Abstract
Internet of Things (IoT) has garnered a good chunk of limelight with the emerging advancements in technologies. It comprises of heterogeneous devices embedded with sensors, which are able to communicate directly with each other without any human intervention. In this paper, a survey has been done on authentication and privacy in IoT using Blockchain during Forest Fire. The purpose of Blockchain is to design a data structure to construct a distributed ledger of transactions that cannot be tampered by any third party. The blockchain forms by cryptographically linked blocks of transactions. Public-key cryptography is used to sign transactions among users in blockchain technology. It achieves privacy very strongly as it is very difficult to modify or delete blocks of data which are stored in the ledger of blockchain.
Keywords
- IoT
- Blockchain
- Forest Fire
- Validation
- Privacy
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 787–2805 (2010)
Satendra, Kaushik, A.D.: Forest Fire Diaster Management. Published by National Institute of Disaster Management, Ministry of Home Affairs, New Delhi (2014)
Hefeeda, M.: Forest fire modeling and early detection using wireless sensor networks. ACM J. 5 (2009)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-keycryptosystems. Proc. CACM 21, 120–126 (1978)
Sun, H.-M., Wu, M.-E.: An Approach Towards Rebalanced RSA-CRT with Short Public Exponent. Cryptology, ePrint Archive: Report 2005/053 (2005). http://eprint.iacr.org/2005/053
Wu, C.-H., Hong, J.-H., Wu, C.-W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Proceedings of 2001 Asia and South Pacific Design Automation Conference ASP-DAC 2001. ACM, New York (2001)
Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of CCS06, Alexandria, Virginia, USA. ACM 1-59593- 518-5/06/0010 (2006)
Karunakaran, S., Thangara, P.: An adaptive weighted cluster based routing (AWCBRP) protocol for mobile ad-hoc networks. J. WSEAS Trans. Commun. 7, 248–257 (2008)
Zheng, Z., Wu, Z., Lin, H., Zheng, K.: CRAM: an energy efficient routing algorithm for wireless sensor networks. In: Proceedings of 19th International Symposium, Kemer-Antalya, Turkey (2004)
Liu, C., Wu, J.: Scalable routing in delay tolerant network. In: Proceedings of MobiHoc 2007 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 51–60. ACM Digital Library (2007). https://doi.org/10.1145/1288107.1288115. ISBN 978-1-59593-684-4
Chauhan, N., Awasthi, L.K., Chand, N., Chugh, A.: A distributed weighted cluster based routing protocol for MANETs. In: Proceedings of Second International Conference on Advances in Communication, Network and Computing, CNC 2011, Bangalore, India. CCIS, vol. 142, pp. 147–151. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19542-6, ISBN 978-3-642-19541-9 (print), 978-3-642-19542-6 (online)
Majumder, A., Sarma, N.: DEMAC: a cluster-based topology control for ad hoc networks. IJCSI – Int. J. Comput. Sci. Issues 7(5), 82–88 (2010). ISSN (Online) 1694-0814
Jiang, M., Li, J., Tay, Y.C.: Cluster based routing protocol (CBRP). In: INTERNET-DRAFT draft-ietf-manet-cbrp-spec01.tx, July 1999
Hossein, O., Saadawi, T.: Ant routing algorithm for mobile ad hoc networks (ARAMA). In: Proceedings of 22nd IEEE International Performance, Computing, and Communications Conference, April 2003, Phoenix, Arizona, USA, pp. 281–290 (2003)
Gunes, M., Sorges, U., Bouazizi, I.: ARA- the ant colony based routing algorithm for MANET. In: Proceedings of International Workshop on Ad-hoc Networking (IWAHN 2002), pp. 18–22, August 2002
Dorigo, M.: Ant colony optimization. http://iridia.ulb.ac.be/mdorigo/ACO/ACO.html. In Dynamic Routing in Traffic Networks Using AntNet
Ducatelle, F., De Caro, G., Gamardella, L.M.: Ant agents for hybrid multipath routing in MANETs. IDSIA, Galleria 2, CH-6928 Manno-Lugano, Switzerland (2005)
Camilo, T., Carreto, C., Silva, J.S., Boavida, F.: An energy-efficient ant-based routing algorithm for wireless sensor networks (2006)
Ghazy, A.M., Fatma, E.L.L., Hefny, H.A.: Threshold based AntNet algorithm for dynamic traffic routing of road networks Egypt. Inform. J. 13, 111–121 (2012)
Lu, Y., Zhao, G., Su, F.: Adaptive ant-based dynamic routing algorithm (2004)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System
Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. Commun. Surv. Tutorials 20, 3416–3452 (2018)
Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger Eip-150 Revision
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems (2017)
Adam Back: Hashcash - A Denial of Service Counter-Measure. http://www.hashcash.org/hashcash.pdf
Cachin, C.: Architecture of the Hyperledger Blockchain Fabric. https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf
Gideon Greenspan, Founder and CEO, Coin Sciences Ltd, “MultiChain Private Blockchain—White Paper”. https://www.multichain.com/download/MultiChain-White-Paper.pdf
Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain distributed solution to automated security and privacy. https://allquantor.at/blockchainbib/pdf/dorri2017blockchaindistributed.pdf
Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system (2019)
Roulin, C., Dorri, A., Jurdak, R., Kanhere, S.S.: On the Activity Privacy of Blockchain for IoT. https://arxiv.org/pdf/1812.08970.pdf
Eyal, I., Sirer, E.G.: Majority is not Enough: Bitcoin Mining is Vulnerable. https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf?
Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A Survey on Security and Privacy Issues of Bitcoin. https://arxiv.org/pdf/1706.00916
Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78 (2018). https://doi.org/10.1016/j.cose.2018.06.004
Christidis, K.: Blockchains and Smart Contracts for the Internet of Things. http://ieeexplore.ieee.org/iel7/6287639/6514899/07467408.pdf
Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. https://dl.acm.org/citation.cfm?id=3055003
Sharma, H.J., Dhawan, A.: An Enhanced and efficient mechanism to detect Sybil attack in Wireless Sensor Networks (2013)
Douceur, J.R.: The Sybil attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(2), 792–796 (2013)
Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. 6, 379–387 (2018)
Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security, pp. 507–527. Springer, Heidelberg (2015)
Bochem, A., Leiding, B., Hogrefe, D.: Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. SecureComm (2018)
Aydos, M., Sunar, B., Koc, C.K.: An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. In: 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications Symposium on Information Theory (1998)
Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: Ring CT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: SCOPUS. LNCS (LNAI, LNB), vol. 10493, pp. 456–474. Springer, Heidelberg (2017)
Acknowledgement
This research is funded in parts by DST/SERB project ECR/2017/000983 grants. The authors are grateful to DST/SERB for the support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Datta, S., Das, A.K., Kumar, A., Khushboo, Sinha, D. (2020). Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham. https://doi.org/10.1007/978-3-030-39875-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-39875-0_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39874-3
Online ISBN: 978-3-030-39875-0
eBook Packages: EngineeringEngineering (R0)