1 Blockchain-Enabled Security and Privacy Schemes in IoT Technologies
Siddhant Banyal1, Mayank Saxena2, and Deepak Kumar Sharma3
1Department of Instrumentation and Control, Netaji Subhas University of Technology
(Formerly known as Netaji Subhas Institute of Technology), New Delhi, India
2Department of Electronics and Communications Engineering, Netaji Subhas University of Technology
(Formerly known as Netaji Subhas Institute of Technology), New Delhi, India
3Department of Information Technology, Netaji Subhas University of Technology
(Formerly known as Netaji Subhas Institute of Technology), New Delhi, India
CONTENTS
1.1Introduction and Motivation
1.1.1Internet of Things
1.1.1.1IoT Architecture
1.1.1.2Distinguishing IoT from Conventional Networks
1.1.2Blockchain: An Overview
1.1.3Generations of Blockchain
1.1.3.1Blockchain 1.0: Bitcoin and Cryptocurrency
1.1.3.2Blockchain 2.0: Smart Contracts and Ethereum
1.1.3.3Blockchain 3.0: Convergence toward Decentralized Applications
1.1.3.4Blockchain 4.0: Seamless Integration with Industry 4.0
1.2IoT Architecture and Systemic Challenges
1.2.1Sensing Layer: Introduction and Challenges in End Nodes
1.2.2Threat Based on Network Layer
1.2.3Service-Layer Based Threats
1.2.4Application Interface Layer
1.2.5Cross-Layer Challenges
1.3Challenge to Implementation of Blockchain in IoT
1.3.1Absence of IoT-Centric Consensus Protocol
1.3.2Transaction Validation Rules
1.3.3Scalability Challenges
1.3.3.1Storage Capacity
1.3.3.2Inherent Latency Blockchain
1.3.4IoT Device Integration Challenges
1.3.5Protection of Devices against Malware and Content Execution Attacks
1.3.6Secure and Synchronized Software Updates
1.4Application of Blockchain in IoT Sector
1.4.1Autonomous Decentralized Peer-to-Peer Telemetry
1.4.2Blockchain-Enabled Security for Smart Cities
1.4.3Blockchain-Enabled Smart Home Architecture
1.4.4Blockchain-Based Self-Managed VANETS
1.4.5Security and Privacy of Data
1.5Conclusion and Future Scope of Work
1.6References
1.1Introduction and Motivation
1.1.1Internet of Things
The last two decades have been catalyzed by developments on a myriad of technological fronts and these developments have severely affected the way in which society functions. Technology has been increasingly integrated with our way of living and daily life, ranging from the moment we wake up at home and use smart home appliances to the usage of integrated technology in the workplace to health monitoring and analytics of our sleep. This development has asymmetrically changed the way industries perceive and use technology and with the incumbent developments they have been trying more and more to integrate them into their operations for efficiency. The reports suggest that the estimated count of connected IoT devices is set to rise to 50 billion by the end of this decade [1]. The ecosystem involves a myriad of elements such as: IoT devices, sensors, actuators, network elements (servers, routers etc.) and associated industrial machinery. In this pursuit of connecting conventional devices across networks and over the internet, the Internet of Things and Web of Things (WoT) have been pivotal in catalyzing and catering to this need. IoT as an emerging technology offers novel solutions and optimizing paradigms to both conventional and unconventional industrial operations. One such example of this innovative behavior is the case of innovative transportation in the field of Intelligent Transportation Systems (ITS) where IoT and associated technology have provided the ability for smart traffic management and traffic prediction through monitoring and predicting traffic location.
As discussed above, the Internet of Things or IoT encompasses a global network of nodes and devices that are addressable uniquely via standard communication protocols. The Internet of Things, which has witnessed a dramatic surge in the recent past, has had an immense impact on every aspect of human lives, ranging from wearable gear to sensors monitoring ecological changes in remote locations to regulating physical metrics in manufacturing processes. The set of devices or the “Things” which share a common resemblance in order to directly or indirectly connect to the Internet, operate within the confines of their functionality and exchange, analyze, process and deliver data in the common language; these sets of devices working in tandem are defined as “Internet of Things”. Although large swathes in advancement in technology have unequivocally reduced human intervention and have significantly integrated devices with the real world, the big question of privacy and protection in IoT devices has been left largely unaddressed and now presents a potential threat to the cyber landscape. The lack of a standard IoT framework safeguarding privacy across all platforms has been attributed to varied communication protocols, a multitude of programming languages and differing levels of distributed computing in devices, networking and perceiving data in real-time systems [2].
The developers and research community have been meticulously working to develop tailor-made frameworks and structures for specific platforms. In its pursuit of this, the community has encountered several challenges pertaining to hardware which involve energy efficiency, ranging from the lightweight computation of devices and sensors to virtual threats including encryption attacks which occur on system vulnerabilities and tend to impede system integrity. Privacy is another concern that many nations across the globe have echoed. Policy measures such as the EU’s General Data Protection Regulation (EU GDPR) have already been enforced with stringent rules for privacy yet there exist several challenges on the regulatory and technological front which this chapter touches upon in its first section. Industries such as healthcare, which incorporates one of the largest numbers of IoT devices, are especially under threat as revealed in the analysis by the Ponemon Institute and IBM. The most severe example of this is the case of Singapore, when an attack on SingHealth exposed the data of more than 1.5 million patients. The aforementioned cyber threats present us with a unique conundrum.
1.1.1.1IoT Architecture
Every IoT system implemented globally is different; however, the data process flow and general architecture have some similarity. The first element is “Things”; this entails the nodes/devices that sense data from the environment via embedded sensors and actuators and are connected to the internet via appropriate gateways. The second layer includes the data acquisition systems and gateways that are responsible for gathering large amounts of raw and processed data (filtration, amplification and other associated electronic signal conditioning), and convert it into a digital form that is ready for further analysis. The third layer is where data visualization and intelligent control steps in, through which the processed data is transferred for long-term storage to data centers and cloud-based facilities which form the fourth layer.
These four layers are illustrated in Figure 1.1 of this chapter. The figures entail a five-layer architecture that comprises of:
1.Business Layer
2.Application Layer
3.Service Management Layer
4.Object Abstraction Layer
5.Perception Layer
The business layer is responsible for the management of all activities, services and development of business models, graphs, and flowcharts based on the data it receives from the application layer. Further, this layer is responsible for supporting the decision-making aspect, based on big data analysis and determining the course of action. The application layer is responsible for service delivery and acts as an interface to the business layer. Furthermore, it is responsible...