A Dynamic Scalable Blockchain Based Communication Architecture for IoT
The recent development of Blockchain based cryptocurrency technology has enabled a high level of trust and security for many applications in people’s daily life. Traditional Blockchain architecture can provide decentralized and trustworthy systems for financial services with persistency, anonymity, and auditability guaranteed. Internet of Things (IoT), as the next promising smart system, has the similar decentralized topology with Blockchain. However, deploying Blockchain in IoT system is still unpractical in many aspects. In this paper, we first point out the practical obstacles to deploy Blockchain topology in IoT system. Then a dynamic Blockchain based trust system is proposed to provide a dynamic and scalable communication architecture for IoT networks. We also present a case study to further discuss the security issues and provide future research directions.
KeywordsBlockchain IoT Trust Security Bitcoin Privacy
Dr. H. Qiu and Prof. G. Memmi are supported by BART: Blockchain Advanced Research & Technologies teamed up by Telecom-ParisTech, Inria, IRT SystemX and Telecom-SudParis. This work is also partially supported by China NSFC 61836005 and 61672358; China NSFC 61728303 and the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (ICT1800417). Prof. M. Qiu is the corresponding author.
- 1.Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media Inc., Newton (2014)Google Scholar
- 3.Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618–623. IEEE (2017)Google Scholar
- 4.Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: a lightweight scalable blockchain for IoT security and privacy. arXiv preprint arXiv:1712.02969 (2017)
- 8.Li, C., Qiu, M.: Reinforcement Learning for Cyber Physical Systems with Cybersecurity Case Studies. Chapman & Hall/CRC, Boca Raton (2018)Google Scholar
- 9.Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R., et al.: Identity authentication and capability based access control (IACAC) for the Internet of Things. J. Cyber Secur. Mobil. 1(4), 309–348 (2013)Google Scholar
- 10.Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
- 12.Qiu, H., Memmi, G., Noura, H.: An efficient secure storage scheme based on information fragmentation. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 108–113. IEEE (2017)Google Scholar
- 15.Wu, D., Arkhipov, D.I., Asmare, E., Qin, Z., McCann, J.A.: UbiFlow: mobility management in urban-scale software defined IoT. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 208–216. IEEE (2015)Google Scholar
- 17.Zheng, Z., Xie, S., Dai, H.N., Wang, H.: Blockchain challenges and opportunities: a survey. Work Pap.-2016 (2016)Google Scholar