Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Key challenges in security of IoT devices and securing them with the blockchain technology

Published: 24 July 2022 Publication History

Abstract

Internet of Things (IoT) data processing enables rapid access to large volumes of data with the possibility of improving service‐oriented business models. As such, the rapid adoption of IoT devices has resulted in a large number of low‐powered devices integrating into traditional communication networks and influencing practically all assets of everyday life. However, the integration of IoT devices into traditional networks comes at a price, often in the form of added security challenges or administrative complexity. Some of these challenges may be addressed by leveraging technology developed from an unlikely source, crypto currencies. Crypto currencies introduced the notion of a blockchain, which is comprised of several underlying technologies that may be combined with IoT protocols to enable secure mechanisms for reaping the benefits of IoT devices. This paper introduces key challenges in securing IoT devices as well as important components of blockchain technology that may contain the keys to addressing these challenges. Emerging IoT security solutions are identified and evaluated based on their assessed effectiveness.

References

[1]
Russell B, Van Duren D. The IoT in the enterprise. Practical Internet of Things Security. Brimingham: Packt Publishing Ltd; 2016:21‐29.
[2]
Kolias C, Kambourakis G, Stavrou A, Voas J. DDoS in the IoT: Mirai and other botnets. Computer. 2017;50(7):80‐84.
[3]
Krebs B. Krebs on Security ‐ Krebs on security hit with record DDoS, 2016a. https://krebsonsecurity.com/2016/09/krebsonsecurity‐hit‐with‐record‐ddos Accessed December 2, 2018
[4]
Gartner . Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016, 2017. https://gtnr.it/3998YFC. Accessed December 2, 2018.
[5]
Panarello A, Tapas N, Merlino G, Longo F, Puliafito A. Blockchain and IoT integration: a systematic survey. Sensors. 2018;18(8):2575.
[6]
Ranasinghe D, Mcfarlane D, Harrison M. Adding sense to the internet of things ‐ an architecture framework for smart object systems. Pers Ubiquitous Comput. 2012;16:29‐308.
[7]
Mainetti L, Patrono L, Vilei A. Evolution of wireless sensor networks towards the internet of things: a survey. SoftCOM 2011, 19th international conference on software, telecommunications and computer networks, Split, Croatia, 2011;1‐6.
[8]
Oorschot P, Smith S. The internet of things: security challenges. IEEE Secur Priv. 2019;17(5):7‐9.
[9]
Tschofenig H, Baccelli E. Cyberphysical security for the masses: a survey of the internet protocol suite for internet of things security. IEEE Secur Priv. 2019;17(5):47‐57.
[10]
Lockl J, Schlatt V, Schweizer A, Urbach N, Harth N. Toward trust in internet of things ecosystems: design principles for blockchain‐based IoT applications. IEEE Trans Eng Manage. 2020;67(4):1256‐1270.
[11]
Liu H, Han D, Li D. Fabric‐IoT: a blockchain based access control system in IoT. IEEE Access. 2020;8:18207‐18218.
[12]
Fawaz K, Shin K. Security and privacy in the internet of things. IEEE Comput. 2019;52(4):40‐49.
[13]
Zhang L, Li F, Wang P. A Blockchain‐assisted massive IoT data collection intelligent framework. IEEE Internet Things. Accepted for Publication. 2021;15.
[14]
Bhattarai S, Wang Y. End‐to‐end trust and security for internet of things applications. IEEE Comput. 2018;51(4):20‐27.
[15]
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: security protocols for sensor networks. Wireless Netw. 2002;8(5):521‐534.
[16]
Ren K, Lou W, Yu S, Zhang Y. Multi‐user broadcast authentication in wireless sensor networks. IEEE Trans Veh Technol. 2009;58(8):4554‐4564.
[17]
Fouladi B, Ghanoun S. Honey, I'm Home!!: Hacking ZWave Home Automation Systems. Las Vegas, NV: Black Hat USA; 2013a.
[18]
Fouladi B, Ghanoun S. Security evaluation of the Z‐wave wireless protocol. Blackhat USA 2013. Las Vegas, 2013b
[19]
Krebs B. Krebs on Security‐ Source code for IoT botnet ‘Mirai’ released, 2016b. https://krebsonsecurity.com/2016/10/source‐code‐for‐iot‐botnet‐mirai‐released Accessed December 2, 2018
[20]
Gomez C, Paradells J. Wireless home automation networks: a survey of architectures and technologies. IEEE Commun. 2010;48(6):92‐101.
[21]
Ayoade G, Karande V, Khan L, Hamlen K. Decentralized IoT data management using blockchain and trusted execution environment. 2018 IEEE International Conference on Information Reuse and Integration for Data Science, Salt Lake City, UT, USA, 2018;15‐22.
[22]
Dolev D, Yao AC. On the security of public key protocols. IEEE Trans Inform Theory. 1983;29(2):198‐208.
[23]
Novo O. Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet of Things. 2018;5(2):1184‐1195.
[24]
Zhang R, Zue R, Liu L. Security and privacy on Blockchain. ACM Comput Surv. 2019;52(3):34.
[25]
Kolb J, AbdelBaky M, Katz R. Core concepts, challenges, and future directions in blockchain: a centralized tutorial. ACM Comput Surv. 2020;53(1):39.
[26]
Laphou L, Zecheng L, Hou S, Ziao B, Guo S, Yang Y. A survey of IoT applications in blockchain systems: architecture, consensus, and traffic modeling. ACM Comput Surv. 2020;53(1):39.
[27]
Butjin B, Tamburri D, Heuvel W. Blockchains: a systematic multivocal literature review. ACM Comput Surv. 2020;53(3):32‐37.
[28]
Merkle RC. A Digital Signature Based on a Conventional Encryption Function. CRYPTO ‘87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, London, UK. 1987;369‐378.
[29]
Dwork C, Goldberg A, Naor M. On Memory‐Bound Functions for Fighting Spam, Proceedings of the 23rd Annual International Cryptology Conference, LNCS volume 2729, pp. 426–444, Santa Barbara, California, USA, August 2003.
[30]
Chen L, Xu L, Shah N, Gao Z, Lu Y, Shi W. On Security Analysis of Proof‐of‐Elapsed‐Time (Poet). 19th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Boston, MA, USA, 2017;282‐297.
[31]
Bamakan S, Motavali A, Bondarti A. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl. 2020;154:113385.
[32]
Christidis K, Devetsikiotis M. Blockchains and smart contracts for the internet of things. IEEE Access. 2016;4:2292‐2303.
[33]
Dorri A, Kanhere S, Jurdak R. Towards an optimized blockchain for IoT. Second international conference on internet‐of‐things design and implementation, Pittsburgh, PA, USA, 2017;173‐178.
[34]
Sompolinsky Y, Zohar A. Secure High‐Rate Transaction Processing in Bitcoin. International Conference on Financial Cryptography and Data Security, Berlin, Springer, 2015;507‐527.
[36]
Masood F, Faridi AR. Consensus algorithms in distributed ledger technology for open environment. 2018 4th International Conference on Computing Communications and Automation (ICCCA), 2018;1‐6.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Security and Privacy
Security and Privacy  Volume 5, Issue 5
September/October 2022
181 pages
EISSN:2475-6725
DOI:10.1002/spy2.v5.5
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 24 July 2022

Author Tags

  1. bitcoin
  2. blockchain
  3. byzantine fault tolerance
  4. internet of things
  5. IOTA
  6. proof of work
  7. security
  8. smart contracts

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media