MBS: Multilevel Blockchain System for IoT

  • Bacem MbarekEmail author
  • Nafaâ Jabeur
  • Tomás Pitner
  • Ansar-Ul-Haque Yasar
Original Article


Despite of their increasing popularity, Internet of Things (IoT) platforms are still suffering from major security problems, particularly during communications between the IoT devices. Indeed, these devices are commonly prone to malicious attacks and require prior mutual authentication to guarantee the confidentiality and security of data being shared as well as a proper network operation. In order to deal with this issue, several researchers have proposed the use of the emergent blockchain paradigm, which has emerged as a key technology that will transform the way in which information will be shared. As this paradigm is facing scalability and flexibility problems, the use of multi-agents systems has been adopted in recent works. However, current solutions are using agents for the rudimentary role of data collection only. In this paper, we propose to secure the IoT platform with a multilevel blockchain system (MBS) where the speed and flexibility of blockchain transactions are enforced by mobile agents which are migrating throughout the IoT network. The simulations of our solution through the Hyperledger Fabric are showing relevant results in terms of response time and energy consumption.


Blockchain Internet of Things Security Scalability 



  1. 1.
    Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, Wuille P Enabling blockchain innovations with pegged sidechains,
  2. 2.
    Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial internet of things, IEEE Transactions on Industrial InformaticsGoogle Scholar
  3. 3.
    Signorini M, Pontecorvi M, Kanoun W, Di Pietro R (2018) Bad: blockchain anomaly detection. arXiv:1807.03833
  4. 4.
    Mbarek B, Jabeur N et al (2018) Ecass: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems. Personal and Ubiquitous ComputingGoogle Scholar
  5. 5.
    Wray K, Thompson B (2014) An application of multiagent learning in highly dynamic environments. In: AAAI workshop on multiagent interaction without prior coordinationGoogle Scholar
  6. 6.
    Kong Y, Zhang M, Ye D (2017) A belief propagation-based method for task allocation in open and dynamic cloud environments, Knowledge-Based SystemsGoogle Scholar
  7. 7.
    Schatten M, Ševa J., Tomičić I. (2016) A roadmap for scalable agent organizations in the internet of everything, Journal of Systems and SoftwareGoogle Scholar
  8. 8.
    Wong D, Paciorek N, Moore D (1999) Java-based mobile agents. Commun ACM 42(3):92–ffCrossRefGoogle Scholar
  9. 9.
    Caripe W, Cybenko G, Moizumi K, Gray R (1998) Network awareness and mobile agent systems. IEEE Commun Mag 36(7):44–49CrossRefGoogle Scholar
  10. 10.
    Tong L, Zhao Q, Adireddy S (2003) Sensor networks with mobile agents. In: Military communications conference, 2003. MILCOM’03. 2003 IEEE, vol 1. IEEE, pp 688–693Google Scholar
  11. 11.
    Dong M, Ota K, Yang LT, Chang S, Zhu H, Zhou Z (2014) Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks. Comput Netw 74:58–70CrossRefGoogle Scholar
  12. 12.
    Su C-J, Wu C-Y (2011) Jade implemented mobile multi-agent based, distributed information platform for pervasive health care monitoring. Appl Soft Comput 11(1):315–325CrossRefGoogle Scholar
  13. 13.
    Chan V, Ray P, Parameswaran N (2008) Mobile e-health monitoring: an agent-based approach, IET communicationsGoogle Scholar
  14. 14.
    Kvaternik K, Laszka A, Walker M, Schmidt D, Sturm M, Dubey A et al (2017) Privacy-preserving platform for transactive energy systems. arXiv:1709.09597
  15. 15.
    Qayumi K (2015) Multi-agent based intelligence generation from very large datasets. In: IEEE international conferenceGoogle Scholar
  16. 16.
    Norta A, Othman AB, Taveter K (2015) Conflict-resolution lifecycles for governed decentralized autonomous organization collaboration. In: Proceedings of the 2015 2nd international conference on electronic governance and open society: Challenges in Eurasia. ACM, pp 244–257Google Scholar
  17. 17.
    Ponomarev S, Voronkov A (2017) Multi-agent systems and decentralized artificial superintelligence. arXiv:1702.08529
  18. 18.
    Calvaresi D, Dubovitskaya A, Calbimonte JP, Taveter K, Schumacher M (2018) Multi-agent systems and blockchain: results from a systematic literature review. In: International conference on practical applications of agents and multi-agent systems. SpringerGoogle Scholar
  19. 19.
    Kapitonov A, Lonshakov S, Krupenkin A, Berman I (2017) Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of uavs. In: Research education and development of unmanned aerial systems (RED-UAS)Google Scholar
  20. 20.
    Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(6):2481–2501CrossRefGoogle Scholar
  21. 21.
    Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Lsb: A lightweight scalable blockchain for iot security and privacy. arXiv:1712.02969
  22. 22.
    Kshetri N (2017) Can blockchain strengthen the internet of things? IT Professional 19(4):68–72CrossRefGoogle Scholar
  23. 23.
    Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access v4:2292–2303CrossRefGoogle Scholar
  24. 24.
    Jesus EF, Chicarino VR, de Albuquerque CV, Rocha A. A. d. A. (2018) A survey of how to use blockchain to secure internet of things and the stalker attack, Security and Communication NetworksGoogle Scholar
  25. 25.
    Golomb T, Mirsky Y, Elovici Y (2018) Ciota:, Collaborative iot anomaly detection via blockchain. arXiv:1803.03807
  26. 26.
    Huckle S, Bhattacharya R, White M, Beloff N (2016) Internet of things, blockchain and shared economy applications. Procedia Comput Sci 98:461–466CrossRefGoogle Scholar
  27. 27.
    Huh S, Cho S, Kim S (2017) Managing iot devices using blockchain platform. In: 2017 19th international conference on advanced communication technology (ICACT). IEEE, pp 464–467Google Scholar
  28. 28.
    Shafagh H, Burkhalter L, Hithnawi A, Duquennoy S (2017) Towards blockchain-based auditable storage and sharing of iot data, In: Proceedings of the 2017 on cloud computing security workshop. ACM, pp 45–50Google Scholar
  29. 29.
    Danzi P, Kalor AE, Stefanovic C, Popovski P (2018) Analysis of the communication traffic for blockchain synchronization of iot devices. In: 2018 IEEE international conference on communications (ICC). IEEE, pp 1–7Google Scholar
  30. 30.
    Conoscenti M, Vetro A, De Martin JC (2016) Blockchain for the internet of things: a systematic literature review. In: 2016 IEEE/ACS 13th international conference of computer systems and applications (AICCSA). IEEE, pp 1–6Google Scholar
  31. 31.
    Ramachandran GS, Radhakrishnan R, Krishnamachari B (2018) Towards a decentralized data marketplace for smart cities. In: invited paper at the 1st international workshop on BLockchain enabled sustainable smart cities (BLESS 2018), Kansas City, MO, USA, held in conjunction with the 4th IEEE Annual International Smart Cities Conference (ISC2)Google Scholar
  32. 32.
    Shermin V (2017) Disrupting governance with blockchains and smart contracts. Strateg Chang 26(5):499–509CrossRefGoogle Scholar
  33. 33.
    Kvaternik K, Laszka A, Walker M, Schmidt D, Sturm M, Dubey A, et al. (2017) Privacy-preserving platform for transactive energy systems. arXiv:1709.09597
  34. 34.
    Ponomarev S, Voronkov A (2017) Multi-agent systems and decentralized artificial superintelligence. arXiv:1702.08529
  35. 35.
    Ferrer EC (2018) The blockchain: a new framework for robotic swarm systems. In: Proceedings of the future technologies conference. Springer, pp 1037–1058Google Scholar
  36. 36.
    Di Pierro M (2017) What is the blockchain? Comput Sci Eng 19(5):92–95CrossRefGoogle Scholar
  37. 37.
  38. 38.
    Behrendt F (2016) Why cycling matters for smart cities. internet of bicycles for intelligent transport. Journal of Transport Geography 56:157–164CrossRefGoogle Scholar
  39. 39.
    Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Secur (IJCSS) 6(3):168–187Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic
  2. 2.German University of Technology in Oman (GUtech)AthaibahSultanate of Oman
  3. 3.Transportation Research Institute Hasselt UniversityHasseltBelgium

Personalised recommendations