Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT

The inclusion of mobility-based Internet-of-Things (IoT) devices accelerates the data transmission process, thereby catering to IoT users’ demands; however, securing the data transmission in mobility-based IoT is one complex and challenging concern. The adoption of unified security architecture has been identified to prevent side-channel attacks in the IoT, which has been discussed extensively in developing security solutions. Despite blockchain’s apparent superiority in withstanding a wide range of security threats, a careful examination of the relevant literature reveals that some common pitfalls are associated with these methods. Therefore, the proposed scheme introduces a novel computational security framework wherein a branched and decentralized blockchain network is formulated to facilitate coverage from different variants of side-channel IoT attacks that are yet to be adequately reported. A unique blockchain-based authentication approach is designed to secure communication among mobile IoT devices using multiple stages of security implementation with Smart Agreement and physically unclonable functions. Analytical modeling with lightweight finite field encryption is used to create this framework in Python. The study’s benchmark results show that the proposed scheme offers 4% less processing time, 5% less computational overhead, 1% more throughput, 12% less latency, and 30% less energy consumption compared to existing blockchain methods.

[1]  Bhaskar B. Gardas,et al.  A Fuzzy-Based Method for Objects Selection in Blockchain-Enabled Edge-IoT Platforms Using a Hybrid Multi-Criteria Decision-Making Model , 2022, Applied Sciences.

[2]  J. Chang,et al.  A Highly Secure FPGA-Based Dual-Hiding Asynchronous-Logic AES Accelerator Against Side-Channel Attacks , 2022, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[3]  Viraaji Mothukuri,et al.  FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems , 2022, IEEE Systems Journal.

[4]  Shahin Akbarpour,et al.  Deep Q-Learning Technique for Offloading Offline/Online Computation in Blockchain-Enabled Green IoT-Edge Scenarios , 2022, Applied Sciences.

[5]  Phee Lep Yeoh,et al.  Stochastic Analysis of Double Blockchain Architecture in IoT Communication Networks , 2022, IEEE Internet of Things Journal.

[6]  A. Ghosh,et al.  Electromagnetic Analysis of Integrated On-Chip Sensing Loop for Side-Channel and Fault-Injection Attack Detection , 2022, IEEE Microwave and Wireless Components Letters.

[7]  Jianhong Zhou,et al.  Optimal Deployment Mechanism of Blockchain in Resource-Constrained IoT Systems , 2022, IEEE Internet of Things Journal.

[8]  Suhan Jiang,et al.  Multi-Leader Multi-Follower Stackelberg Game in Mobile Blockchain Mining , 2022, IEEE Transactions on Mobile Computing.

[9]  Joaquim Macedo,et al.  A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures , 2022, Electronics.

[10]  Mariano García Otero,et al.  Methodology for Complete Decorrelation of Power Supply EM Side-Channel Signal and Sensitive Data , 2022, IEEE Transactions on Circuits and Systems II: Express Briefs.

[11]  Tom H. Luan,et al.  A Lightweight and Attack-Proof Bidirectional Blockchain Paradigm for Internet of Things , 2022, IEEE Internet of Things Journal.

[12]  Jin Sun,et al.  Permissioned Blockchain Frame for Secure Federated Learning , 2022, IEEE Communications Letters.

[13]  M. Zhang,et al.  Demand–Response Games for Peer-to-Peer Energy Trading With the Hyperledger Blockchain , 2022, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[14]  Zhengguo Sheng,et al.  A Blockchain Based Federated Learning for Message Dissemination in Vehicular Networks , 2021, IEEE Transactions on Vehicular Technology.

[15]  Bingxian Lu,et al.  Privacy-Preserving Blockchain-Based Federated Learning for Marine Internet of Things , 2021, IEEE Transactions on Computational Social Systems.

[16]  Jianliang Xu,et al.  VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems , 2021, IEEE Transactions on Network Science and Engineering.

[17]  Yinbin Miao,et al.  Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems , 2022, IEEE Transactions on Information Forensics and Security.

[18]  B. Raza,et al.  Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment , 2022, IEEE Access.

[19]  W. Liu,et al.  Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs , 2022, IEEE Transactions on Information Forensics and Security.

[20]  Taehun Kim,et al.  ThermalBleed: A Practical Thermal Side-Channel Attack , 2022, IEEE Access.

[21]  E. Ball,et al.  A Secure Blockchain Platform for Supporting AI-Enabled IoT Applications at the Edge Layer , 2022, IEEE Access.

[22]  Haya R. Hasan,et al.  Trustworthy IoT Data Streaming Using Blockchain and IPFS , 2022, IEEE Access.

[23]  K. Navaie,et al.  Game-Theoretic Analysis of an Exclusively Transaction-Fee Reward Blockchain System , 2022, IEEE Access.

[24]  Donggeun Kwon,et al.  Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks , 2022, IEEE Access.

[25]  Y. Byun,et al.  Blockchain-Based Event Detection and Trust Verification Using Natural Language Processing and Machine Learning , 2022, IEEE Access.

[26]  Junyu Ren,et al.  Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT , 2022, Tsinghua Science and Technology.

[27]  Pavol Zajac,et al.  IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques , 2021, Electronics.

[28]  S. Vidalis,et al.  A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues , 2021, Electronics.

[29]  Peyman Akhavan,et al.  IoT–Blockchain: Harnessing the Power of Internet of Thing and Blockchain for Smart Supply Chain , 2021, Sensors.

[30]  Choong Seon Hong,et al.  Cyber Insurance Design for Validator Rotation in Sharded Blockchain Networks: A Hierarchical Game-Based Approach , 2021, IEEE Transactions on Network and Service Management.

[31]  Mohd Juzaidin Ab Aziz,et al.  Blockchain for Electronic Voting System—Review and Open Research Challenges , 2021, Sensors.

[32]  Xiaofei Wang,et al.  Networking Integrated Cloud–Edge–End in IoT: A Blockchain-Assisted Collective Q-Learning Approach , 2021, IEEE Internet of Things Journal.

[33]  Nathalie Mitton,et al.  Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey , 2021, Applied Sciences.

[34]  Rubén Salvador,et al.  Physical Side-Channel Attacks on Embedded Neural Networks: A Survey , 2021, Applied Sciences.

[35]  Carlo Kleber da Silva Rodrigues,et al.  Towards Blockchain for Suitable Efficiency and Data Integrity of IoT Ecosystem Transactions , 2021, IEEE Latin America Transactions.

[36]  Marcin Woźniak,et al.  Blockchain Technology for Secured Healthcare Data Communication among the Non-Terminal Nodes in IoT Architecture in 5G Network , 2021 .

[37]  Junwei Sun,et al.  Memristor-Based Neural Network Circuit of Emotion Congruent Memory With Mental Fatigue and Emotion Inhibition , 2021, IEEE Transactions on Biomedical Circuits and Systems.

[38]  Daniel E. Holcomb,et al.  Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs , 2021, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[39]  Shiva Raj Pokhrel,et al.  A Blockchained Federated Learning Framework for Cognitive Computing in Industry 4.0 Networks , 2021, IEEE Transactions on Industrial Informatics.

[40]  Özgü Alay,et al.  Energy Efficiency in Short and Wide-Area IoT Technologies—A Survey , 2021, Technologies.

[41]  Yung-Cheol Byun,et al.  Integration of Blockchain, IoT and Machine Learning for Multistage Quality Control and Enhancing Security in Smart Manufacturing , 2021, Sensors.

[42]  Sina Sayyah Ensan,et al.  SCARE: Side Channel Attack on In-Memory Computing for Reverse Engineering , 2020, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[43]  Yue Zhang,et al.  DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.

[44]  Dusit Niyato,et al.  On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach , 2018, IEEE Transactions on Services Computing.

[45]  K. Suzaki,et al.  A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor , 2021, IEEE Access.

[46]  Samaneh Ghandali,et al.  Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128 , 2021, IEEE Access.

[47]  Barween Al Kurdi,et al.  IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare - A Review , 2021, Future Internet.

[48]  Rajkumar Buyya,et al.  BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture , 2021, IEEE Access.

[49]  Georg Sigl,et al.  Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA , 2021, IEEE Transactions on Information Forensics and Security.

[50]  Alessandro Barenghi,et al.  Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks , 2021, IEEE Access.

[51]  Alie El-Din Mady,et al.  Moving Target Defense Mechanism for Side-Channel Attacks , 2020, IEEE Systems Journal.

[52]  Mark Randolph,et al.  Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman , 2020, Cryptogr..

[53]  Alessandro Severino,et al.  A Review on IEEE 802.11p for Intelligent Transportation Systems , 2020, J. Sens. Actuator Networks.

[54]  Song Guo,et al.  Blockchain Meets Edge Computing: Stackelberg Game and Double Auction Based Task Offloading for Mobile Blockchain , 2020, IEEE Transactions on Vehicular Technology.

[55]  Dezhi Han,et al.  Fabric-iot: A Blockchain-Based Access Control System in IoT , 2020, IEEE Access.

[56]  Yanfeng Wang,et al.  Memristor-Based Neural Network Circuit of Full-Function Pavlov Associative Memory With Time Delay and Variable Learning Rate , 2019, IEEE Transactions on Cybernetics.

[57]  Tariq M. Khan,et al.  Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction , 2020, IEEE Access.

[58]  Ronny Yongho Kim,et al.  A Novel WLAN Vehicle-To-Anything (V2X) Channel Access Scheme for IEEE 802.11p-Based Next-Generation Connected Car Networks , 2018, Applied Sciences.

[59]  William J Buchanan,et al.  Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) , 2017 .

[60]  Chun-fu Jia,et al.  Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication , 2022, Tsinghua Science and Technology.