Enhancement of Iot Security Solutions Using Blockchain Technology
K. Sheela1, *, C. Priya2 1 Department of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India
2 Department of Information Technology, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India
Abstract
A blockchain is a growing list of records, called blocks, which are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. It is a decentralized, distributed and public digital ledger that is used to record transactions across many computers called nodes. Blockchain, in collaboration with the technologies like Artificial Intelligence, the Internet of Things, Big data, etc., provides more effective outcomes by minimizing manpower with an increase in its feasibility. IoT is all about expanding the power of the internet beyond computers and smartphones to a whole range of other things, processes, and environments. Our day-to-day life can be made interesting with the applications of IoT-enabled devices in the home, agriculture, logistics, industries, healthcare sectors, and so on. They can be combined with the disciplines like data collection, management of huge data, storage of data, data analytics, etc. These IoT devices are embedded with sensors that are vulnerable to hackers and malware. At present, we cannot give complete assurance of the security of the access and data associated with the devices as it is possible for an intruder to misuse or mishandle the scheduled process. But, in association with blockchain technology, we can acquire solutions for problems related to security.
Keywords: Application, Authenticity, Blockchain, Banking sector, Consensus, Corda, Crypto-currency, Cryptography, Distributed, Ether, Ethereum, E-governance, Hashing, Healthcare, IoT, Platforms, Proof of work and stack, Security, Smart contract, Smart city.
* Corresponding author K. Sheela: Department of Computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India; E-mail: [email protected] 1. INTRODUCTION
IoT devices have become a regular component in our day-to-day life. We can see that the devices which are connected to the internet are gradually increasing by
paving the way for a digital environment. The traditional database provides a centralized architecture, whereas blockchain provides a distributed peer-to-peer network. In simple terms, blockchain is a collection of data stored in a database that maintains the continuously growing records in a distributed, peer-to-peer network node [1]. This makes the Blockchain and IoT to get integrated to provide even better services. Generally, IoT devices are liable to many kinds of security attacks [2]. The following are some of the attacks which occur to the devices connected to the internet.
Brute Force Attack: It is the process of trying all the possibilities of the password given by the authorized user.
The Man in the Middle: In this kind of cyber-attack, an intruder involves himself in the communication and gain access to the messages transferred. It is also possible for him to alter the messages which lead to miscommunication.
Denial of Service: This attack is used to slow down the process which also affects the reputation of an organization. Distributed Denial of Service (DDoS) may also occur to engage the resources in unnecessary services and makes the network resources unavailable for the appropriate activities. One of the methods to overcome this is proof of Activity which is the combination of PoS and PoW [3].
Eavesdropping: It is also known as sniffing or snooping attacks. It is the process of stealing the information while it gets transmitted over the network by devices like a smartphone, computers, or other connected devices.
Sybil Attack: It is the process of creating large numbers of pseudonymous identities to hide real identities and slow down the process. It entirely damages the operation of the network.
These attacks can be overridden by collaborating blockchain technology with the Internet of Things having the features like decentralized framework, immutability, reliability, autonomous behavior, and so on [4]. Every transaction in the blockchain is cryptographically sealed using public/private keys. Every transaction must be defined and authenticated. With these transactions, blocks must be created, validated, and linked (chained) [5] to enhance the security level of the transactions.
Blockchain technology, in collaboration with technologies like Artificial Intelligence, Internet of Things [IOT], Bigdata, etc. provides more effective end results by minimizing the manpower with an increase in its feasibility. Certainly, Blockchain entitles IoT devices by providing security and authentication with transparency in IoT ecosystems. We can easily predict that IoT will become a part of our day-to-day life in our near future with its huge development and collaboration with effective technologies like blockchain technology. Fraudulent activities may also occur in the localization of IoT devices where the location of the connected device might be tampered with to provide erroneous data. It can be overridden by this blockchain technology [2]. It is well-known specifically for its unique features like decentralized and distributed nature, hashing and cryptographic techniques, and smart contracts maintained between them. Let us have a deep look into this collaboration in this chapter.
1.1. Contribution of the Work
This chapter elaborates on security enhancement solutions and sheds light on the platforms where blockchain technology can be implemented.
Furthermore, it consolidates the features of these technologies and
highlights the study on collaborating Artificial Intelligence, Blockchain, and the Internet of Things for a sustainable environment.
It also encapsulates research directions along with certain guidelines.
1.2. Paper Organization
In section 2, we have discussed the platforms which can be used for implementing blockchain technology along with IoT integration. Further, in section 3, a number of techniques for imposing security for an operation have been explained with diagrams and tabular columns. A detailed explanation of IoT implemented with blockchain technology in various fields like smart city, healthcare, e-governance, education system, waste management, supply-chain management, etc., has been elaborated in section 4.
2. PLATFORMS TO IMPLEMENT BLOCKCHAIN TECHNOLOGY AND ITS USES
By considering the nature of the Blockchain, it has been classified into three types, namely private, public, and consortium. A private blockchain is a restricted one. The user, who can access the data, will be assigned by a network administrator and others will be restricted from accessing it. There is no restriction of access in the public blockchain. The consortium is a semi-restricted blockchain where access permission will be given with certain restrictions to work with the blockchain platform [6]. A platform is an environment in which a piece of software can be executed. Many platforms have been designed to support and develop blockchain technology. These platforms are classified into two categories, namely permissioned and permission-less: The following are some of the most effectively used platforms for this technology:
Ethereumโ It is a permission-less, decentralized application (DApp). It uses Ether as its cryptocurrency (ETH).
Hyperledger fabric โ It is a permissioned blockchain where only known identities could be able to participate.
Ripple โ It is most essentially designed for transactions on payment.
Quorum โ It is an enterprise-focused version of ethereum.
Corda โ Initially, it was designed for the financial sector. But nowadays, it has also been implemented in other sectors too.
EOS โ It eliminates fees for all of its users.
Open chain โ It was highly designed for managing digital assets.
Stellar โ It deals with all the transactions and exchanges between cryptocurrencies and fiat...