Skip to main content

Advertisement

Log in

BSSFFS: blockchain-based sybil-secured smart forest fire surveillance

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Forest fires can have multiple engenderers including lighting and thunder, unauthorized human exercises, and unrestrained fire projects. In addition to precautions, quick detection, immediate communication, and prompt response are critical to keeping losses to life and property at bay. This work presents Sybil-secured Smart Forest Fire Surveillance based on Blockchain Technology. This work encompasses a detailed three-layer architecture consisting of IoT Layer (sensors planted in the forest), Fog Layer (a decentralized network of fog nodes), and Cloud Layer (Blockchain-based cloud storage capable of computations, decision making, and forecasting). Further, a Blockchain technology-based framework for secured and Sybil-protected data transmission in wildfire scenarios is proposed here. Moreover, an energy-efficient Blockchain consensus algorithm has also been designed and implemented here. Numerous QoS metrics have been considered and used for the evaluation of the proposed system. This work opens the gate to a vista of further research for secure data transmission in wildfire scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36

Similar content being viewed by others

References

  • Abdelbar AM, Salama KM (2019) Parameter self-adaptation in an ant colony algorithm for continuous optimization. IEEE Access 7:18464–18479

    Article  Google Scholar 

  • Abraham I, Devadas S, Dolev D, Nayak K, Ren L (2017) Efficient synchronous byzantine consensus. arXiv preprint arXiv:abs/1704.02397

  • Agrawal R, Verma P, Sonanis R, Goel U, De A, Kondaveeti SA, Shekhar S (2018). Continuous security in IoT using blockchain. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 6423–6427. IEEE

  • Alachkar K, Gaastra D (2018) Blockchain-based sybil attack mitigation: a case study of the I2P Network. August, 22, 1–13

  • Alassaf N, Alkazemi B, Gutub A (2003) Applicable light-weight cryptography to secure medical data in IoT systems. Arabia

  • Alassaf N, Gutub A, Parah SA, Al Ghamdi M (2019) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl 78(23):32633–32657

    Article  Google Scholar 

  • Al-Ghamdi M, Al-Ghamdi M, Gutub A (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78(12):16283–16310

    Article  Google Scholar 

  • AlKhodaidi T, Gutub A (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng 45(4):3403–3423

    Article  Google Scholar 

  • Almazrooie M, Samsudin A, Gutub AAA, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ-Comput Inf Sci 32(1):24–34

    Google Scholar 

  • Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A (2019) Secure mobile computing authentication utilizing hash, cryptography and steganography combination. J Inf Secur Cybercrimes Res 2(1):73–82

    Google Scholar 

  • Aly SA, Alghamdi TA, Salim M, Gutub AA (2013) Data dissemination and collection algorithms for collaborative sensor devices using dynamic cluster heads. Trends Appl Sci Res 8(2):55

    Article  Google Scholar 

  • Bahga A, Madisetti VK (2016) Blockchain platform for industrial internet of things. J Softw Eng Appl 9(10):533–546

    Article  Google Scholar 

  • Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in WSNs for IoT application. IEEE Internet Things J 6(3):5132–5139

    Article  Google Scholar 

  • Ben-Or M (1983) Another advantage of free choice: completely asynchronous agreement protocols (Extended Abstract). In: Proceedings of the 2nd ACM annual symposium on principles of distributed computing. Montreal, Quebec, pp 27–30

  • Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In: 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1392–1393. IEEE

  • Bochem A, Leiding B, Hogrefe D (2018) Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. In: International conference on security and privacy in communication systems. Springer, Cham, pp. 358–374

  • Bouabdellah K, Noureddine H, Larbi S (2013) Using wireless sensor networks for reliable forest fires detection. Procedia Comput Sci 19:794–801

    Article  Google Scholar 

  • Brazilian amazon fires deforestation report (2019) https://news.mongabay.com/2019/09/brazilian-amazon-fires-scientifically-linked-to-2019-deforestation-report/

  • Castro M, Liskov B (1999) Practical byzantine fault tolerance. In: OSDI vol 99, no 1999, pp 173–186

  • Chen J, Micali S (2016) Algorand. arXiv preprint arXiv:abs/1607.01341

  • Chen B, Tan Z, Fang W (2018) Blockchain-based implementation for financial product management. In: 2018 28th international telecommunication networks and applications conference (ITNAC), pp 1–3. IEEE

  • Cui F (2020) Deployment and integration of smart sensors with IoT devices detecting fire disasters in huge forest environment. Comput Commun 150:818–827

    Article  Google Scholar 

  • Curtis S, Zafar B, Gutub A, Manocha D (2013) Right of way. Vis Comput 29(12):1277–1292

    Article  Google Scholar 

  • Datta S, Das AK, Kumar A, Sinha D (2019) Authentication and privacy preservation in IoT based forest fire detection by using blockchain—a review. In: International conference on internet of things and connected technologies. Springer, Cham, pp 133–143

  • Dolev D, Strong HR (1983) Authenticated algorithms for Byzantine agreement. SIAM J Comput 12(4):656–666

    Article  MathSciNet  Google Scholar 

  • Dolev D, Fischer MJ, Fowler R, Lynch NA, Strong HR (1982) An efficient algorithm for Byzantine agreement without authentication. Inf Control 52(3):257–274

    Article  MathSciNet  Google Scholar 

  • Dorri A, Roulin C, Jurdak R, Kanhere SS (2019) On the activity privacy of blockchain for IoT. In: 2019 IEEE 44th conference on local computer networks (LCN), pp 258–261. IEEE

  • Farooqi N, Gutub A, Khozium MO (2019) Smart community challenges: enabling IoT/M2M technology case study. Life Sci J 16(7)

  • Feldman P, Micali S (1989) An optimal probabilistic algorithm for synchronous byzantine agreement. In: International colloquium on automata, languages, and programming. Springer, Berlin, pp 341–378

  • Forest Survey of India (2011). http://www.fsi.nic.in/cover_2011/chapter2.pdf.

  • Gong S, Lee C (2020) Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance. Electronics 9(3):521

    Article  Google Scholar 

  • Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631–2644

    Article  Google Scholar 

  • Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619

    Article  Google Scholar 

  • Jan MA, Nanda P, He X, Liu RP (2018) A Sybil attack detection scheme for a forest wildfire monitoring application. Futur Gener Comput Syst 80:613–626

    Article  Google Scholar 

  • Katz J, Koo CY (2006) On expected constant-round protocols for Byzantine agreement. In: Annual international cryptology conference. Springer, Berlin, pp 445–462

  • Kaur H, Sood SK (2019a) Adaptive neuro fuzzy inference system (ANFIS) based wildfire risk assessment. J Exp Theor Artif Intell 31(4):599–619

    Article  Google Scholar 

  • Kaur H, Sood SK (2019b) Fog-assisted IoT-enabled scalable network infrastructure for wildfire surveillance. J Netw Comput Appl 144:171–183

    Article  Google Scholar 

  • Kim S, Guy SJ, Hillesland K, Zafar B, Gutub AAA, Manocha D (2015) Velocity-based modeling of physical interactions in dense crowds. Vis Comput 31(5):541–555

    Article  Google Scholar 

  • Kumar G, Saha R, Rai MK, Thomas R, Kim TH (2019) Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE Internet Things J 6(4):6835–6842

    Article  Google Scholar 

  • Lamport L (2001) Paxos made simple. ACM SIGACT News 32(4):18–25

    Google Scholar 

  • Lamport L, Shostak R, Pease M (2019) The Byzantine Generals problem. In: Concurrency: the works of leslie lamport, pp 203–226

  • Liu, Q., Guan, Q., Yang, X., Zhu, H., Green, G., & Yin, S. (2018, August). Education-industry cooperative system based on blockchain. In 2018 1st IEEE international conference on hot information-centric networking (HotICN) (pp. 207–211). IEEE.

  • Mahmoud MA, Ren H (2018) Forest fire detection using a rule-based image processing algorithm and temporal variation. Mathematical Problems in Engineering

  • Micali, S. Byzantine agreement made trivial (2018) https://pEOPle.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Distributed%20Computation/BYZANTYNE%20AGREEMENT%20MADE%20TRIVIAL.pdf

  • Miller A, Xia Y, Croman K, Shi E, Song D (2016) The honey badger of BFT protocols. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 31–42

  • Mishra AK, Tripathy AK, Puthal D, Yang LT (2018) Analytical model for sybil attack phases in internet of things. IEEE Internet Things J 6(1):379–387

    Article  Google Scholar 

  • Misra S, Mukherjee A, Roy A, Saurabh N, Rahulamathavan Y, Rajarajan M (2020) Blockchain at the edge: performance of resource-constrained IoT networks. IEEE Trans Parallel Distrib Syst 32(1):174–183

    Article  Google Scholar 

  • Moinet A, Darties B, Baril JL (2017) Blockchain based trust & authentication for decentralized sensor networks. arXiv preprint arXiv:abs/1706.01730

  • Najjar M (2015) d-HMAC—an improved HMAC algorithm. Int J Comput Sci Inf Secur 13(4):89

    Google Scholar 

  • National Interagency Fire Center (NIFC) report (2019) https://www.nifc.gov/

  • Newsome, J., Shi, E., Song, D., & Perrig, A. (2004) The sybil attack in sensor networks: analysis & defenses. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 259–268). IEEE.

  • Novo O (2018) Scalable access management in IoT using blockchain: a performance evaluation. IEEE Internet Things J 6(3):4694–4701

    Article  Google Scholar 

  • Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IOT: modelling and defenses. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), pp 2323–2327. IEEE

  • Ramezan G, Leung C (2018) A blockchain-based contractual routing protocol for the internet of things using smart contracts. Wirel Commun Mob Comput

  • Reeds J (2019) A review of Sybil attack in wireless sensor networks. https://www.ivoryresearch.com/writers/15429-2/

  • Roy DG, De D, Alam MM, Chattopadhyay S (2016) Multi-cloud scenario based QoS enhancing virtual resource brokering. In: 2016 3rd international conference on recent advances in information technology (RAIT), pp 576–581. IEEE

  • Roy DG, Das P, De D, Buyya R (2019) QoS-aware secure transaction framework for internet of things using blockchain mechanism. J Netw Comput Appl 144:59–78

    Article  Google Scholar 

  • Shaker SH (2014) HMAC modification using new random key generator. Iraqi J Comput Commun Control Syst Eng 14(1):72–82

    MathSciNet  Google Scholar 

  • Sharanappa PH, Kakkasageri MS (2019) Intelligent Information Gathering Scheme in Internet of Things (IoT). In: 2019 11th International Conference on Advanced Computing (ICoAC), pp 134–138. IEEE

  • Sinha D, Kumari R, Tripathi S (2019) Semisupervised classification based clustering approach in WSN for forest fire detection. Wirel Pers Commun 109(4):2561–2605

    Article  Google Scholar 

  • Stula M, Krstinic D, Seric L (2012) Intelligent forest fire monitoring system. Inf Syst Front 14(3):725–739

    Article  Google Scholar 

  • Sudhakar S, Vijayakumar V, Kumar CS, Priya V, Ravi L, Subramaniyaswamy V (2020) Unmanned Aerial Vehicle (UAV) based Forest Fire Detection and monitoring for reducing false alarms in forest-fires. Comput Commun 149:1–16

    Article  Google Scholar 

  • Toledo-Castro J, Caballero-Gil P, Rodríguez-Pérez N, Santos-González I, Hernández-Goya C, Aguasca-Colomo R (2018) Forest fire prevention, detection, and fighting based on fuzzy logic and wireless sensor networks. Complexity

  • Tosh D, Shetty S, Foytik P, Kamhoua C, Njilla L (2018) CloudPoS: a proof-of-stake consensus design for blockchain integrated cloud. In: 2018 IEEE 11th international conference on cloud computing (CLOUD), pp 302–309. IEEE

  • Tuli S, Mahmud R, Tuli S, Buyya R (2019) Fogbus: a blockchain-based lightweight framework for edge and fog computing. J Syst Softw 154:22–36

    Article  Google Scholar 

  • Wang X, Xu X, Feagan L, Huang S, Jiao L, Zhao W (2018) Inter-bank payment system on enterprise blockchain platform. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp 614–621. IEEE

  • Yánez W, Mahmud R, Bahsoon R, Zhang Y, Buyya R (2020) Data allocation mechanism for Internet-of-Things systems with blockchain. IEEE Internet Things J 7(4):3509–3522

    Article  Google Scholar 

  • Yoshida H, Biryukov A (2005) Analysis of a SHA-256 variant. In: International workshop on selected areas in cryptography. Springer, Berlin, pp 245–260

  • Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375

    Article  Google Scholar 

  • Zheng Z, Pan J, Cai L (2020) Lightweight Blockchain consensus protocols for vehicular social networks. IEEE Trans Veh Technol 69(6):5736–5748

    Article  Google Scholar 

Download references

Acknowledgements

This research is found in parts by DST-SERB project ECR/2017/000983 Grants. The authors would like to thank DST-SERB for this support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ditipriya Sinha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Datta, S., Kumar, S., Sinha, D. et al. BSSFFS: blockchain-based sybil-secured smart forest fire surveillance. J Ambient Intell Human Comput 13, 2479–2510 (2022). https://doi.org/10.1007/s12652-021-03591-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03591-1

Keywords

Navigation