Blockchain as a solution for security attacks in named data networking of things

Abstract In the world of technology, the Internet of Things (IoT) is a network to link entire things, that is, people, devices, and systems, with each other through an approach of common networking. This technology constructed a way, where many of the routine devices or things are interrelated and easily communicated with, their surroundings to gather or transfer the information over the network without the need of any human-to-system communication or human-to-human communication. It is born with features such as dynamics, scalability, and heterogeneity, and only that network solution can adapt to it which has strategy to incorporate its features. And here comes data centric interaction paradigm, it applies an approach of data naming to comprise the dynamics, scalability, and heterogeneity features to adapt to IoT and composes NDN of things, that is, Named Data Networking of Things (NDNoT). This paradigm also familiarizes the readers with the various kinds of security irruptions that occur in the network, and blockchain acts as a solution for those security attacks in NDNoT. The technology of blockchain is born with a cryptocurrency known as Bitcoin. It is an undoubtedly amazing and innovative invention in the world of technology. The cryptographic algorithms used by blockchains would make consumer data more private. So the technology of blockchain could perhaps be the silver bullet required by the industry of Internet of Things.

[1]  Máire O'Neill,et al.  Practical homomorphic encryption: A survey , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).

[2]  Xu Chen,et al.  Socially Motivated Data Caching in Ultra-Dense Small Cell Networks , 2017, IEEE Network.

[3]  Ibrar Yaqoob,et al.  Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.

[4]  Michael Bedford Taylor,et al.  The Evolution of Bitcoin Hardware , 2017, Computer.

[5]  Tiago M. Fernández-Caramés,et al.  Enabling automatic event detection for the pipe workshop of the shipyard 4.0 , 2017, 2017 56th FITCE Congress.

[6]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[7]  Shin-Ming Cheng,et al.  On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[8]  Nikhil Sharma,et al.  Architectural Model of Security Threats & theirCountermeasures in IoT , 2019, 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS).

[9]  Athanasios V. Vasilakos,et al.  Security of Cached Content in NDN , 2017, IEEE Transactions on Information Forensics and Security.

[10]  Ralph Deters,et al.  Wearable IoT Data Architecture , 2017, 2017 IEEE World Congress on Services (SERVICES).

[11]  M. Gonzalez-Lopez,et al.  Maritime Freight Container Management System Using RFID , 2010 .

[12]  Fred B. Schneider,et al.  Federated Identity Management Systems: A Privacy-Based Characterization , 2013, IEEE Security & Privacy.

[13]  Erik Poll,et al.  A security protocol for information-centric networking in smart grids , 2013, SEGS '13.

[14]  Nikhil Sharma,et al.  Authentication & Encryption Based Security Services in Blockchain Technology , 2019, 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS).

[15]  Malte Möser,et al.  An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.

[16]  Alexander Afanasyev,et al.  Named Data Networking of Things (Invited Paper) , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).

[17]  Jiyue Huang,et al.  Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing , 2020, IEEE Transactions on Services Computing.

[18]  Mohamed Hamdi,et al.  Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues , 2016, 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC).

[19]  Luís Veiga,et al.  Energy Efficiency Dilemma: P2P-cloud vs. Datacenter , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[20]  Satyajayant Misra,et al.  LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities , 2017, IEEE Internet of Things Journal.

[21]  Nikhil Sharma,et al.  Evolution of IoT & Data Analytics using Deep Learning , 2019, 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS).

[22]  Axel Jantsch,et al.  The Benefits of Self-Awareness and Attention in Fog and Mist Computing , 2015, Computer.

[23]  Muneeb Ali,et al.  CSN: a network protocol for serving dynamic queries in large-scale wireless sensor networks , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[24]  Michael Schukat,et al.  Zero-knowledge proofs in M2M communication , 2014 .

[25]  Tiago M. Fernández-Caramés,et al.  Smart Pipe System for a Shipyard 4.0 , 2016, Sensors.

[26]  Athanasios V. Vasilakos,et al.  IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.

[27]  Mengjun Xie,et al.  Enhancing cache robustness for content-centric networking , 2012, 2012 Proceedings IEEE INFOCOM.

[28]  Norman Meuschke,et al.  Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.

[29]  Burkhard Stiller,et al.  Blockchains everywhere - a use-case of blockchains in the pharma supply-chain , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[30]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[31]  Young-Jin Kim,et al.  Resilient end-to-end message protection for large-scale cyber-physical system communications , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[32]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[33]  Paula Fraga-Lamas,et al.  Unleashing the Potential of LTE for Next Generation Railway Communications , 2015, Nets4Cars/Nets4Trains/Nets4Aircraft.

[34]  Liming Zhu,et al.  Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[35]  Jian Mi,et al.  Design of an HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization , 2016, Sensors.

[36]  Susan Landau,et al.  Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations , 2014, IEEE Security & Privacy.

[37]  Susan Landau,et al.  Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.

[38]  Peiqing Zhang,et al.  Towards green P2P: Analysis of energy consumption in P2P and approaches to control , 2012, 2012 International Conference on High Performance Computing & Simulation (HPCS).

[39]  P. Fraga-Lamas,et al.  Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN , 2016, 2016 International Conference on Military Communications and Information Systems (ICMCIS).

[40]  Tiago M. Fernández-Caramés,et al.  RSS stabilization techniques for a real-time passive UHF RFID pipe monitoring system for smart shipyards , 2017, 2017 IEEE International Conference on RFID (RFID).

[41]  Wei Xu,et al.  EEP2P: An energy-efficient and economy-efficient P2P network protocol , 2014, International Green Computing Conference.

[42]  Priya Mahadevan,et al.  Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.

[43]  Feng Wang,et al.  Survey on swarm intelligence based routing protocols for wireless sensor networks: An extensive study , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).

[44]  Kun Peng,et al.  Attack against a batch zero-knowledge proof system , 2012, IET Inf. Secur..

[45]  Dixys L. Hernández-Rojas,et al.  Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications , 2017, Sensors.

[46]  Hongjin Kim,et al.  Blockchain based smart door lock system , 2017, 2017 International Conference on Information and Communication Technology Convergence (ICTC).