Blockchain Technology as a Possible Solution to IoT Security Issues

Blockchain Technology as a Possible Solution to IoT Security Issues

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-1
Year of Publication : 2023
Author : Houda Lhore, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami
DOI : 10.14445/22315381/IJETT-V71I1P214

How to Cite?

Houda Lhore, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami, "Blockchain Technology as a Possible Solution to IoT Security Issues," International Journal of Engineering Trends and Technology, vol. 71, no. 1, pp. 152-163, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I1P214

Abstract
The Internet of things is the new generation of devices that use internet technology to communicate with each other, exchange information, and manage physical objects easily without needing any external intervention. With this novelty, the information generated in the network is massive and critical since it contains confidential information like banking information, personnel credentials, location and geographic information, and other sensitive data. As a result, the essential aspect of this system is ensuring security concerns such as privacy, confidentiality, authentication, and availability in order to implement and guarantee the IoT system’s service with a high level of security. This paper provides an overview of the Internet of Things systems, architectures, and security matters. Thus, to address security concerns and get beyond IoT system limitations, a Global hybrid architecture that combines a software solution based on Blockchain technology and hardware security primitive, which is the Physical Unclonable Function (PUF), has been proposed.

Keywords
Authentication, Availability, Confidentiality, Physical Unclonable Function, Privacy.

References
[1] Elham A. Shammar, Ammar T. Zahary, and Asma A. Al-Shargabi, “A Survey of IoT and Blockchain Integration: Security Perspective. IEEE Access, vol. 9, pp. 156114–156150, 2021. Crossref, https://doi.org/10.1109/ACCESS.2021.3129697
[2] Gyanendra Prasad Joshi, and Sung Won Kim, “Survey, Nomenclature and Comparison of Reader Anti-Collision Protocols in RFID,” IETE Technical Review, vol. 25, no. 5, pp. 234-243, 2008.
[3] Hany Fathy et al., “Internet of Things: State-of-the-Art, Challenges, Applications, and Open Issues,” InternationalJournal of Intelligent Computing Research (IJICR), vol. 9, no. 3, pp.928–938, 2018. Crossref, http://dx.doi.org/10.20533/ijicr.2042.4655.2018.0112
[4] ITU, The Internet of Things, Technical Report, ITU, 2005.
[5] ITU, Overview of the Internet of Things, Technical Report, ITU, 2012.
[6] Hong-Ning Dai, Zibin Zheng, and Yan Zhang, “Blockchain for Internet of Things: A Survey,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8076–8094, 2019. Crossref, https://doi.org/10.1109/JIOT.2019.2920987
[7] Smita Dange, and Madhumita Chatterjee, IoT Botnet: the Largest Threatto the IoT Network, vol. 1049, pp. 150–170, 2019. Crossref, https://doi.org/10.1007/978-981-15-0132-6_10
[8] Jyoti Yadav, and Suman Sangwan, "Dynamic Offloading Framework in Fog Computing," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 32-42, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I7P204
[9] Qing Cao et al., “The Liteos Operating System: Towards Unix-Like Abstractions for Wireless Sensor Networks,” 2008 International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 233–244, 2008. Crossref, https://doi.org/10.1109/IPSN.2008.54
[10] P. Levis, “TinyOS: An Operating System for Sensor Networks,” Ambient Intelligence, pp. 115–148, 2005.
[11] Aswini N, Nagashree R. N, and Vibha Raob, “Near Field Communication,” International Journal of Wireless and Microwave Technology, vol. 2, pp. 20–30, 2014. Crossref, https://doi.org/10.5815/ijwmt.2014.02.03
[12] Daqiang Zhang et al., “ Real-Time Locating Systems Using Active RFID for Internet of Things,” IEEE Systems Journal, vol. 10, no. 3, pp. 1226–1235, 2016.
[13] A. Whitmore, A. Agarwal, and L. Da Xu, “The Internet of Things a Surveyof Topics and Trends,” Information Systems Frontiers, vol. 17, pp. 261–274, 2015.
[14] P. Mcdermott-Wells, “What is Bluetooth?,” IEEE Potentials, vol. 23, pp. 33–35, 2004.
[15] Shyamala G et al., "Home Automation Security Using Blockchain," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 7, pp. 63-68, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P111
[16] Garth V. Crosby, and Farzam Vafa, “Wireless Sensor Networks and LTE-A Network Convergence,” 38th Annual IEEE Conference on Local Computer Networks, pp. 731–734, 2013. Crossref, https://doi.org/10.1109/LCN.2013.6761322
[17] Nick Lewis, Business Logic Attack. [Online]. Avilable: https://www.techtarget.com/whatis/definition/business-logic-attack
[18] Leyla Bilge, and Tudor Dumitras, “ Before We Knew It: an Empirical Study of Zero-Day Attacks in the Real World,” CCS ’12 Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pp. 833 – 844, 2012. Crossref, https://doi.org/10.1145/2382196.2382284
[19] Ratinder Kaur, and Maninder Pal Singh, “A Survey on Zero-Day Polymor-Phic Worm Detection Techniques,” IEEE Communications Surveys and Tutorials, vol. 16, no. 3, pp. 1520–1549, 2014. Crossref, https://doi.org/10.1109/SURV.2014.022714.00160
[20] Shashank Gupta, and B. B. Gupta, “Cross-Site Scripting (XSS) Attacks and Defense Mechanisms: Classification and State-of-the-Art,” International Journal of System Assurance Engineering and Management, vol. 8, no. 1, pp. 512–530, 2017. Crossref, https://doi.org/10.1007/s13198-015-0376-0
[21] Qazi Mamoon Ashraf, and Mohamed Hadi Habaebi, “Autonomic Schemes for Threat Mitigation in Internet of Things,” Journal of Network and Computer Applications, vol. 49, no. C, pp.112–127, 2015. Crossref, https://doi.org/10.1016/j.jnca.2014.11.011
[22] Raymond Canzanese, Moshe Kam, and Spiros Mancoridis, “Toward an Automatic, Online Behavioral Malware Classification System,” 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems, pp.111–120, 2013. Crossref, https://doi.org/10.1109/SASO.2013.8
[23] P. Saxena, and V. Tiwari, “Network Security Attacks and Defence,” Journal of Computer and Information Technology, vol. 9, no. 50–54, 2018.
[24] Mauro Conti, Nicola Dragoni, and Viktor Lesyk, “A Survey of Man in theMiddle Attacks,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2027– 2051, 2016. Crossref, https://doi.org/10.1109/COMST.2016.2548426
[25] Mary K. Pratt, Cyber-Attack. [Online]. Available: https://www.techtarget.com/searchsecurity/definition/cyber-attack
[26] Ameya Sanzgiri, and Dipankar Dasgupta, “Classification of Insider Threat Detection Techniques,” Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC ’16, Association for Computing Machinery, New York, NY,USA, 2016.
[27] Jason R.C. Nurse, “Smart Insiders: Exploring the Threat From Insiders Using the Internet-of-Things,” 2015 International Workshop on Secure Internet of Things (SIOT), pp. 5–14, 2015. Crossref, https://doi.org/10.1109/SIOT.2015.10
[28] Hui Suo et al., “Security in the Internet of Things: A Review,” 2012 International Conference on Computer Science and Electronics Engineering, vol. 3, pp. 648–651, 2012. Crossref, https://doi.org/10.1109/ICCSEE.2012.373
[29] Denis Kozlov, Jari Veijalainen, and Yasir Ali, “Security and Privacy Threats in IoT Architectures,” BODYNETS, pp. 256-262, 2012.
[30] Xu Xiaohui, “Study on Security Problems and Key Technologies of the Internet of Things,” 2013 International Conference on Computational and Information Sciences, pp. 407–410, 2013. Crossref, https://doi.org/10.1109/ICCIS.2013.114
[31] M. Vivekananda Bharathi, “Node Capture Attack in Wireless Sensor Network: A Survey,” 2012 IEEE International Conference on Computational Intelligence and Computing Research, pp.1–3, 2012. Crossref, https://doi.org/10.1109/ICCIC.2012.6510237
[32] Deepak Puthal et al., “Threats to Networking Cloud and Edge Datacenters in the Internet of Things,” IEEE Cloud Computing, vol. 3, no. 3, pp. 64–71, 2016. Crossref, https://doi.org/10.1109/MCC.2016.63
[33] David Brumley, and Dan Boneh, “Remote Timing Attacks are Practical,” Computer Networks, vol. 48, no. 5, pp. 701–716, 2005. Crossref, https://doi.org/10.1016/j.comnet.2005.01.010
[34] M. Selvavathi, and S.Edwin Raja, "Anticipation of Vulnerable Attacks in Vanet Using Blockchain Technique," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 1, pp. 19-23, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I1P104
[35] Ibrahim Mashal et al., “Choices for Interaction with Things on Internet and Underlying Issues,” Ad Hoc Networks, vol. 28, pp. 68–90, 2015. Crossref, https://doi.org/10.1016/j.adhoc.2014.12.006
[36] Miao Yun, and Bu Yuxin, “Research on the Architecture and Key Technology of Internet of Things (IoT) Applied on Smart Grid,” 2010 International Conference on Advances in Energy Engineering, pp. 69–72, 2010. Crossref, https://doi.org/10.1109/ICAEE.2010.5557611
[37] Ali Dorri et al., “Blockchain for IoT Security and Privacy: the Case Study of a SmartHome,” 2017 IEEE International Conference on Pervasive Computingand Communications Workshops (Percom Workshops), pp. 618–623, 2017. Crossref, https://doi.org/10.1109/PERCOMW.2017.7917634
[38] Rafiullah Khan et al., “ Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges,” 2012 10th International Conference on Frontiersof Information Technology, pp. 257–260, 2012. Crossref, https://doi.org/10.1109/FIT.2012.53
[39] Gokulahari.U et al., "Decentralized Application," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 7, pp. 45-50, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P108
[40] Ibrahim Mashal et al., “Choices for Interaction with Things on Internet and Underlying Issues,” Ad Hoc Networks, vol. 28, pp. 68–90, 2015. Crossref, https://doi.org/10.1016/j.adhoc.2014.12.006
[41] Jun Zhou et al., “Security and Privacy for Cloud-Based IoT: Challenges,” IEEE Communications Magazine, vol. 55, no. 1, pp. 26–33, 2017. Crossref, https://doi.org/10.1109/MCOM.2017.1600363CM
[42] Rodrigo Roman, Jianying Zhou, and Javier Lopez, “On the Featuresand Challenges of Security and Privacy in Distributed Internet of Things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013. Crossref, https://doi.org/10.1016/j.comnet.2012.12.018
[43] Shiho Kim, and Ganesha Chandra Deka, Advanced Applications of Blockchain Technology, Springer, 2020.
[44] Mahdi H. Miraz, Blockchain of Things (BCOT): The Fusion of Blockchain and IoT Technologies, Springer, pp. 141–159, 2020.
[45] Hamed Haddadpajouh et al., “A Survey on Internet of Things Security:Requirements, Challenges, and Solutions,” Internet of Things, vol. 14, 2021. Crossref, https://doi.org/10.1016/j.iot.2019.100129
[46] Md. Ashraf Uddin et al., “An Efficient Selective Miner Consensus Protocol in Blockchain Oriented IoT Smart Monitoring,” 2019 IEEE International Conferenceon Industrial Technology (ICIT), pp. 1135–1142, 2019. Crossref, https://doi.org/10.1109/ICIT.2019.8754936
[47] Binance Academy, Delegated Proof of Stake Explained, 2021. [Online]. Available: https://academy.binance.com/en/articles/delegated-proof-of-stake- explained
[48] Beongjun Choi et al., “ Scalable Network-Coded PBFT Consensus Algorithm,” 2019 IEEE International Symposium on Information Theory (ISIT), pp. 857–861,2019.
[49] Konstantinos Christidis, and Michael Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292-2303, 2016. Crossref, https://doi.org/10.1109/ACCESS.2016.2566339
[50] Muhammad Nasir Mumtaz Bhutta et al., “A Survey on Blockchain Technology: Evolution, Architecture and Security,” IEEE Access, vol. 9, pp. 61048–61073, 2021. Crossref, https://doi.org/10.1109/ACCESS.2021.3072849
[51] Muhammad Salek Ali et al., “Applications of Blockchains in the Internet of Things: A Comprehensive Survey,” IEEE Communications Surveys and Tutorials, vol. 21, no. 2, pp. 1676–1717, 2019. Crossref, https://doi.org/10.1109/COMST.2018.2886932
[52] Sandeep Kumar, Abhay Kumar, and Vanita Verma, "A Survey Paper on Blockchain Technology, Challenges and Opportunities,” International Journal of Computer Trends and Technology, vol. 67, no. 4, pp. 16-20, 2019. Crossref, https://doi.org/10.1109/COMST.2018.2886932
[53] Alexandra Balan et al., “A Puf-Based Cryptographic Security Solution for IoT Systems on Chip,” EURASIP Journal on Wireless Communications and Networking, 2020. Crossref, https://doi.org/10.1186/s13638-020-01839-6
[54] E. Sweetline Priya, R. Priya, and R. Surendiran, "Implementation of Trust-Based Blood Donation and Transfusion System Using Blockchain Technology," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 104-117, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I8P210
[55] Beena G Pillai, and Dayanandlal N, "Blockchain-Based Asymmetric Searchable Encryption: A Comprehensive Survey," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 355-365, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I7P237
[56] Maha M. Althobaiti, “Blockchain Adoption Opportunities in Healthcare Sector," International Journal of Engineering Trends and Technology, vol. 68, no. 10, pp. 117-120, 2020. Crossref, https://doi.org/10.14445/22315381/IJETT-V68I10P220
[57] Aparna Kumari et al., “Fog Data Analytics:A Taxonomy and Process Model,” Journal of Network and Computer Applications, vol. 128, pp. 90–104, 2019. Crossref, https://doi.org/10.1016/j.jnca.2018.12.013
[58] E. Ferro, and F. Potorti, “Bluetooth and Wi-Fi Wireless Protocols: A Surveyand a Comparison,” IEEE Wireless Communications, vol. 12, no. 1, pp. 12–26, 2005. Crossref, https://doi.org/10.1109/MWC.2005.1404569
[59] Muhammad Burhan et al., “IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey,” Sensors, vol. 18, no. 9, 2018. Crossref, https://doi.org/10.3390/s18092796
[60] Fatma Alshohoumi et al., “Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns,” International Journal ofAdvanced Computer Science and Applications, vol.10, no. 7, 2019. Crossref, https://dx.doi.org/10.14569/IJACSA.2019.0100733
[61] Muhammad Aman, Kee Chua, and Biplab Sikdar, “Position Paper:Physical Unclonable Functions for IoT Security,” pp. 10–13, 2016. Crossref, https://doi.org/10.1145/2899007.2899013