Bring Trust to Edge: Secure and Decentralized IoT Framework with BFT and Permissioned Blockchain

While our society accelerates its transition to the Internet of Things, billions of IoT devices are now linked to the network. While these gadgets provide enormous convenience, they generate a large amount of data that has already beyond the network’s capacity. To make matters worse, the data acquired by sensors on such IoT devices also include sensitive user data that must be appropriately treated. At the moment, the answer is to provide hub services for data storage in data centers. However, when data is housed in a centralized data center, data owners lose control of the data, since data centers are centralized solutions that rely on data owners’ faith in the service provider. In addition, edge computing enables edge devices to collect, analyze, and act closer to the data source, the challenge of data privacy near the edge is also a tough nut to crack.A large number of user information leakage both for IoT hub and edge made the system untrusted all along. Accordingly, building a decentralized IoT system near the edge and bringing real trust to the edge is indispensable and significant. To eliminate the need for a centralized data hub, we present a prototype of a unique, secure, and decentralized IoT framework called Reja, which is built on a permissioned Blockchain and an intrusion-tolerant messaging system ChiosEdge, and the critical components of ChiosEdge are reliable broadcast and BFT consensus. We evaluated the latency and throughput of Reja and its sub-module ChiosEdge.

[1]  Yueming Lu,et al.  CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network , 2022, IEEE Internet of Things Journal.

[2]  Yuchen Zeng,et al.  Hybrid Blockchain-Based Resource Trading System for Federated Learning in Edge Computing , 2021, IEEE Internet of Things Journal.

[3]  Murat Kantarcioglu,et al.  BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture , 2020, CODASPY.

[4]  Louise Crawford,et al.  Permissionless and permissioned blockchain diffusion , 2020, Int. J. Inf. Manag..

[5]  Yelena Yesha,et al.  Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging , 2020, 2020 International Symposium on Reliable Distributed Systems (SRDS).

[6]  Yi Sun,et al.  Hybrid blockchain–based privacy-preserving electronic medical records sharing scheme across medical information control system , 2020, Measurement and Control.

[7]  Ziteng Chen,et al.  A Decentralized and Trusted Edge Computing Platform for Internet of Things , 2020, IEEE Internet of Things Journal.

[8]  Zhihua Cui,et al.  A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN , 2020, IEEE Transactions on Services Computing.

[9]  Hyoungshick Kim,et al.  Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms , 2020, Sensors.

[10]  Ivan Martinovic,et al.  Peeves: Physical Event Verification in Smart Homes , 2019, CCS.

[11]  Yingshu Li,et al.  Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[12]  Murat Kantarcioglu,et al.  A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[13]  Ciprian Dobre,et al.  Decentralized Storage System for Edge Computing , 2019, 2019 18th International Symposium on Parallel and Distributed Computing (ISPDC).

[14]  David E. Culler,et al.  JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT , 2019, USENIX Security Symposium.

[15]  Patrick Traynor,et al.  Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems , 2019, NDSS.

[16]  Peng Liu,et al.  Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms , 2018, USENIX Security Symposium.

[17]  Jaemin Lim,et al.  Pinto: Enabling Video Privacy for Commodity IoT Cameras , 2018, CCS.

[18]  Rüdiger Kapitza,et al.  Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric , 2018, ArXiv.

[19]  Barbara Carminati,et al.  Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[20]  Praveen Gauravaram,et al.  LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy , 2017, ArXiv.

[21]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[22]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[23]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[24]  Quan Zhang,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[25]  Alysson Neves Bessani,et al.  State Machine Replication for the Masses with BFT-SMART , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[26]  Alysson Neves Bessani,et al.  From Byzantine Consensus to BFT State Machine Replication: A Latency-Optimal Transformation , 2012, 2012 Ninth European Dependable Computing Conference.

[27]  G. Crow,et al.  Research Ethics and Data Quality: The Implications of Informed Consent , 2006 .

[28]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[29]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[30]  Frédéric Cuppens,et al.  Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[31]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[32]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[33]  Ravi S. Sandhu,et al.  How to do discretionary access control using roles , 1998, RBAC '98.

[34]  Sylvia L. Osborn Mandatory access control and role-based access control revisited , 1997, RBAC '97.

[35]  C. Manimegalai,et al.  A Modified Hybrid Blockchain Framework for Secured Data Transaction , 2021, Journal of Physics: Conference Series.

[36]  Patrick D. McDaniel,et al.  IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT , 2019, NDSS.

[37]  Dave Levin,et al.  Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet , 2019, NDSS.

[38]  Rajarshi Gupta,et al.  All Things Considered: An Analysis of IoT Devices on Home Networks , 2019, USENIX Security Symposium.

[39]  P. G. Allen,et al.  Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study , 2019 .

[40]  Blase Ur,et al.  Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.

[41]  E. Soler,et al.  Future Generation Computer Systems , 2018 .

[42]  Rahim Rahmani,et al.  Towards Security on Internet of Things: Applications and Challenges in Technology , 2018, EUSPN/ICTH.

[43]  Dimitrios Koutsonikolas,et al.  ABC: Enabling Smartphone Authentication with Built-in Camera , 2018, NDSS.

[44]  Christian Cachin,et al.  Architecture of the Hyperledger Blockchain Fabric , 2016 .

[45]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .