scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A blockchain future for internet of things security: a position paper

TL;DR: The potential for blockchain technology in facilitating secure sharing of IoT datasets and securing IoT systems is posited, before presenting two conceptual blockchain-based approaches.
About: This article is published in Digital Communications and Networks.The article was published on 2017-10-01 and is currently open access. It has received 418 citations till now.
Citations
More filters
Journal ArticleDOI
Ana Reyna1, Cristian Martín1, Jaime Chen1, Enrique Soler1, Manuel Díaz1 
TL;DR: This paper focuses on the relationship between blockchain and IoT, investigates challenges in blockchain IoT applications, and surveys the most relevant work in order to analyze how blockchain could potentially improve the IoT.

1,255 citations

Journal ArticleDOI
TL;DR: An in-depth survey of BCoT is presented and the insights of this new paradigm are discussed and the open research directions in this promising area are outlined.
Abstract: Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However, intrinsic features of IoT result in a number of challenges, such as decentralization, poor interoperability, privacy, and security vulnerabilities. Blockchain technology brings the opportunities in addressing the challenges of IoT. In this paper, we investigate the integration of blockchain technology with IoT. We name such synthesis of blockchain and IoT as blockchain of things (BCoT). This paper presents an in-depth survey of BCoT and discusses the insights of this new paradigm. In particular, we first briefly introduce IoT and discuss the challenges of IoT. Then, we give an overview of blockchain technology. We next concentrate on introducing the convergence of blockchain and IoT and presenting the proposal of BCoT architecture. We further discuss the issues about using blockchain for fifth generation beyond in IoT as well as industrial applications of BCoT. Finally, we outline the open research directions in this promising area.

654 citations


Cites background from "A blockchain future for internet of..."

  • ...The work of [5] presents a survey on IoT security and investigates the potentials of blockchain technologies as the solutions....

    [...]

Journal ArticleDOI
TL;DR: A model based on a slightly-altered version of the classical unified theory of acceptance and use of technology (UTAUT) is developed, which revealed the existence of distinct adoption behaviors between India-based and USA-based professionals.

543 citations

Journal ArticleDOI
20 Dec 2018-Sensors
TL;DR: A detailed and complex case-study has been presented to validate the solution in the context of a system that dynamically reverse the traveling direction of a road segment, with all the safety conditions in place.
Abstract: The new Internet of Things/Everything (IoT/IoE) paradigm and architecture allows one to rethink the way Smart City infrastructures are designed and managed, but on the other hand, a number of problems have to be solved. In terms of mobility the cities that embrace the sensoring era can take advantage of this disruptive technology to improve the quality of life of their citizens, also thanks to the rationalization in the use of their resources. In Sii-Mobility, a national smart city project on mobility and transportation, a flexible platform has been designed and here, in this paper, is presented. It permits one to set up heterogeneous and complex scenarios that integrate sensors/actuators as IoT/IoE in an overall Big Data, Machine Learning and Data Analytics scenario. A detailed and complex case-study has been presented to validate the solution in the context of a system that dynamically reverse the traveling direction of a road segment, with all the safety conditions in place. This case study composes several building blocks of the IoT platform, which demonstrate that a flexible and dynamic set-up is possible, supporting security, safety, local, cloud and mixed solutions.

449 citations


Cites background from "A blockchain future for internet of..."

  • ...Several approaches have been proposed [17], even if problematic aspects still need to be resolved [18]....

    [...]

Journal ArticleDOI
TL;DR: The purpose of this paper is to identify and discuss the main issues involved in the complex process of IoT-based investigations, particularly all legal, privacy and cloud security challenges, as well as some promising cross-cutting data reduction and forensics intelligence techniques.
Abstract: Today is the era of the Internet of Things (IoT). The recent advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices in critical infrastructures like health, transportation, environmental control, and home automation. Transferring data over a network without requiring any kind of human-to-computer or human-to-human interaction, brings reliability and convenience to consumers, but also opens a new world of opportunity for intruders, and introduces a whole set of unique and complicated questions to the field of Digital Forensics. Although IoT data could be a rich source of evidence, forensics professionals cope with diverse problems, starting from the huge variety of IoT devices and non-standard formats, to the multi-tenant cloud infrastructure and the resulting multi-jurisdictional litigations. A further challenge is the end-to-end encryption which represents a trade-off between users’ right to privacy and the success of the forensics investigation. Due to its volatile nature, digital evidence has to be acquired and analyzed using validated tools and techniques that ensure the maintenance of the Chain of Custody. Therefore, the purpose of this paper is to identify and discuss the main issues involved in the complex process of IoT-based investigations, particularly all legal, privacy and cloud security challenges. Furthermore, this work provides an overview of the past and current theoretical models in the digital forensics science. Special attention is paid to frameworks that aim to extract data in a privacy-preserving manner or secure the evidence integrity using decentralized blockchain-based solutions. In addition, the present paper addresses the ongoing Forensics-as-a-Service (FaaS) paradigm, as well as some promising cross-cutting data reduction and forensics intelligence techniques. Finally, several other research trends and open issues are presented, with emphasis on the need for proactive Forensics Readiness strategies and generally agreed-upon standards.

440 citations


Additional excerpts

  • ...[141]...

    [...]

References
More filters
Journal ArticleDOI
TL;DR: The conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Abstract: Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner. We review how this mechanism works and also look into smart contracts—scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows. We also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network. Wherever applicable, we identify solutions and workarounds. Our conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.

3,129 citations

Book ChapterDOI
17 Jan 2002
TL;DR: This chapter provides the formal definitions and basic concepts associated with SANs, explaining their behavior and their execution policy precisely.
Abstract: Stochastic activity networks have been used since the mid-1980s for performance, dependability, and performability evaluation. They have been used as a modeling formalism in three modeling tools (METASAN, UltraSAN, and Mobius), and have been used to evaluate a wide range of systems. This chapter provides the formal definitions and basic concepts associated with SANs, explaining their behavior and their execution policy precisely.

362 citations

Journal ArticleDOI
TL;DR: MADAM is a novel host-based malware detection system for Android devices which simultaneously analyzes and correlates features at four levels: kernel, application, user and package, to detect and stop malicious behaviors.
Abstract: Android users are constantly threatened by an increasing number of malicious applications (apps), generically called malware. Malware constitutes a serious threat to user privacy, money, device and file integrity. In this paper we note that, by studying their actions, we can classify malware into a small number of behavioral classes, each of which performs a limited set of misbehaviors that characterize them. These misbehaviors can be defined by monitoring features belonging to different Android levels. In this paper we present MADAM, a novel host-based malware detection system for Android devices which simultaneously analyzes and correlates features at four levels: kernel, application, user and package, to detect and stop malicious behaviors. MADAM has been specifically designed to take into account those behaviors that are characteristics of almost every real malware which can be found in the wild. MADAM detects and effectively blocks more than 96 percent of malicious apps, which come from three large datasets with about 2,800 apps, by exploiting the cooperation of two parallel classifiers and a behavioral signature-based detector. Extensive experiments, which also includes the analysis of a testbed of 9,804 genuine apps, have been conducted to show the low false alarm rate, the negligible performance overhead and limited battery consumption.

343 citations


"A blockchain future for internet of..." refers background in this paper

  • ...Applications References Smart phones and Android Security [7],[10],[17] Voice over Internet Protocol (VoIP) [2],[29] Electronic health records [30] Artificial immune system [9], [23],[44] Web server [26],[28] Firewall [46] Unmanned aerial vehicles [52] Cloud [1],[3], [14], [27],[32],[34], [35],[42]...

    [...]

  • ...[10] designed a multi-level behavior-based anomaly detector for And roi devices, designed to analyze and correlate several features at four different Androi levels (i....

    [...]

Journal ArticleDOI
TL;DR: This paper has demonstrated that CCAF multi-layered security can protect data in real-time and it has three layers of security: 1) firewall and access control; 2) identity management and intrusion prevention and 3) convergent encryption.
Abstract: Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users' data has the highest priority as well as concern. We believe this can only be able to achieve with an approach that is systematic, adoptable and well-structured. Therefore, this paper has developed a framework known as Cloud Computing Adoption Framework (CCAF) which has been customized for securing cloud data. This paper explains the overview, rationale and components in the CCAF to protect data security. CCAF is illustrated by the system design based on the requirements and the implementation demonstrated by the CCAF multi-layered security. Since our Data Center has 10 petabytes of data, there is a huge task to provide real-time protection and quarantine. We use Business Process Modeling Notation (BPMN) to simulate how data is in use. The use of BPMN simulation allows us to evaluate the chosen security performances before actual implementation. Results show that the time to take control of security breach can take between 50 and 125 hours. This means that additional security is required to ensure all data is well-protected in the crucial 125 hours. This paper has also demonstrated that CCAF multi-layered security can protect data in real-time and it has three layers of security: 1) firewall and access control; 2) identity management and intrusion prevention and 3) convergent encryption. To validate CCAF, this paper has undertaken two sets of ethical-hacking experiments involved with penetration testing with 10,000 trojans and viruses. The CCAF multi-layered security can block 9,919 viruses and trojans which can be destroyed in seconds and the remaining ones can be quarantined or isolated. The experiments show although the percentage of blocking can decrease for continuous injection of viruses and trojans, 97.43 percent of them can be quarantined. Our CCAF multi-layered security has an average of 20 percent better performance than the single-layered approach which could only block 7,438 viruses and trojans. CCAF can be more effective when combined with BPMN simulation to evaluate security process and penetrating testing results.

253 citations


"A blockchain future for internet of..." refers background or methods in this paper

  • ...Specifically, Chang and Ramachandran [27] proposed a multi layered security solution for cloud computing....

    [...]

  • ...Specifically, Chang and Ramachandran [27] proposed a multilayered security solution for cloud computing....

    [...]

  • ...Cryptography is a common approach used to provide d ata confidentiality and integrity, such as in the multi layered security approaches reported i n [27, 32]....

    [...]

  • ...Approaches References Cryptography Access control [27],[32] Geo-privacy protection [36]...

    [...]

  • ...Applications References Smart phones and Android Security [7],[10],[17] Voice over Internet Protocol (VoIP) [2],[29] Electronic health records [30] Artificial immune system [9], [23],[44] Web server [26],[28] Firewall [46] Unmanned aerial vehicles [52] Cloud [1],[3], [14], [27],[32],[34], [35],[42]...

    [...]

Journal ArticleDOI
TL;DR: This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends.

253 citations


"A blockchain future for internet of..." refers background in this paper

  • ...Osanaiye, Choo and Dlodlo [34] studied DDoS (Distributed Denial of Service) attacks in the cloud, and presented two taxonomies, one for cloud DDoS attacks and one for cloud DDoS defense....

    [...]

  • ...Applications References Smart phones and Android Security [7],[10],[17] Voice over Internet Protocol (VoIP) [2],[29] Electronic health records [30] Artificial immune system [9], [23],[44] Web server [26],[28] Firewall [46] Unmanned aerial vehicles [52] Cloud [1],[3], [14], [27],[32],[34], [35],[42]...

    [...]

  • ...Osanaiye, Choo, and Dlodlo [34] studied DDoS (distr ibu ed denial of service) attacks in the cloud, and presented two taxonomies, one for cloud DDoS attacks and one for cloud DDoS defense....

    [...]