Skip to main content
Log in

BLISS: blockchain-based integrated security system for internet of things (IoT) applications

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Cybersecurity is an essential part of IoT device functionality. Malicious acts cause the disclosure of private data, putting device performance at risk. As a result, creating efficient security solutions for authentication and confidentiality of both IoT devices and data exchange and integrity of data exchange networks has become a significant challenge. Furthermore, the traditional security mechanisms’ high computation demands are not suitable for resource-constrained specific IoT devices. Therefore, we have proposed a security system for IoT applications using blockchain called BLISS, which ensures robust identification, authentication, confidentiality, and integrity of IoT devices and data exchange. Using smart contracts, the BLISS creates trustful clusters of IoT devices through an authentication process for data exchange. The BLISS is implemented on the Raspberry Pi 4 and the desktop PC, considering the Raspberry Pi 4 as an IoT device and the desktop as a cluster head. The performance analysis of the BLISS demonstrates the enhanced performance in the context of computation and energy consumption, which is 62–65% reduced. The storage and communication overhead is reduced by up to 70% compared with state-of-the-art schemes. The security analysis showed that the proposed scheme withstands many IoT-specific cyber threads.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Research Data Policy and Data Availability

Not applicable.

References

  1. Ahmed, A., Abdullah, S., Bukhsh, M., Ahmad, I., Mushtaq, Z.: An energy-efficient data aggregation mechanism for IoT secured by blockchain. IEEE Access 10, 11404–11419 (2022)

    Article  Google Scholar 

  2. Ali, I., Hassan, A., Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETS): a survey. Veh. Commun. 16, 45–61 (2019)

    Google Scholar 

  3. Alzubi, J.A.: Blockchain-based Lamport Merkle Digital signature: authentication tool in IoT healthcare. Comput. Commun. 170, 200–208 (2021)

    Article  Google Scholar 

  4. Avizheh, S., Nabi, M., Safavi-Naini, R., Venkateswarlu K, M.: Verifiable computation using smart contracts. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 17–28, London United Kingdom (2019). ACM SIGSAC

  5. Bandara, E., Tosh, D., Foytik, P., Shetty, S., Ranasinghe, N., De Zoysa, K.: Tikiri-towards a lightweight blockchain for IoT. Futur. Gener. Comput. Syst. 119, 154–165 (2021)

    Article  Google Scholar 

  6. Bataineh, M.R., Mardini, W., Khamayseh, Y.M., Yasin, M.B.: Novel and secure blockchain framework for health applications in IoT. IEEE Access 10, 14914–14926 (2022)

    Article  Google Scholar 

  7. Bera, B., Saha, S., Das, A.K., Vasilakos, A.V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet of Things J. 8(7), 5744–5761 (2021)

    Article  Google Scholar 

  8. Brotsis, S., Limniotis, K., Bendiab, G., Kolokotronis, N., Shiaeles, S.: On the suitability of blockchain platforms for IoT applications: architectures, security, privacy, and performance. Comput. Netw. 191, 108005 (2021)

    Article  Google Scholar 

  9. Coffey, T., Saidha, P.: Non-repudiation with mandatory proof of receipt. ACM SIGCOMM Comput. Commun. Rev. 26(1), 6–17 (1996)

    Article  Google Scholar 

  10. Corradini, E., Nicolazzo, S., Nocera, A., Ursino, D., Virgili, L.: A two-tier blockchain framework to increase protection and autonomy of smart objects in the IoT. Comput. Commun. 181, 338–356 (2022)

    Article  Google Scholar 

  11. Cui, Z., Fei, X., Zhang, S., Cai, X., Cao, Y., Zhang, W., Chen, J.: A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans. Serv. Comput. 13(2), 241–251 (2020)

    Google Scholar 

  12. Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: A lightweight scalable blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 134, 180–197 (2019)

    Article  Google Scholar 

  13. Fotiou, N., Pittaras, I., Siris, V.A., Polyzos, G.C.: Enabling opportunistic users in multi-tenant IoT systems using decentralized identifiers and permissioned blockchains. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 22–23, New York, NY, USA, (2019). Association for Computing Machinery

  14. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126–142 (2018)

    Article  Google Scholar 

  15. Higginbotham, S: The U.S. government finally gets serious about IoT security (2021). https://rb.gy/jz0b50

  16. IDC. Worldwide internet of things infrastructure forecast, 2021–2025 (2021). https://idc-cema.com/dwn/SF_177701/driving_the_digital_agenda_requires_strategic_architecture_rosen_idc.pdf

  17. Li, R., Song, T., Mei, B., Li, H., Cheng, X., Sun, L.: Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput. 12(5), 762–771 (2018)

    Article  Google Scholar 

  18. Makhdoom, I., Abolhasan, M., Abbas, H., Ni, W.: Blockchain’s adoption in IoT: the challenges, and a way forward. J. Netw. Comput. Appl. 125, 251–279 (2019)

    Article  Google Scholar 

  19. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 369–378, Springer, Heidelberg (1987)

  20. Michelin, R.A., Dorri, A., Steger, M., Lunardi, R.C., Kanhere, S.S., Jurdak, R., Zorzo, A.F.: Speedychain: a framework for decoupling data from blockchain for smart cities. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 145–154, New York NY USA (2018). EAI

  21. Narwal, B., Mohapatra, A.K.: A survey on security and authentication in wireless body area networks. J. Syst. Archit. 113, 101883 (2021)

    Article  Google Scholar 

  22. Paul, R., Ghosh, N., Sau, S., Chakrabarti, A., Mohapatra, P.: Blockchain based secure smart city architecture using low resource IoTs. Comput. Netw. 196, 108234 (2021)

    Article  Google Scholar 

  23. Rasool, S., Saleem, A., Iqbal, M., Dagiuklas, T., Mumtaz, S., ulQayyum, Z.: Docschain: blockchain-based IoT solution for verification of degree documents. IEEE Trans. Comput. Soc. Syst. 7(3), 827–837 (2020)

    Article  Google Scholar 

  24. Sengupta, J., Ruj, S., Bit, S.D.: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)

    Article  Google Scholar 

  25. Shafagh, H., Burkhalter, L., Hithnawi, A., Duquennoy, S.: Towards blockchain-based auditable storage and sharing of iot data. In: Proceedings of the 2017 on Cloud Computing Security Workshop, pp. 45–50, New York, NY, USA (2017). Association for Computing Machinery

  26. Shafarenko, A.: A pls blockchain for IoT applications: protocols and architecture. Cybersecurity 4(1), 1–17 (2021)

    Article  Google Scholar 

  27. Shen, M., Tang, X., Zhu, L., Xiaojiang, D., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 6(5), 7702–7712 (2019)

    Article  Google Scholar 

  28. Song, Q., Chen, Y., Zhong, Y., Lan, K., Fong, S., Tang, R.: A supply-chain system framework based on internet of things using blockchain technology. ACM Trans. Internet Technol. (2021). https://doi.org/10.1145/3409798

    Article  Google Scholar 

  29. Srinivas, J., Das, A.K., Wazid, M., Vasilakos, A.V.: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. IEEE Internet Things J. 8(9), 7727–7744 (2021)

    Article  Google Scholar 

  30. Viriyasitavat, W., Da Li, X., Bi, Z., Sapsomboon, A.: New blockchain-based architecture for service interoperations in internet of things. IEEE Trans. Comput. Soc. Syst. 6(4), 739–748 (2019)

    Article  Google Scholar 

  31. Vishwakarma, L., Das, D.: Bss: Blockchain enabled security system for internet of things applications. In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), pp. 1–4, Cambridge, MA, USA, (2020). IEEE

  32. Wang, X., Zha, X., Ni, W., Liu, R.P., Guo, Y.J., Niu, X., Zheng, K.: Survey on blockchain for internet of things. Comput. Commun. 136, 10–29 (2019)

    Article  Google Scholar 

  33. Xu, X., Zhu, D., Yang, X., Wang, S., Qi, L., Dou, W.: Concurrent practical byzantine fault tolerance for integration of blockchain and supply chain. ACM Trans. Internet Technol. (2021). https://doi.org/10.1145/3395331

    Article  Google Scholar 

  34. Yang, H., Yuan, J., Li, C., Zhao, G., Sun, Z., Yao, Q., Bao, B., Vasilakos, A.V., Zhang, J.: Brainiot: brain-like productive services provisioning with federated learning in industrial IoT. IEEE Internet Things J. 9(3), 2014–2024 (2022)

    Article  Google Scholar 

  35. Yang, T., Zhang, G., Liu, L., Yang, Y., Zhao, S., Sun, H., Wang, W.: New features of authentication scheme for the IoT: a survey. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 44–49, New York, NY, USA, (2019). Association for Computing Machinery

  36. Zhang, L., Luo, M., Li, J., Man Ho, A., Choo, K.-K.R., Chen, T., Tian, S.: Blockchain based secure data sharing system for internet of vehicles: a position paper. Veh. Commun. 16, 85–93 (2019)

    Google Scholar 

  37. Zhang, M., Peng, B., Chen, Y.: An efficient image encryption scheme for industrial internet-of-things devices. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 38–43, New York, NY, USA, (2019). Association for Computing Machinery

  38. Zhou, B., Li, H., Xu, L.: An authentication scheme using identity-based encryption and blockchain. In: 2018 IEEE Symposium on Computers and Communications (ISCC), pp. 00556–00561, Natal, Brazil, 2018. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debasis Das.

Ethics declarations

Conflict of Interests:

The authors declare that they have no competing interests.

Ethical standards

This research was conducted in compliance with ethical standards. Data were handled in a responsible and ethical manner.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vishwakarma, L., Das, D. BLISS: blockchain-based integrated security system for internet of things (IoT) applications. Int. J. Inf. Secur. 23, 1649–1665 (2024). https://doi.org/10.1007/s10207-023-00808-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00808-6

Keywords

Navigation