A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology

Abstract Communicating Things Network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is dependent on human interference. Interconnected physical objects in the network communicate with each other and facilitate intelligent decision-making by monitoring and analysing their surroundings. In today's era, CTNs are playing a significant role in daily activities by providing a substantial reduction in costs with increased visibility and efficiency in all aspects of businesses and individuals. In this manuscript, we have considered an important application of CTNs (i.e., IoT) and have proposed a secure Hybrid Industrial IoT framework using the Blockchain technique. We have used a hybrid industrial architecture where different branches of a company are located in more than one country. Although IoT devices are used in many organizations and assist in reducing their production costs along with improving quality, several threats can occur in IoT devices initiated by various intruders. Intruders may compromise IoT devices with the purpose of performing malicious activities. For example, a company's employee may steal some product or may rest during working hours. To prevent these issues, the Blockchain technology is considered as the best technique that provides secrecy and protects the control system in real-time conditions. In this manuscript, we have used a Blockchain mechanism to extract information from IoT devices and store extracted records into Blockchain to maintain transparency among various users located at different places. Furthermore, the experimentation of the proposed framework has been performed against the internal communication of Blockchain where IoT devices are compromised by several intruders. Results have been analysed against the conventional approach and validated with improved simulated results that offer an 89% success rate over user request time, falsification attack, black hole attack, and probabilistic authentication scenarios because of the Blockchain technology.

[1]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[2]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[3]  Dennis Miller,et al.  Blockchain and the Internet of Things in the Industrial Sector , 2018, IT Professional.

[4]  Xin Huang,et al.  A Secure System For Pervasive Social Network-Based Healthcare , 2016, IEEE Access.

[5]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[6]  Anastas Mishev,et al.  Blockchain solutions for big data challenges: A literature review , 2017, IEEE EUROCON 2017 -17th International Conference on Smart Technologies.

[7]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[8]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[9]  Thomas Lundqvist,et al.  Thing-to-thing electricity micro payments using blockchain technology , 2017, 2017 Global Internet of Things Summit (GIoTS).

[10]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[11]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[12]  Yuchen Yang,et al.  Blockchain application in food supply information security , 2017, 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).

[13]  Deepak Puthal,et al.  Proof of Authentication: IoT-Friendly Blockchains , 2019, IEEE Potentials.

[14]  Muttukrishnan Rajarajan,et al.  Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain , 2019, Ad Hoc Networks.

[15]  G. E. Town,et al.  Towards an internet of energy , 2016, 2016 IEEE International Conference on Power System Technology (POWERCON).

[16]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[17]  Ian F. Akyildiz,et al.  A Novel Communication Paradigm for High Capacity and Security via Programmable Indoor Wireless Environments in Next Generation Wireless Systems , 2018, Ad Hoc Networks.

[18]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[19]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[20]  Saru Kumari,et al.  An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.

[21]  Victor C. M. Leung,et al.  Trust management for secure cognitive radio vehicular ad hoc networks , 2019, Ad Hoc Networks.

[22]  Marco Ruffini,et al.  Code-based physical layer secret key generation in passive optical networks , 2019, Ad Hoc Networks.

[23]  Sherali Zeadally,et al.  Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 , 2018, IEEE Transactions on Industrial Informatics.

[24]  Tiago M. Fernández-Caramés,et al.  A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry , 2019, IEEE Access.

[25]  Kim-Kwang Raymond Choo,et al.  Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.

[26]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[27]  You-Jin Song,et al.  Secure Identifier Management Based on Blockchain Technology in NDN Environment , 2019, IEEE Access.

[28]  Yun Peng,et al.  Efficient key management scheme for health blockchain , 2018, CAAI Trans. Intell. Technol..

[29]  Yang Lu,et al.  Industry 4.0: A survey on technologies, applications and open research issues , 2017, J. Ind. Inf. Integr..

[30]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[31]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[32]  Fatih Alagöz,et al.  Cost-aware securing of IoT systems using attack graphs , 2019, Ad Hoc Networks.

[33]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[34]  Sachchidanand Singh,et al.  Blockchain: Future of financial and cyber security , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[35]  Jameela Al-Jaroodi,et al.  Leveraging the Capabilities of Industry 4.0 for Improving Energy Efficiency in Smart Factories , 2019, IEEE Access.