skip to main content
10.1145/3282278.3282281acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments

Published:04 November 2018Publication History

ABSTRACT

Data provenance and data integrity are among the key concerns in IoT based environments such as smart cities, smart grids, and vehicular networks etc. Many IoT devices suffer from both impersonation and data tampering attacks due to their architectural and computational limitations, which are unable to provide adequate level of security. This paper aims to provide and enforce data provenance and data integrity in IoT environments by using Physical Unclonable Functions (PUFs) and Ethereum, a blockchain variant with smart contracts. PUFs provide unique hardware fingerprints to establish data provenance while Ethereum provides a decentralized digital ledger which is able to withstand data tampering attacks.

References

  1. Muhammad Naveed Aman, Kee Chaing Chua, and Biplab Sikdar. 2016. Physical Unclonable Functions for IoT Security. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS '16). ACM, New York, NY, USA, 10--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. N. Aman, K. C. Chua, and B. Sikdar. 2017. Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet of Things Journal 4, 5 (Oct 2017), 1327--1340.Google ScholarGoogle ScholarCross RefCross Ref
  3. Muhammad Naveed Aman, Kee Chaing Chua, and Biplab Sikdar. 2017. Secure Data Provenance for the Internet of Things. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS '17). ACM, New York, NY, USA, 11--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Vitalik Buterin. 2014. Ethereum: A next-generation smart contract and decentralized application platform. https://github.com/ethereum/wiki/wiki/White-Paper. (2014). https://github.com/ethereum/wiki/wiki/White-Paper Accessed: 2016-08-22.Google ScholarGoogle Scholar
  5. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gun Sirer, Dawn Song, and Roger Wattenhofer. 2016. On Scaling Decentralized Blockchains. (02 2016).Google ScholarGoogle Scholar
  6. M. Elkhodr, B. Alsinglawi, and M. Alshehri. 2018. Data Provenance in the Internet of Things. In 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA). 727--731.Google ScholarGoogle Scholar
  7. Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. (03 2009).Google ScholarGoogle Scholar
  8. J. L. C. Sanchez, J. B. Bernabe, and A. F. Skarmeta. 2018. Towards privacy preserving data provenance for the Internet of Things. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). 41--46.Google ScholarGoogle Scholar
  9. J. A. Stankovic. 2014. Research Directions for the Internet of Things. IEEE Internet of Things Journal 1, 1 (Feb 2014), 3--9.Google ScholarGoogle ScholarCross RefCross Ref
  10. H. Suo, J. Wan, C. Zou, and J. Liu. 2012. Security in the Internet of Things: A Review. In 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3. 648--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Verma, Y. Kawamoto, Z. M. Fadlullah, H. Nishiyama, and N. Kato. 2017. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues. IEEE Communications Surveys Tutorials 19, 3 (thirdquarter 2017), 1457--1477.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Xu, J. B. Wendt, and M. Potkonjak. 2014. Security of IoT systems: Design challenges and opportunities. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 417--423. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            BlockSys '18: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems
            November 2018
            38 pages
            ISBN:9781450360500
            DOI:10.1145/3282278

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 4 November 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader