ABSTRACT
Data provenance and data integrity are among the key concerns in IoT based environments such as smart cities, smart grids, and vehicular networks etc. Many IoT devices suffer from both impersonation and data tampering attacks due to their architectural and computational limitations, which are unable to provide adequate level of security. This paper aims to provide and enforce data provenance and data integrity in IoT environments by using Physical Unclonable Functions (PUFs) and Ethereum, a blockchain variant with smart contracts. PUFs provide unique hardware fingerprints to establish data provenance while Ethereum provides a decentralized digital ledger which is able to withstand data tampering attacks.
- Muhammad Naveed Aman, Kee Chaing Chua, and Biplab Sikdar. 2016. Physical Unclonable Functions for IoT Security. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS '16). ACM, New York, NY, USA, 10--13. Google ScholarDigital Library
- M. N. Aman, K. C. Chua, and B. Sikdar. 2017. Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet of Things Journal 4, 5 (Oct 2017), 1327--1340.Google ScholarCross Ref
- Muhammad Naveed Aman, Kee Chaing Chua, and Biplab Sikdar. 2017. Secure Data Provenance for the Internet of Things. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS '17). ACM, New York, NY, USA, 11--14. Google ScholarDigital Library
- Vitalik Buterin. 2014. Ethereum: A next-generation smart contract and decentralized application platform. https://github.com/ethereum/wiki/wiki/White-Paper. (2014). https://github.com/ethereum/wiki/wiki/White-Paper Accessed: 2016-08-22.Google Scholar
- Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gun Sirer, Dawn Song, and Roger Wattenhofer. 2016. On Scaling Decentralized Blockchains. (02 2016).Google Scholar
- M. Elkhodr, B. Alsinglawi, and M. Alshehri. 2018. Data Provenance in the Internet of Things. In 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA). 727--731.Google Scholar
- Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. (03 2009).Google Scholar
- J. L. C. Sanchez, J. B. Bernabe, and A. F. Skarmeta. 2018. Towards privacy preserving data provenance for the Internet of Things. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). 41--46.Google Scholar
- J. A. Stankovic. 2014. Research Directions for the Internet of Things. IEEE Internet of Things Journal 1, 1 (Feb 2014), 3--9.Google ScholarCross Ref
- H. Suo, J. Wan, C. Zou, and J. Liu. 2012. Security in the Internet of Things: A Review. In 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3. 648--651. Google ScholarDigital Library
- S. Verma, Y. Kawamoto, Z. M. Fadlullah, H. Nishiyama, and N. Kato. 2017. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues. IEEE Communications Surveys Tutorials 19, 3 (thirdquarter 2017), 1457--1477.Google ScholarDigital Library
- T. Xu, J. B. Wendt, and M. Potkonjak. 2014. Security of IoT systems: Design challenges and opportunities. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 417--423. Google ScholarDigital Library
Index Terms
- BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments
Recommendations
Mitigating loT Device based DDoS Attacks using Blockchain
CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed SystemsMany IoT devices lack memory and computational complexities of modern computing devices, making them vulnerable to a wide range of cyber attacks. Among these, DDoS attacks are a growing concern in IoT. Such attacks are executed through the introduction ...
ContractFuzzer: fuzzing smart contracts for vulnerability detection
ASE '18: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software EngineeringDecentralized cryptocurrencies feature the use of blockchain to transfer values among peers on networks without central agency. Smart contracts are programs running on top of the blockchain consensus protocol to enable people make agreements while ...
Smart contracts for automated control system in Blockchain based smart cities
Trustworthy Computing for Secure Smart CitiesNowadays, smart applications are increasing day by day to improve the standard of living in smart cities. A modern-day smart city is characterized by the presence of numerous smart Information and Communication Technology (ICT)-enabled services such as ...
Comments