Advertisement

Blockchain for Security Issues of Internet of Things (IoT)

  • Riya Sapra
  • Parneeta DhaliwalEmail author
Chapter
Part of the Intelligent Systems Reference Library book series (ISRL, volume 174)

Abstract

Today in the data driven world, technology has amazed us and changed our life completely. Internet of Things (IoT) has made our life easy by making conventional devices like air conditioner, mobile phones etc. autonomous and smart by revolutionizing the machine to machine communication. IoT is able to represent the real world digitally through the deployment of smart applications in various domains. These applications generate enormous amounts of data and also require internet connectivity all the time for communication between the devices. As the data is communicated via wireless networks, the major challenge lies in the domain of security such as data confidentiality, data reliability, data authentication, privacy etc. Blockchain can be the missing link for settling privacy, and reliability issues of IoT. The connected devices and their communications can be tracked and stored on the tamper-proof ledger of blockchain to ensure reliability and data security of IoT network.

Keywords

Internet of things IoT Blockchain Security Privacy Authentication RFID Bluetooth Applications 

References

  1. 1.
    Farooq, M.U., Waseem, M., Khairi, A. et al.: A critical analysis on the security concerns of Internet of Things (IoT). Int. J. Comput. Appl. 111(7) (2015) (New York)Google Scholar
  2. 2.
    Sandeep, C.H.: Security challenges and issues of the IoT system. Ind. J. Pub. Health Res. Dev. 9(11), 748–753 (2018). (India)CrossRefGoogle Scholar
  3. 3.
    Pancaroglu, D., Sen, S.: An analysis of the current state of security in the Internet of Things. In: International Conference on Cyber Security and Computer Science (ICONCS’18), Turkey (2018)Google Scholar
  4. 4.
    Brody, P., Pureswaran, V.: Device democracy: saving the future of the Internet of Things. In: IBM Executive Report (2014)Google Scholar
  5. 5.
    Dhaliwal, P., Bhatia, M.P.S., Bansal, P.: A cluster-based approach for outlier detection in dynamic data streams (KORM: k-median outlier miner). J. Comput. 2(2) (2010)Google Scholar
  6. 6.
    Vo HT, Mehedy L, Mohania M, et al. (2017) Blockchain-based data management and analytics for micro-insurance applications. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 2539–2542 (Singapore)Google Scholar
  7. 7.
    Kim, H.W., Jeong, Y.S.: Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain. Hum. Cent. Comput. Inform. Sci. 8(1), 11 (2018)CrossRefGoogle Scholar
  8. 8.
    Brown, R.G., Carlyle, J., Grigg, I., et al.: Corda: An Introduction. R3 CEV, p. 15 (2016)Google Scholar
  9. 9.
    Olleros, F.X., Zhegu, M., (eds.).: Research Handbook on Digital Transformations. Edward Elgar Publishing, USA (2016)Google Scholar
  10. 10.
    Ahanger, T.A., Aljumah, A.: Internet of Things: a comprehensive study of security issues and defense mechanisms. IEEE Access 7, 11020–11028 (2019) CrossRefGoogle Scholar
  11. 11.
    Salvador, J.C., Uceda, J.M.R., Muiños, V.C., Lopez, J.R., et al.: Ubiquitous computing and its applications in the disease management in a ubiquitous city. J. Comput. Commun. 6(03), 19 (2018)CrossRefGoogle Scholar
  12. 12.
    Buyya, R., Srirama, S.N. (eds.) Fog and Edge Computing: Principles and Paradigms. Wiley (2019)Google Scholar
  13. 13.
    Tiwari, U.K., Matta, P.: Efficient smart-home architecture: an application of Internet of Things. In: Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE) 2019, India. Available at SSRN 3350330 (2019)Google Scholar
  14. 14.
    Misri, S., Navghare, S., Sawant, S., et al.: IoT enabled prepaid electricity meter. In: 2nd International Conference on Advances in Science & Technology (ICAST) 2019, India. Available at SSRN 3368204 (2019)Google Scholar
  15. 15.
    Singh, T.A., Chandra, J.: IOT based green house monitoring system. JCS 14(5), 639–644 (2018). (Dubai)Google Scholar
  16. 16.
    Kumar, N.S., Nirmalkumar, P.: An intelligent decision-support system for telemedicine. Appl. Math. 12(5), 983–993 (2018). (New York)Google Scholar
  17. 17.
    Xu, J., Chen, G., Xie, M.: Vision-guided automatic parking for smart car. In: Proceedings of the IEEE Intelligent Vehicles Symposium 2000, pp. 725–730, USA (2000)Google Scholar
  18. 18.
    Khari, M., Kumar, M., Vij, S., Pandey, P.: Internet of Things: proposed security aspects for digitizing the world. In: 3rd International IEEE Conference on Computing for Sustainable Global Development (INDIACom), pp. 2165–2170. India (2016)Google Scholar
  19. 19.
    Al-Fuqaha, A., Guizani, M., Mohammadi, M., et al.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tut. 17(4), 2347–2376 (2015)CrossRefGoogle Scholar
  20. 20.
    Kumar, S.A, Vealey, T., Srivastava, H.: Security in Internet of Things: challenges, solutions and future directions. In: 49th Hawaii International IEEE Conference on System Sciences (HICSS), pp. 5772–5781. Hawaii (2016)Google Scholar
  21. 21.
    Qiu, T., Chen, N., Li, K., et al.: How can heterogeneous Internet of Things build our future: a survey. IEEE Commun. Surv. Tut. 20(3), 2011–2027 (2018)CrossRefGoogle Scholar
  22. 22.
    Kasturi, K., Reddy, P.V., Rao, N.A., Vinod, S.: A review of architecture and applications for Internet of Things. Adv. Nat. Appl. Sci. 10(9 SE), 261–267 (2016). (Jordan)Google Scholar
  23. 23.
    Sapra, R., Dhaliwal, P.: Blockchain: the new era of technology. In: 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 495–499 (2018) (India)Google Scholar
  24. 24.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  25. 25.
    Niranjanamurthy, M., Nithya, B.N., Jagannatha, S.: Analysis of blockchain technology: pros, cons and SWOT. Cluster Comput., 1–15 (2018)Google Scholar
  26. 26.
    Rouhani, S., Butterworth, L., Simmons, A.D., et al.: MediChainTM: a secure decentralized medical data asset management system. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Canada (2019)Google Scholar
  27. 27.
    Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper 3, 37 (2014)Google Scholar
  28. 28.
    King, S., Nadal, S.: Ppcoin: peer-to-peer crypto-currency with proof-of-stake. Self-published Paper (2012)Google Scholar
  29. 29.
    Nguyen, G.T., Kim, K.: A survey about consensus algorithms used in blockchain. J. Inform. Process. Syst. 14(1), 101–128 (2018). KoreaGoogle Scholar
  30. 30.
    Castro, M., Liskov, B.: Practical byzantine fault tolerance. OSDI 99, 173–186 (1999)Google Scholar
  31. 31.
    Lerner, S.D.: Rootstock: Bitcoin powered smart contracts. White Paper (2015)Google Scholar
  32. 32.
    Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper (2014)Google Scholar
  33. 33.
    Kosba, A., Miller, A., Shi, E., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858, San Francisco (2016)Google Scholar
  34. 34.
    Gatteschi, V., Lamberti, F., Demartini, C., et al.: Blockchain and smart contracts for insurance: is the technology mature enough? Future Int. 10(2), 20 (2018)CrossRefGoogle Scholar
  35. 35.
  36. 36.
    Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, Inc., CA (2014)Google Scholar
  37. 37.
    Katuwal, G.J., Pandey, S., Hennessey, M., et al.: Applications of blockchain in healthcare: current landscape & challenges. In: arXiv preprint. arXiv:1812.02776
  38. 38.
  39. 39.
    Duffield, E., Diaz, D.: Dash: a privacy centric crypto currency. White Paper (2018)Google Scholar
  40. 40.
    Sheetal, M., Venkatesh, K.A.: Necessary requirements for blockchain technology and its applications. Int. J. Comput. Sci. Inf. Technol. (2018)Google Scholar
  41. 41.
    Azaria, A., Ekblaw, A., Vieira, T., et al.: Medrec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD), pp. 25–30 (2016)Google Scholar
  42. 42.
    Eze, P., Eziokwu, T., Okpara, C.: A triplicate smart contract model using blockchain technology. In: Circulation in Computer Science, Special Issue on Disruptive Computing, Cyber-Physical Systems (CPS), and Internet of Everything (IoE), pp. 1–10 (2017)Google Scholar
  43. 43.
  44. 44.
  45. 45.
    Baskar, R., Raja, P.K., Joseph, C., et al.: Sinkhole attack in wireless sensor networks performance analysis and detection methods. Ind. J. Sci. Technol. 10(12) (2017) (India)Google Scholar
  46. 46.
    Shruthi, C., Asha, M.: Dos attack and suspicious activity detection for a book application. Int. J. Sci. Res. Comput. Sci. Eng. Inform. Technol. 3(6), 175–180 (2018)Google Scholar
  47. 47.
    Palacharla, S., Chandan, M., GnanaSuryaTeja, K., et al.: Wormhole attack: a major security concern in Internet of Things (IoT). Int. J. Eng. Technol. 7(3.27), 147–150 (2018)CrossRefGoogle Scholar
  48. 48.
    Pawar, S., Vanwari, P.: Sybil attack in Internet of Things. Int. J. Eng. Innov. Technol. (IJESIT) 5(4), 96–105 (2016)Google Scholar
  49. 49.
    Mehetre, D.C., Roslin, S.E., Wagh, S.J.: Detection and prevention of black hole and selective forwarding attack in clustered WSN with active trust. Cluster Comput., 1–16 (2018)Google Scholar
  50. 50.
    Adat, V., Gupta, B.B.: Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. 67(3), 423–441 (2018)CrossRefGoogle Scholar
  51. 51.
    Makhdoom, I., Abolhasan, M., Abbas, H., et al.: Blockchain’s adoption in IoT: the challenges, and a way forward. J. Netw. Comput. Appl. (2018)Google Scholar
  52. 52.
    Yu, Y., Li, Y., Tian, J., et al.: Blockchain-based solutions to security and privacy issues in the Internet of Things. IEEE Wirel. Commun. 25(6), 12–18 (2018)CrossRefGoogle Scholar
  53. 53.
    Fernández-Caramés, T.M., Fraga-Lamas, P.: A review on the use of blockchain for the Internet of Things. IEEE Access 6, 32979–33001 (2018)CrossRefGoogle Scholar
  54. 54.
    Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)CrossRefGoogle Scholar
  55. 55.
    Dhaliwal, P., Bhatia, M.P.S.: Effective handling of recurring concept drifts in data streams. Indian J. Sci. Technol. 10(30), 1–6 (2017). (India)CrossRefGoogle Scholar
  56. 56.
    Friese, I., Heuer, J., Kong, N.: Challenges from the Identities of Things: introduction of the Identities of Things discussion group within Kantara initiative. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 1–4 (2014)Google Scholar
  57. 57.
    Otte, P., De Vos, M., Pouwelse, J.: TrustChain: a sybil-resistant scalable blockchain. Future Gener. Comput. Syst. (2017)Google Scholar
  58. 58.
    Dhaliwal, P.: An ensemble approach for handling the novel instances in dynamic data. In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 19–23. India (2018)Google Scholar
  59. 59.
    Pustišek, M., Kos, A.: Approaches to front-end IoT application development for the Ethereum blockchain. Proc. Comput. Sci. 129, 410–419 (2018)CrossRefGoogle Scholar
  60. 60.
    Bahga, A., Madisetti, V.K.: Blockchain platform for industrial Internet of Things. J. Softw. Eng. Appl. 9(10), 533 (2016)CrossRefGoogle Scholar
  61. 61.
    Suma, N., Samson, S.R., Saranya, S., et al.: IOT based smart agriculture monitoring system. Int. J. Recent Innov. Trends comput. Commun. 5(2), 177–181 (2017)Google Scholar
  62. 62.
    Porkodi, R., Bhuvaneswari, V.: The Internet of Things (IOT) applications and communication enabling technology standards: an overview. In: 2014 International Conference on Intelligent Computing Applications, pp. 324–329 (2014)Google Scholar
  63. 63.
    Smith, D., Lyle, S., Berry, A. et al.: Internet of Animal Health Things (IoAHT) Opportunities and Challenges. University of Cambridge, England (2015)Google Scholar
  64. 64.
    Mattila, J.: The blockchain phenomenon. In: Berkeley Roundtable on the International Economy (BRIE), pp. 2016–1 (2016)Google Scholar
  65. 65.
    Reyna, A., Martín, C., Chen, J., et al.: On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 88, 173–190 (2018)CrossRefGoogle Scholar
  66. 66.
    Sullivan, C., Burger, E.: E-residency and blockchain. Comput. Law Secur. Rev. 33(4), 470–481 (2017)CrossRefGoogle Scholar
  67. 67.
  68. 68.
  69. 69.
  70. 70.
  71. 71.
  72. 72.
  73. 73.
  74. 74.
  75. 75.
    Samaniego, M., Deters, R.: Internet of Smart Things-IoST: using blockchain and clips to make things autonomous. In: 2017 IEEE International Conference on Cognitive Computing (ICCC), pp. 9–16 (2017)Google Scholar
  76. 76.
    Morgan, J.P.: Quorum Whitepaper. JP Morgan Chase, New York (2016)Google Scholar
  77. 77.
    Mengelkamp, E., Gärttner, J., Rock, K.: Designing microgrid energy markets: a case study: the Brooklyn microgrid. Appl. Energy 210, 870–880 (2018)CrossRefGoogle Scholar
  78. 78.
  79. 79.
  80. 80.
  81. 81.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and TechnologyManav Rachna UniversityFaridabadIndia

Personalised recommendations