Advertisement

Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review

  • Sreemana DattaEmail author
  • Ayan Kumar Das
  • Abhijeet Kumar
  • Khushboo
  • Ditipriya Sinha
Conference paper
  • 6 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1122)

Abstract

Internet of Things (IoT) has garnered a good chunk of limelight with the emerging advancements in technologies. It comprises of heterogeneous devices embedded with sensors, which are able to communicate directly with each other without any human intervention. In this paper, a survey has been done on authentication and privacy in IoT using Blockchain during Forest Fire. The purpose of Blockchain is to design a data structure to construct a distributed ledger of transactions that cannot be tampered by any third party. The blockchain forms by cryptographically linked blocks of transactions. Public-key cryptography is used to sign transactions among users in blockchain technology. It achieves privacy very strongly as it is very difficult to modify or delete blocks of data which are stored in the ledger of blockchain.

Keywords

IoT Blockchain Forest Fire Validation Privacy 

Notes

Acknowledgement

This research is funded in parts by DST/SERB project ECR/2017/000983 grants. The authors are grateful to DST/SERB for the support.

References

  1. 1.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 787–2805 (2010)CrossRefGoogle Scholar
  2. 2.
    Satendra, Kaushik, A.D.: Forest Fire Diaster Management. Published by National Institute of Disaster Management, Ministry of Home Affairs, New Delhi (2014)Google Scholar
  3. 3.
    Hefeeda, M.: Forest fire modeling and early detection using wireless sensor networks. ACM J. 5 (2009)Google Scholar
  4. 4.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Proc. CACM 21, 120–126 (1978)CrossRefGoogle Scholar
  5. 5.
    Sun, H.-M., Wu, M.-E.: An Approach Towards Rebalanced RSA-CRT with Short Public Exponent. Cryptology, ePrint Archive: Report 2005/053 (2005). http://eprint.iacr.org/2005/053
  6. 6.
    Wu, C.-H., Hong, J.-H., Wu, C.-W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Proceedings of 2001 Asia and South Pacific Design Automation Conference ASP-DAC 2001. ACM, New York (2001)Google Scholar
  7. 7.
    Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of CCS06, Alexandria, Virginia, USA. ACM 1-59593- 518-5/06/0010 (2006)Google Scholar
  8. 8.
    Karunakaran, S., Thangara, P.: An adaptive weighted cluster based routing (AWCBRP) protocol for mobile ad-hoc networks. J. WSEAS Trans. Commun. 7, 248–257 (2008)Google Scholar
  9. 9.
    Zheng, Z., Wu, Z., Lin, H., Zheng, K.: CRAM: an energy efficient routing algorithm for wireless sensor networks. In: Proceedings of 19th International Symposium, Kemer-Antalya, Turkey (2004)Google Scholar
  10. 10.
    Liu, C., Wu, J.: Scalable routing in delay tolerant network. In: Proceedings of MobiHoc 2007 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 51–60. ACM Digital Library (2007).  https://doi.org/10.1145/1288107.1288115. ISBN 978-1-59593-684-4
  11. 11.
    Chauhan, N., Awasthi, L.K., Chand, N., Chugh, A.: A distributed weighted cluster based routing protocol for MANETs. In: Proceedings of Second International Conference on Advances in Communication, Network and Computing, CNC 2011, Bangalore, India. CCIS, vol. 142, pp. 147–151. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-19542-6, ISBN 978-3-642-19541-9 (print), 978-3-642-19542-6 (online)Google Scholar
  12. 12.
    Majumder, A., Sarma, N.: DEMAC: a cluster-based topology control for ad hoc networks. IJCSI – Int. J. Comput. Sci. Issues 7(5), 82–88 (2010). ISSN (Online) 1694-0814Google Scholar
  13. 13.
    Jiang, M., Li, J., Tay, Y.C.: Cluster based routing protocol (CBRP). In: INTERNET-DRAFT draft-ietf-manet-cbrp-spec01.tx, July 1999Google Scholar
  14. 14.
    Hossein, O., Saadawi, T.: Ant routing algorithm for mobile ad hoc networks (ARAMA). In: Proceedings of 22nd IEEE International Performance, Computing, and Communications Conference, April 2003, Phoenix, Arizona, USA, pp. 281–290 (2003)Google Scholar
  15. 15.
    Gunes, M., Sorges, U., Bouazizi, I.: ARA- the ant colony based routing algorithm for MANET. In: Proceedings of International Workshop on Ad-hoc Networking (IWAHN 2002), pp. 18–22, August 2002Google Scholar
  16. 16.
    Dorigo, M.: Ant colony optimization. http://iridia.ulb.ac.be/mdorigo/ACO/ACO.html. In Dynamic Routing in Traffic Networks Using AntNet
  17. 17.
    Ducatelle, F., De Caro, G., Gamardella, L.M.: Ant agents for hybrid multipath routing in MANETs. IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland (2005)Google Scholar
  18. 18.
    Camilo, T., Carreto, C., Silva, J.S., Boavida, F.: An energy-efficient ant-based routing algorithm for wireless sensor networks (2006)CrossRefGoogle Scholar
  19. 19.
    Ghazy, A.M., Fatma, E.L.L., Hefny, H.A.: Threshold based AntNet algorithm for dynamic traffic routing of road networks Egypt. Inform. J. 13, 111–121 (2012)CrossRefGoogle Scholar
  20. 20.
    Lu, Y., Zhao, G., Su, F.: Adaptive ant-based dynamic routing algorithm (2004)Google Scholar
  21. 21.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash SystemGoogle Scholar
  22. 22.
    Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. Commun. Surv. Tutorials 20, 3416–3452 (2018)CrossRefGoogle Scholar
  23. 23.
    Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger Eip-150 RevisionGoogle Scholar
  24. 24.
    Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems (2017)Google Scholar
  25. 25.
    Adam Back: Hashcash - A Denial of Service Counter-Measure. http://www.hashcash.org/hashcash.pdf
  26. 26.
    Cachin, C.: Architecture of the Hyperledger Blockchain Fabric. https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf
  27. 27.
    Gideon Greenspan, Founder and CEO, Coin Sciences Ltd, “MultiChain Private Blockchain—White Paper”. https://www.multichain.com/download/MultiChain-White-Paper.pdf
  28. 28.
    Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain distributed solution to automated security and privacy. https://allquantor.at/blockchainbib/pdf/dorri2017blockchaindistributed.pdf
  29. 29.
    Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system (2019)Google Scholar
  30. 30.
    Roulin, C., Dorri, A., Jurdak, R., Kanhere, S.S.: On the Activity Privacy of Blockchain for IoT. https://arxiv.org/pdf/1812.08970.pdf
  31. 31.
    Eyal, I., Sirer, E.G.: Majority is not Enough: Bitcoin Mining is Vulnerable. https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf
  32. 32.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf?
  33. 33.
    Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A Survey on Security and Privacy Issues of Bitcoin. https://arxiv.org/pdf/1706.00916
  34. 34.
    Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78 (2018).  https://doi.org/10.1016/j.cose.2018.06.004CrossRefGoogle Scholar
  35. 35.
    Christidis, K.: Blockchains and Smart Contracts for the Internet of Things. http://ieeexplore.ieee.org/iel7/6287639/6514899/07467408.pdf
  36. 36.
    Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. https://dl.acm.org/citation.cfm?id=3055003
  37. 37.
    Sharma, H.J., Dhawan, A.: An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks (2013)Google Scholar
  38. 38.
    Douceur, J.R.: The Sybil attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 792–796 (2013)zbMATHGoogle Scholar
  39. 39.
    Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 6, 379–387 (2018)CrossRefGoogle Scholar
  40. 40.
    Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security, pp. 507–527. Springer, Heidelberg (2015)CrossRefGoogle Scholar
  41. 41.
    Bochem, A., Leiding, B., Hogrefe, D.: Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. SecureComm (2018)Google Scholar
  42. 42.
    Aydos, M., Sunar, B., Koc, C.K.: An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)Google Scholar
  43. 43.
    Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: Ring CT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: SCOPUS. LNCS (LNAI, LNB), vol. 10493, pp. 456–474. Springer, Heidelberg (2017)CrossRefGoogle Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Sreemana Datta
    • 1
    Email author
  • Ayan Kumar Das
    • 2
  • Abhijeet Kumar
    • 2
  • Khushboo
    • 2
  • Ditipriya Sinha
    • 1
  1. 1.National Institute of Technology PatnaPatnaIndia
  2. 2.Department of CSEBirla Institute of Technology, MesraMesraIndia

Personalised recommendations