Abstract
In today’s technology landscape, the Internet of Things (IoT) has gained significant momentum due to its wide-ranging applications across diverse devices. However, the integration of IoT faces several daunting challenges, with security emerging as a paramount concern. To address this, blockchain technology has emerged as a decentralized and foundational solution for mitigating these integration obstacles. This research introduces a reliable blockchain-based consensus PIoT (Proof of Internet of Things) specifically for IoT networks, aiming to overcome the attacks encountered during data communication. The proposed blockchain system excels in effectively identifying IoT devices, authenticating their legitimacy, and dynamically assigning addresses based on demand. Additionally, it offers secure communication capabilities among IoT devices, providing robust protection against various attacks. The performance of PIoT is superior than that of certain traditional techniques. As it comes to the efficient use of available time, PIoT displays improvements of 74.7 and 96.8%, respectively, as compared to LPBFT and hybrid blockchain. In addition to this, the level of consensus security offered by PIoT is 15% higher than that offered by DAC4SH. PIoT has impressive scalability in terms of time consumption, the fraction of successful consensus attempts, and transaction throughput even when the network size and the number of malicious nodes face exponential variations.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Alfandi, O., et al.: A survey on boosting IoT security and privacy through blockchain: exploration, requirements, and open issues. Clust. Comput. 24, 37–55 (2021)
Jalasri, M., Lakshmanan, L.: Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm. Clust. Comput. 26(1), 823–836 (2023)
Qadri, Y.A., et al.: The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Clust Comput 23, 2047–2065 (2020)
Peng, K., et al.: Security challenges and opportunities for smart contracts in Internet of Things: a survey. IEEE Internet Things J. 8(15), 12004–12020 (2021)
Deng, L., et al.: Retracted article: mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 22, 9889–9904 (2019)
Li, H., Han, D., Chang, C.-C.: DAC4SH: a novel data access control scheme for smart home using smart contracts. IEEE Sens. J. 23(6), 6178–6191 (2023)
Li, D., et al.: Information security model of block chain based on intrusion sensing in the IoT environment. Clust. Comput. 22, 451–468 (2019)
Ali, H.M., et al.: Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. Clust. Comput. 25(3), 2143–2161 (2022)
Alhowaide, A., Alsmadi, I., Tang, J.: Towards the design of real-time autonomous IoT NIDS. Clust. Comput. (2021). https://doi.org/10.1007/s10586-021-03231-5
Liang, W., Ji, N.: Privacy challenges of IoT-based blockchain: a systematic review. Clust. Comput. 25(3), 2203–2221 (2022)
Janani, K., Ramamoorthy, S.: Threat analysis model to control IoT network routing attacks through deep learning approach. Connect. Sci. 34(1), 2714–2754 (2022)
Hegde, P., Maddikunta, P.K.R.: Secure PBFT consensus-based lightweight blockchain for healthcare application. Appl. Sci. 13(6), 3757 (2023)
Zaidi, S.Y., Abbas, et al.: An attribute-based access control for IoT using blockchain and smart contracts. Sustainability 13(19), 10556 (2021)
Chinnasamy, P., et al.: Ciphertext-policy attribute-based encryption for cloud storage: toward data privacy and authentication in AI-enabled IoT system. Mathematics 10(1), 68 (2021)
Peng, S., et al.: Blockchain data secure transmission method based on homomorphic encryption. Comput. Intell. Neurosci. 2022, 1–9 (2022)
Rasheed, A., et al.: Exploiting zero knowledge proof and blockchains towards the enforcement of anonymity, data integrity and privacy (ADIP) in the IoT. IEEE Trans. Emerg. Topics Comput. 10(3), 1476–1491 (2021)
Gabsi, S., et al.: Novel ECC-based RFID mutual authentication protocol for emerging IoT applications. IEEE access 9, 130895–130913 (2021)
Vangala, A., et al.: Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE Internet Things J. 8(13), 10792–10806 (2021)
Sayeed, S., Marco-Gisbert, H.: Proof of adjourn (PoAj): a novel approach to mitigate blockchain attacks. Appl. Sci. 10(18), 6607 (2020)
Mohammed, M.H.S.: A hybrid framework for securing data transmission in Internet of Things (IoTs) environment using blockchain approach. In: 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). IEEE (2021)
Biswas, S., et al.: A scalable blockchain framework for secure transactions in IoT. IEEE Internet Things J. 6(3), 4650–4659 (2018)
Rathee, G., et al.: A secure IoT sensors communication in industry 4.0 using blockchain technology. J. Ambient Intell. Human. Comput. 12, 533–545 (2021)
Ramesh, S., Govindarasu, M.: An efficient framework for privacy-preserving computations on encrypted IoT data. IEEE Internet Things J. 7(9), 8700–8708 (2020)
Gong, L., Alghazzawi, D.M., Cheng, Li.: BCoT sentry: a blockchain-based identity authentication framework for IoT devices. Information 12(5), 203 (2021)
Wan, Ji., et al.: AnonymousFox: an efficient and scalable blockchain consensus algorithm. IEEE Internet Things J. 9(23), 24236–24252 (2022)
Liao, D., et al.: Achieving IoT data security based blockchain. Peer-to-Peer Netw. Appl. 14, 1–14 (2021)
Li, T., et al.: Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J. 9(16), 15138–15149 (2022)
Jiang, W., Lin, Z., Tao, J.: An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain. High-Confid. Comput. 3(1), 100104 (2023)
Sabrina, F., Li, N., Sohail, S.: A blockchain based secure IoT system using device identity management. Sensors 22(19), 7535 (2022)
Khashan, O.A., Khafajah, N.M.: Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. J. King Saud Univ. Comput. Inf. Sci. 35(2), 726–739 (2023)
Awan, S.M., et al.: A blockchain-inspired attribute-based zero-trust access control model for IoT. Information 14(2), 129 (2023)
Patil, A.S., et al.: Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Comput. Secur 97, 101958 (2020)
Ibrahim, R.F., Al-Haija, Q.A., Ahmad, A.: DDoS attack prevention for internet of thing devices using ethereum blockchain technology. Sensors 22(18), 6806 (2022)
Ai, Z., Yin, A.: Controlled and authenticated quantum dialogue protocol based on Grover’s algorithm. Int. J. Theor. Phys. 61(11), 261 (2022)
Ai, Z., Cui, W.: A proof-of-transactions blockchain consensus protocol for large-scale IoT. IEEE Internet Things J. 9(11), 7931–7943 (2021)
Vishwakarma, L., Das, D.: SCAB-IoTA: secure communication and authentication for IoT applications using blockchain. J. Parallel Distrib. Comput. 154, 94–105 (2021)
Zhang, X., Xue, M., Miao, X.: A consensus algorithm based on risk assessment model for permissioned blockchain. Wirel. Commun. Mob. Comput. 2022, 1–21 (2022)
Fernando, P., et al.: Proof of sense: a novel consensus mechanism for spectrum misuse detection. IEEE Trans. Ind. Inf. 18(12), 9206–9216 (2022)
Zhou, Q., et al.: Vulnerability analysis of smart contract for blockchain-based IoT applications: a machine learning approach. IEEE Internet Things J. 9(24), 24695–24707 (2022)
Wu, N., Lei, Xu., Zhu, L.: A blockchain based access control scheme with hidden policy and attribute. Future Gener. Comput. Syst. 141, 186–196 (2023)
Laghari, A.A., et al.: Lightweight-biov: blockchain distributed ledger technology (bdlt) for internet of vehicles (iovs). Electronics 12(3), 677 (2023)
Khan, A.A., et al.: Data security in healthcare industrial Internet of Things with blockchain. IEEE Sens. J. (2023). https://doi.org/10.1109/JSEN.2023.3273851
Janani, K., Ramamoorthy, S.: Defending IoT security infrastructure with the 6G network, and blockchain and intelligent learning models for the future research roadmap. In: Global, I.G.I. (ed.) Challenges and Risks Involved in Deploying 6G and NextGen Networks, pp. 177–203. Hershey (2022)
Khan, A.U., et al.: A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. Clust. Comput. 26(2), 945–960 (2023)
Khezr, S., Yassine, A., Benlamri, R.: Towards a secure and dependable IoT data monetization using blockchain and fog computing. Clust. Comput. 26(2), 1551–1564 (2023)
Author information
Authors and Affiliations
Contributions
Author A and B both are having a equal contribution
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Janani, K., Ramamoorthy, S. A security framework to enhance IoT device identity and data access through blockchain consensus model. Cluster Comput 27, 2877–2900 (2024). https://doi.org/10.1007/s10586-023-04113-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-023-04113-8