scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

BSS: Blockchain Enabled Security System for Internet of Things Applications

TL;DR: In this article, the authors proposed a blockchain-enabled secure storage and communication scheme for IoT applications, called BSS, which uses the security advantages of blockchain and helps to create safe zones where authenticated objects interconnect securely and do communication.
Abstract: In the Internet of Things (IoT), devices can interconnect and communicate autonomously, which requires devices to authenticate each other to exchange meaningful information. Otherwise, these things become vulnerable to various attacks. The conventional security protocols are not suitable for IoT applications due to the high computation and storage demand. Therefore, we proposed a blockchain-enabled secure storage and communication scheme for IoT applications, called BSS. The scheme ensures identification, authentication, and data integrity. Our scheme uses the security advantages of blockchain and helps to create safe zones (trust batch) where authenticated objects interconnect securely and do communication. A secure and robust trust mechanism is employed to build these batches, where each device has to authenticate itself before joining the trust batch. The obtained results satisfy the IoT security requirements with 60% reduced computation, storage and communication cost compared with state-of-the-art schemes. BSS also withstands various cyberattacks such as impersonation, message replay, man-in-the-middle, and botnet attacks.
Citations
More filters
Journal ArticleDOI
27 Sep 2022
TL;DR: It is analyzed how blockchain and IoT technologies can help energy trading at the customer level from recent research proposals and the analysis of recent research on the implementation of energy trading technologies and future directions is presented.
Abstract: Electricity is still a highly demanding resource in developing countries, especifically in rural areas. Local communities in developing countries are now focusing on generating their own electricity using solar and trading the energy which is in access to the supplier. Energy trading at the peer-to-peer level is a novel paradigm. It allows customers to contribute energy to the grid and power generation and supply companies. In this paper, we investigate the energy trading enabling technologies, their applications, challenges, and benefits to the local communities from various aspects. We analyse how blockchain and IoT technologies can help energy trading at the customer level from recent research proposals. We also present our analysis of recent research on the implementation of energy trading technologies and future directions.

1 citations

Journal ArticleDOI
TL;DR: In this article , the use of blockchain and cryptographic algorithms is introduced, and the application of blockchain in IoT security is analyzed and discussed in detail, drawing upon artificial intelligence, technical solutions such as using machine learning for privacy protection and intrusion detection are presented.
Abstract: With the rapid improvement of digital technology, the Internet of things (IoT) has become a trending development direction. Its massive data interaction capabilities have drawn researchers’ attention to key security issues. This paper describes the concept of IoT, its application areas, and corresponding security problems. The use of blockchain and cryptographic algorithms is introduced, and the application of blockchain in IoT security is analyzed and discussed in detail. Drawing upon artificial intelligence, technical solutions such as using machine learning for privacy protection and intrusion detection are presented. Finally, the problems and challenges facing IoT, driven by blockchain and artificial intelligence, are discussed.
References
More filters
Journal ArticleDOI
TL;DR: This paper proposes an original decentralized system called bubbles of trust, which ensures a robust identification and authentication of devices, and protects the data integrity and availability in IoT.

479 citations

Journal ArticleDOI
TL;DR: A taxonomy of the security research areas in IoT/IIoT along with their corresponding solutions is designed and several open research directions relevant to the focus of this survey are identified.

476 citations

Journal ArticleDOI
TL;DR: A Lightweight Scalable blockchain (LSB) is proposed that is optimized for IoT requirements while also providing end-to-end security and Qualitative arguments demonstrate that the approach is resilient to several security attacks.

373 citations

Journal ArticleDOI
TL;DR: A systematic study of the peculiarities of the IoT environment including its security and performance requirements and progression in blockchain technologies is carried out and a way forward is proposed to resolve some of the significant challenges to the blockchain's adoption in IoT.

339 citations

Journal ArticleDOI
TL;DR: A blockchain based multi-WSN authentication scheme for IoT is proposed and the analysis of security and performance shows that the scheme has comprehensive security and better performance.
Abstract: Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity authentication protocols usually rely on trusted third parties. However, many IoT environments do not allow such conditions, and are prone to single point failure. Blockchain technology with decentralization features provides a new solution for distributed IoT system. In this paper, a blockchain based multi-WSN authentication scheme for IoT is proposed. The nodes of IoT are divided into base stations, cluster head nodes and ordinary nodes according to their capability differences, which are formed to a hierarchical network. A blockchain network is constructed among different types of nodes to form a hybrid blockchain model, including local chain and public chain. In this hybrid model, nodes identity mutual authentication in various communication scenarios is realized, ordinary node identity authentication operation is accomplished by local blockchain, and cluster head node identity authentication are realized in public blockchain. The analysis of security and performance shows that the scheme has comprehensive security and better performance.

328 citations