Addressing Security and Privacy Issues of Iot Using Blockchain Technology
Addressing Security and Privacy Issues of Iot Using Blockchain Technology
Addressing Security and Privacy Issues of Iot Using Blockchain Technology
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.
882 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 2, JANUARY 15, 2021
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.
MOHANTA et al.: ADDRESSING SECURITY AND PRIVACY ISSUES OF IoT USING BLOCKCHAIN TECHNOLOGY 883
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.
884 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 2, JANUARY 15, 2021
TABLE I
L ITERATURE W ORK
of the security and privacy can be solved using blockchain Algorithm 1: Calculate Total White Space
technology. An in-depth analysis is given in Section V. Result: Calculate the total white space
WSCalculation(Root)
if RLL then
WSCalculation(RL )
IV. A RCHITECTURE AND F UNCTIONALITY OF WSCalculation(RR )
B LOCKCHAIN end
The blockchain is basically a decentralized, distributed, RD = RLD + RRD
immutable, and shared digital ledger which stores valid trans-
action in a peer-to-peer network. The valid transactions are
stored in a block with timestamp after the mining process Algorithm 2: ECDSA Key Generation
is done by the miner node. Each block stores the previous N1
Result: Kpri : N1 s private key, Kpub
N1
: N1 s public key
block hash value along with others’ attributes shown in Fig. 4.
P = A point of prime order n in E(Fq )
The blockchain uses SHA-256 and ECC for data integrity N1
and authentication. Fig. 5 describes the elliptic curve digi- Kpri = rand() % n − 1 + 1;
N1 N1
tal signature algorithm used in the blockchain system. In a Kpub = Kpri * P;
blockchain network, nodes are connected in mesh-like topol-
ogy. Each node in the network carry two keys: 1) a private key
and 2) a public key. The public key is the unique address used
to encrypt the message by the node in the network. The pri- V. I MPACT OF B LOCKCHAIN FOR I OT
vate key is used to sign the transactions and also to decrypt the Khan and Salah [21] discussed the layerwise security
message received from others’ node. Depending upon the uses, issue, such as low level, intermediate level, and high level.
the blockchain network is divided into public (permissionless) Similarly, paper also addressed the protocol and communi-
and private (permissioned) types. cation challenges in IoT and its solution approach in terms
The key pair of a node N1 is associated with a par- of blockchain. Kumar and Mallick [22] studied the different
ticular set of Elliptic curve domain parameters DP = security aspects of IoT applications and integrated how digital
(q, FR, a, b, G, n, h). E is an elliptic curve defined over Fq , ledger information will be stored securely using blockchain.
and P is a point of prime order n in E(Fq ) and q is a prime. Mohanty et al. [23] proposed an efficient blockchain-based
Each node N1 does the calculation, key generation, and mes- distributed model integrate with the IoT which provides
sage signing with ECDSA. The details of the calculation part security and privacy.
are given in Algorithm 1, key generation in Algorithm 2, Blockchain technology has some consensus algorithms,
message signing in Algorithm 3, and signature verification in which are already described by the researcher. The consensus
Algorithm 4. algorithms are Proof of Work (PoW), Proof of Burn (POB),
For verifying the signature (r, s) of node N1 on the message Proof of Stake (PoS), raft, practical byzantine fault tolerant
M1 , node N2 obtains an authenticated copy of N1 s domain (PBFT), Paxos, etc. Panda et al. [24] described in detail about
N1
parameters DP = (q, FR, a, b, G, n, h) and public key Kpub the distributed consensus algorithms. In the blockchain system,
and do the signature verification using ECDSA. a consensus algorithm is important to maintain transparency
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.
MOHANTA et al.: ADDRESSING SECURITY AND PRIVACY ISSUES OF IoT USING BLOCKCHAIN TECHNOLOGY 885
and make the decision efficient as multiple nodes involved security issues are existing in the IoT system. To make the real
in the decision-making process. In IoT applications, real-time use of the IoT concept, security issue needs to be addressed.
decision and monitoring are done. To ensure the integrity of One of the solution approaches is using the blockchain tech-
the data and to have trust among the nodes, blockchain is nique. As shown in Fig. 6, IoT-enabled application using the
used to authenticate and authorization purpose outside the IoT wireless or wired devices is connected. Initially, all the smart
network. devices connected to the applications need to have authenti-
cation in the outside network that is the blockchain network.
Once devices are registered, they can perform different activ-
A. Solution Approach Using Blockchain ities as per their features locally. Similarly, users are also
IoT consists of smart things capable of sensing and pro- required to authenticate in the blockchain network initially.
cessing in real time. As the devices are resource constraint After that, they can monitor or access the different smart
devices, doing complex computation or applying cryptogra- objects present in the network. Hammi et al. [14] proposed
phy algorithm is not suitable. So the lightweight algorithms are “bubble of trust” for authentication of the IoT devices in the
essential for IoT devices. As explained in Section II, several decentralized network. Similarly, Mohanta et al. [25] proposed
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.
886 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 2, JANUARY 15, 2021
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.
MOHANTA et al.: ADDRESSING SECURITY AND PRIVACY ISSUES OF IoT USING BLOCKCHAIN TECHNOLOGY 887
TABLE II
P OTENTIAL S OLUTION FOR S OME OF THE S ECURITY I SSUE
all the intermediate devices. Once all the devices are con- DecAuth protocol in the Ethereum platform. Smart contracts
nected to the distributed blockchain network using the hashing are written and deployed in the blockchain network for testing
and cryptographic concept, transaction is made immutable and purposes.
available to all users. In the Ethereum platform, login and reg-
istration pages are created. In the registration page, devices are
registered and assigned with a pair of keys; one is the unique R EFERENCES
address accessible globally. In the login page, the device can [1] I.-C. Lin and T.-C. Liao, “A survey of blockchain security issues and
login using a unique address. Each transaction is broadcast challenges,” Int. J. Netw. Security, vol. 19, no. 5, pp. 653–659, 2017.
[2] M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical secu-
in the network. The nodes in the network verify using the rity issues of the IoT world: Present and future challenges,” IEEE
previous information stored in the digital ledger or blockchain Internet Things J., vol. 5, no. 4, pp. 2483–2495, Aug. 2018.
database. The three Raspberry Pi devices are used to pro- [3] G. Lize, W. Jingpei, and S. Bin, “Trust management mechanism for
Internet of Things,” China Commun., vol. 11, no. 2, pp. 148–156, 2014.
cess and perform computation in a distributed network. The [4] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and
smart contracts are developed for logic as per the applica- privacy issues in Internet-of-Things,” IEEE Internet Things J., vol. 4,
tion requirement. The solidity platform is used to write the no. 5, pp. 1250–1258, Oct. 2017.
code for a smart contract in the Ethereum network. One of [5] M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on
the security of IoT frameworks,” J. Inf. Security Appl., vol. 38, pp. 8–27,
the logic developed for smart home IoT application is to Feb. 2018.
check the threshold value of the collected gas and temperature [6] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A
from different sensors. The network node does the verifica- survey on IoT security: Application areas, security threats, and solution
architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019.
tion and validation, and a smart contract is automatically run [7] K. Jaiswal, S. Sobhanayak, B. K. Mohanta, and D. Jena, “IoT-cloud
in the Ethereum platform. The outcome of the smart contract based framework for patient’s data collection in smart healthcare system
is broadcast in the network using the digital signature and using Raspberry-Pi,” in Proc. IEEE Int. Conf. Elect. Comput. Technol.
Appl. (ICECTA), 2017, pp. 1–4.
encryption. [8] U. Satapathy, B. K. Mohanta, D. Jena, and S. Sobhanayak, “An ECC
based lightweight authentication protocol for mobile phone in smart
home,” in Proc. IEEE 13th Int. Conf. Ind. Inf. Syst. (ICIIS), 2018,
VII. C ONCLUSION pp. 303–308.
IoT techniques are used to implement different applications, [9] S. Biswas, K. Sharif, F. Li, S. Maharjan, S. P. Mohanty, and Y. Wang,
“PoBT: A light weight consensus algorithm for scalable IoT business
such as smart city, smart home, smart transportation system, blockchain,” IEEE Internet Things J., vol. 7, no. 3, pp. 2343–2355,
healthcare system, agriculture field, and supply chain system. Mar. 2020.
The innovation of smart things having wireless connectivity, [10] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB:
A lightweight scalable blockchain for IoT security and anonymity,”
storage space, and some processing power makes us use these J. Parallel Distrib. Comput., vol. 134, pp. 180–197, Dec. 2019.
devices in real time. However, the IoT system having security [11] B. Yu, J. Wright, S. Nepal, L. Zhu, J. Liu, and R. Ranjan,
and privacy issues presents at a different level. This article “Trustchain: Establishing trust in the IoT-based applications ecosys-
tem using Blockchain,” IEEE Cloud Comput., vol. 5, no. 4, pp. 12–23,
addressed the security and privacy issues present in the IoT Jul./Aug. 2018.
system. As blockchain being the distributed network and secu- [12] L. Xie, Y. Ding, H. Yang, and X. Wang, “Blockchain-based secure
rity is maintained. In this study, blockchain is integrated with and trustworthy Internet of Things in SDN-enabled 5G-VANETs,” IEEE
IoT and implemented using the Ethereum platform for test- Access, vol. 7, pp. 56656–56666, 2019.
[13] L. Zhou, L. Wang, Y. Sun, and P. Lv, “Beekeeper: A blockchain-based
ing purposes. Some sensor devices are used to create the IoT IoT system with secure storage and homomorphic computation,” IEEE
smart environment and devices are authenticated using the Access, vol. 6, pp. 43472–43488, 2018.
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.
888 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 2, JANUARY 15, 2021
[14] M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of Somula Ramasubbareddy received the master’s
trust: A decentralized blockchain-based authentication system for IoT,” degree in computer science and engineering from
Comput. Security, vol. 78, pp. 126–142, Sep. 2018. JNTUA University, Anantapur, India, in 2015.
[15] C. Lin, D. He, N. Kumar, X. Huang, P. Vijaykumar, and K.-K. R. Choo, He is currently working as an Assistant Professor
“HomeChain: A blockchain-based secure mutual authentication system with the Department of IT, VNRVJIET, Hyderabad,
for smart homes,” IEEE Internet Things J., vol. 7, no. 2, pp. 818–829, India. His areas of interest are mobile cloud com-
Feb. 2020. puting and big data analytics.
[16] A. Gauhar et al., “xDBAuth: Blockchain based cross domain authentica-
tion and authorization framework for Internet of Things,” IEEE Access,
vol. 8, pp. 58800–58816, 2020.
[17] M. Shen, X. Tang, L. Zhu, X. Du, and M. Guizani, “Privacy-
preserving support vector machine training over blockchain-based
encrypted IoT data in smart cities,” IEEE Internet Things J., vol. 6,
no. 5, pp. 7702–7712, Oct. 2019.
[18] P. Lv, L. Wang, H. Zhu, W. Deng, and L. Gu, “An IoT-oriented privacy-
preserving publish/subscribe model over blockchains,” IEEE Access,
vol. 7, pp. 41309–41314, 2019.
[19] O. Novo, “Blockchain meets IoT: An architecture for scalable access
management in IoT,” IEEE Internet Things J., vol. 5, no. 2,
pp. 1184–1195, Apr. 2018.
[20] S. Ding, J. Cao, C. Li, K. Fan, and H. Li, “A novel attribute-based
access control scheme using blockchain for IoT,” IEEE Access, vol. 7, Mahmoud Daneshmand (Senior Life Member,
pp. 38431–38441, 2019. IEEE) received the B.S. and M.S. degrees in mathe-
[21] M. A. Khan and K. Salah, “IoT security: Review, blockchain solu- matics from the University of Tehran, Tehran, Iran,
tions, and open challenges,” Future Gener. Comput. Syst., vol. 82, and the M.S. and Ph.D. degrees in statistics from the
pp. 395–411, May 2018. University of California at Berkeley, Berkeley, CA,
[22] N. M. Kumar and P. K. Mallick, “Blockchain technology for secu- USA.
rity issues and challenges in IoT,” Procedia Comput. Sci., vol. 132, He is a Co-Founder and a Professor with the
pp. 1815–1823, Jun. 2018. Department of Business Intelligence and Analytics,
[23] S. N. Mohanty et al., “An efficient lightweight integrated blockchain and a Professor with the Department of Computer
(ELIB) model for IoT security and privacy,” Future Gener. Comput. Science, Stevens Institute of Technology, Hoboken,
Syst., vol. 102, pp. 1027–1037, Jan. 2020. NJ, USA. He has over 40 years of industry and
[24] S. S. Panda, B. K. Mohanta, U. Satapathy, D. Jena, D. Gountia, university experience as a Professor, a Researcher, an Assistant Chief
and T. K. Patra, “Study of blockchain based decentralized consensus Scientist, the Executive Director, a Distinguished Member of Technical Staff,
algorithms,” in Proc. IEEE TENCON Region 10 Conf. (TENCON), 2019, a Technology Leader, the Chairman of Department, and the Dean of School
pp. 908–913. with Bell Laboratories, Murray Hill, NY, USA; AT&T Shannon Labs—
[25] B. K. Mohanta, A. Sahoo, S. Patel, S. S. Panda, D. Jena, and Research, Florham Park, NJ, USA; the University of California at Berkeley;
D. Gountia, “DecAuth: Decentralized authentication scheme for IoT the University of Texas at Austin, Austin, TX, USA; the Sharif University
device using Ethereum blockchain,” in Proc. TENCON IEEE Region of Technology, Tehran; the University of Tehran; New York University, New
10 Conf. (TENCON), 2019, pp. 558–563. York, NY, USA; and the Stevens Institute of Technology.
Authorized licensed use limited to: CHONGQING UNIV OF POST AND TELECOM. Downloaded on March 18,2021 at 06:05:20 UTC from IEEE Xplore. Restrictions apply.