Public-Key Reinforced Blockchain Platform for Fog-IoT Network System Administration

The number of embedded devices that connect to a wireless network has been growing for the past decade. This interaction creates a network of Internet of Things (IoT) devices where data travel continuously. With the increase of devices and the need for the network to extend via fog computing, we have fog-based IoT networks. However, with more endpoints introduced to it, the network becomes open to malicious attackers. This work attempts to protect fog-based IoT networks by creating a platform that secures the endpoints through public-key encryption. The servers are allowed to mask the data packets shared within the network. To be able to track all of the encryption processes, we incorporated the use of permissioned blockchains. This technology completes the security layer by providing an immutable and automated data structure to function as a hyper ledger for the network. Each data transaction incorporates a handshake mechanism with the use of a public key pair. This design guarantees that only devices that have proper access through the keys can use the network. Hence, management is made convenient and secure. The implementation of this platform is through a wireless server-client architecture to simulate the data transactions between devices. The conducted qualitative tests provide an in-depth feasibility investigation on the network’s levels of security. The results show the validity of the design as a means of fortifying the network against endpoint attacks.

[1]  Hwajeong Seo,et al.  A High-Speed Public-Key Signature Scheme for 8-b IoT-Constrained Devices , 2020, IEEE Internet of Things Journal.

[2]  Keke Gai,et al.  Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.

[3]  Kyung-Ah Shim,et al.  A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.

[4]  Shahzad A. Malik,et al.  Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues , 2019, IEEE Internet of Things Journal.

[5]  Mritunjay Kumar Rai,et al.  Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications , 2019, IEEE Access.

[6]  Prem Prakash Jayaraman,et al.  Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions , 2018, IEEE Access.

[7]  Laurence T. Yang,et al.  Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices , 2020, IEEE Transactions on Industrial Informatics.

[8]  Yannan Li,et al.  Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things , 2018, IEEE Wireless Communications.

[9]  Basem Shihada,et al.  Blockchain in IoT Systems: End-to-End Delay Evaluation , 2019, IEEE Internet of Things Journal.

[10]  PRADIP KUMAR SHARMA,et al.  A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.

[11]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[12]  Lei Shu,et al.  Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design , 2020, IEEE/CAA Journal of Automatica Sinica.

[13]  Xiong Luo,et al.  A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things , 2018, IEEE Access.

[14]  Adam Shostack,et al.  Threat Modeling: Designing for Security , 2014 .

[15]  Weijun Wang,et al.  A Reliability Analysis of CFETR CSMC Heat Treatment System Based on RPN-HAZOP Method , 2020, IEEE Transactions on Plasma Science.

[16]  Cheng Li,et al.  Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.

[17]  Ammar Mohammed Ali,et al.  A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document , 2020, IEEE Access.

[18]  R. Khondoker,et al.  Cyber Security Threat Modeling of A Telesurgery System , 2020, 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI).

[19]  Chunhua Su,et al.  Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints , 2018, IEEE Signal Processing Magazine.

[20]  Amir Herzberg,et al.  Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.

[21]  Paolo Tasca,et al.  Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.

[22]  Robert F. Mills,et al.  Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study , 2018, IEEE Access.

[23]  Fahad Ahmad Al-Zahrani,et al.  Subscription-Based Data-Sharing Model Using Blockchain and Data as a Service , 2020, IEEE Access.

[24]  Frederick T. Sheldon,et al.  Access Control in Fog Computing: Challenges and Research Agenda , 2020, IEEE Access.

[25]  Hai Jin,et al.  Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT , 2017, IEEE Access.

[26]  Kai Chen,et al.  Multitier Fog Computing With Large-Scale IoT Data Analytics for Smart Cities , 2018, IEEE Internet of Things Journal.

[27]  Sandeep K. Sood,et al.  Fog Assisted-IoT Enabled Patient Health Monitoring in Smart Homes , 2018, IEEE Internet of Things Journal.

[28]  Tony Ucedavélez,et al.  Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis , 2015 .

[29]  Michael Mylrea,et al.  Evaluation and Demonstration of Blockchain Applicability Framework , 2020, IEEE Transactions on Engineering Management.

[30]  Sakir Sezer,et al.  STRIDE-based threat modeling for cyber-physical systems , 2017, 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).

[31]  Sherali Zeadally,et al.  Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions , 2019, IEEE Internet of Things Journal.

[32]  Alan Davy,et al.  Distributed Decomposed Data Analytics in Fog Enabled IoT Deployments , 2019, IEEE Access.

[33]  Jameela Al-Jaroodi,et al.  Blockchain in Industries: A Survey , 2019, IEEE Access.

[34]  W. Sardjono,et al.  Information Systems Risk Analysis Using Octave Allegro Method Based at Deutsche Bank , 2018, 2018 International Conference on Information Management and Technology (ICIMTech).

[35]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[36]  Salman A. Khan,et al.  A STRIDE Model based Threat Modelling using Unified and-Or Fuzzy Operator for Computer Network Security , 2017 .

[37]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.