majority of research have not considered the importance of liveness and safety, with respect to the integrity of the consensus decision. In this paper, a novel solution to this challenge is presented, a solution that protects blockchain transactions from fraudulent or erroneous mis-spends. This consensus protocol uses a combination of probabilistic randomness, an isomorphic balance authentication, error detection and synchronised time restrictions, when assessing the authenticity and validity of IoT request. Designed to operate in a distributed asynchronous network, this approach increases scalability while maintaining a high transactional throughput, even when faced with Byzantine failure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hung, M.: Insight on How to Lead in a Connected World (2017)
Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., Ghani, N.: Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surv. Tutorials. 21, 2702–2733 (2019)
Dawson, M.: Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems (2016)
Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: 2015 IEEE World Congress on Services (2015)
Hwang, Y.H.: IoT security & privacy: threats and challenges. In: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security (2015)
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Gupta, S.D., Ghanavati, S.: Towards a heterogeneous IoT privacy architecture. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing (2020)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)
Zhang, Z.-K., Cho, M.C.Y., Wang, C.-W., Hsu, C.-W., Chen, C.-K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA) (2014)
MacKenzie, B., Ferguson, R.I., Bellekens, X.: An assessment of blockchain consensus protocols for the Internet of Things. In: 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) (2018)
Feng, H., Fu, W.: Study of recent development about privacy and security of the Internet of Things. In: 2010 International Conference on Web Information Systems and Mining (2010)
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer. 50, 80–84 (2017)
Zhou, W., Jia, Y., Peng, A., Zhang, Y., Liu, P.: The effect of iot new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 6(2), 1606–1616 (2018)
Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: Zombiecoin: powering next-generation botnets with bitcoin. In: International Conference on Financial Cryptography and Data Security (2015)
Dittrich, D.: So you want to take over a botnet…. In: Presented as part of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (2012)
Shang, W., Yu, Y., Droms, R., Zhang, L.: Challenges in IoT networking via TCP/IP architecture, Technical Report NDN-0038. NDN Project (2016)
Biason, A., Pielli, C., Zanella, A., Zorzi, M.: Access control for IoT nodes with energy and fidelity constraints. IEEE Trans. Wirel. Commun. 17, 3242–3257 (2018)
Huang, J., Kong, L., Chen, G., Wu, M.-Y., Liu, X., Zeng, P.: Towards secure industrial IoT: blockchain system with credit-based consensus mechanism. IEEE Trans. Ind. Informatics. 15, 3680–3689 (2019)
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access. 4, 2292–2303 (2016)
Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (2017)
Reyna, A., MartÃn, C., Chen, J., Soler, E., DÃaz, M.: On blockchain and its integration with IoT. Challenges and opportunities. Futur. Gener. Comput. Syst. 88, 173–190 (2018)
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Futur. Gener. Comput. Syst. 107, 841–853 (2020)
Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40, 666–682 (2001)
Chandra, T.D., Hadzilacos, V., Toueg, S.: The weakest failure detector for solving consensus. J. ACM. 43, 685–722 (1996)
Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. J. ACM. 43, 225–267 (1996)
Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. Assoc. Comput. Mach. 32(2), 374–382 (1985)
Na, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 398–461 (2002)
Lamport, M.P.R.S.L.: The Byzantine generals problem. ACM Trans. Prog. Lang. Syst. Microsoft Res. 4, 382–401 (1982)
Lamport, L., et al.: Paxos made simple. ACM Sigact News. 32, 18–25 (2001)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in Internet of Things: challenges and solutions. arXiv preprint arXiv:1608.05187. (2016)
Deep, G., Mohana, R., Nayyar, A., Sanjeevikumar, P., Hossain, E.: Authentication protocol for cloud databases using blockchain mechanism. Sensors. 19, 4444 (2019)
Luu, L., Narayanan, V., Baweja, K., Zheng, C., Gilbert, S., Saxena, P.: SCP: a computationally-scalable Byzantine consensus protocol for blockchains. https://www.weusecoins.com/assets/pdf/library/SCP, vol. 20, p. 2016 (2015)
Mazieres, D.: The Stellar Consensus Protocol: A Federated Model for Internet-Level Consensus, p. 32. Stellar Development Foundation, San Francisco, CA (2015)
Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and privacy (SP) (2016)
Schwartz, D., Youngs, N., Britto, A., et al.: The Ripple Protocol Consensus Algorithm. https://ripple.com/files/rippleconsensuswhitepaper.pdf (2014)
Valenta, M., Sandner, P.: Comparison of Ethereum, Hyperledger Fabric and Corda (2017)
Milutinovic, M., He, W., Wu, H., Kanwal, M.: Proof of luck: an efficient blockchain consensus protocol. In: Proceedings of the 1st Workshop on System Software for Trusted Execution (2016)
Poelstra, A., et al.: Distributed consensus from proof of stake is impossible, Self-published Paper (2014)
Sangster, A., Scataglinibelghitar, G.: Luca Pacioli: the father of accounting education. Account. Educ. 19, 423–438 (2010)
Pacioli, L., Brown, R.G., Johnston, K.S.: Paciolo on accounting, Facsimiles-Garl (1963)
Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (2012)
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin’s peer-to-peer network. In: USENIX Security Symposium (2015)
Dent, A.W., Mitchell, C.J.: User’s Guide to Cryptography and Standards (Artech House Computer Security). Artech House, Inc, Norwood, MA (2004)
Jakobsson, M., Juels, A.: Proofs of Work and Bread Pudding Protocols, pp. 258–272. Springer, New York (1999)
Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: Proceedings of the Third USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 173–186, New Orleans, Louisiana, USA., February 22–25 (1999, 1999). https://doi.org/10.1145/296806.296824
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
MacKenzie, B.A., Ferguson, I., Razaq, A. (2023). A Secure and Scalable IoT Consensus Protocol. In: Nayyar, A., Paul, A., Tanwar, S. (eds) The Fifth International Conference on Safety and Security with IoT . EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-94285-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-94285-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-94284-7
Online ISBN: 978-3-030-94285-4
eBook Packages: EngineeringEngineering (R0)