A blockchain-based smart home gateway architecture for preventing data forgery

With the advancement of Information and Communication Technology (ICT) and the proliferation of sensor technologies, the Internet of Things (IoT) is now being widely used in smart home for the purposes of efficient resource management and pervasive sensing. In smart homes, various IoT devices are connected to each other, and these connections are centered on gateways. The role of gateways in the smart homes is significant, however, its centralized structure presents multiple security vulnerabilities such as integrity, certification, and availability. To address these security vulnerabilities, in this paper, we propose a blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes. The network consists of three layers including device, gateway, and cloud layers. The blockchain technology is employed at the gateway layer wherein data is stored and exchanged in the form blocks of blockchain to support decentralization and overcome the problem from traditional centralized architecture. The blockchain ensures the integrity of the data inside and outside of the smart home and provides availability through authentication and efficient communication between network members. We implemented the proposed network on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy. The evaluation results demonstrate that the proposed security solutions outperforms over the existing solutions.

[1]  Tai-hoon Kim,et al.  A Review on Security in Smart Home Development , 2010 .

[2]  Gary Steri,et al.  Privacy leakages in Smart Home wireless technologies , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).

[3]  Jianming Zhang,et al.  Energy-efficient and network-aware offloading algorithm for mobile cloud computing , 2014, Comput. Networks.

[4]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[5]  Sonal Sharma,et al.  A voice-controlled multi-functional Smart Home Automation System , 2015, 2015 Annual IEEE India Conference (INDICON).

[6]  Michael Schiefer Smart Home Definition and Security Threats , 2015, 2015 Ninth International Conference on IT Security Incident Management & IT Forensics.

[7]  Roksana Boreli,et al.  Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[8]  Richard Watson,et al.  Flow Based Security for IoT Devices Using an SDN Gateway , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[9]  Karl N. Levitt,et al.  Is Anybody Home? Inferring Activity From Smart Home Network Traffic , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[10]  Jong-Hyouk Lee,et al.  Firmware Verification of Embedded Devices Based on a Blockchain , 2016, QSHINE.

[11]  Neil W. Bergmann,et al.  IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..

[12]  Kartik Palani,et al.  Invisible and forgotten: Zero-day blooms in the IoT , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[13]  Seoung-Hyeon Lee,et al.  Secure firmware validation and update for consumer devices in home networking , 2016, IEEE Transactions on Consumer Electronics.

[14]  Ron Cottam,et al.  Hierarchy and the Nature of Information , 2016, Inf..

[15]  Keqin Li,et al.  Robust dynamic network traffic partitioning against malicious attacks , 2017, J. Netw. Comput. Appl..

[16]  J. Pettersen,et al.  Life cycle impact assessment in the arctic: Challenges and research needs , 2017 .

[17]  Xiaofei Wang,et al.  Smart Home 2.0: Innovative Smart Home System Powered by Botanical IoT and Emotion Detection , 2017, Mob. Networks Appl..

[18]  R. Nagarajan,et al.  Intelligent Smart Home Automation and Security System Using Arduino and Wi-fi , 2017 .

[19]  Ben A. Amaba,et al.  Blockchain technology innovations , 2017, 2017 IEEE Technology & Engineering Management Conference (TEMSCON).

[20]  Shiming He,et al.  PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid , 2017, KSII Trans. Internet Inf. Syst..

[21]  Shiming He,et al.  An efficient privacy-preserving compressive data gathering scheme in WSNs , 2015, Inf. Sci..

[22]  Jong Hyuk Park,et al.  Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..

[23]  Jong Hyuk Park,et al.  SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home , 2017 .

[24]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[25]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[26]  Yan Zhang,et al.  Software Defined Networking for Energy Harvesting Internet of Things , 2018, IEEE Internet of Things Journal.

[27]  Jong Hyuk Park,et al.  DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network , 2018, IEEE Consumer Electronics Magazine.

[28]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[29]  Ke Gu,et al.  Location Data Record Privacy Protection based on Differential Privacy Mechanism , 2018, Inf. Technol. Control..

[30]  Young-Sik Jeong,et al.  SoftEdgeNet: SDN Based Energy-Efficient Distributed Network Architecture for Edge Computing , 2018, IEEE Communications Magazine.

[31]  Jin Wang,et al.  Location Privacy Protection Research Based on Querying Anonymous Region Construction for Smart Campus , 2018, Mob. Inf. Syst..

[32]  Gerard Jounghyun Kim,et al.  IoT + AR: pervasive and augmented environments for “Digi-log” shopping experience , 2019, Human-centric Computing and Information Sciences.

[33]  Jong Hyuk Park,et al.  A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions , 2018, J. Inf. Process. Syst..

[34]  Jong Hyuk Park Practical Approaches Based on Deep Learning and Social Computing , 2018, J. Inf. Process. Syst..

[35]  Shailendra Rathore,et al.  CIoT-Net: a scalable cognitive IoT based smart city network architecture , 2019, Human-centric Computing and Information Sciences.

[36]  Jin Wang,et al.  Local privacy protection classification based on human-centric computing , 2019, Human-centric Computing and Information Sciences.

[37]  Jong Hyuk Park,et al.  BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network , 2019, J. Netw. Comput. Appl..

[38]  Wei Liu,et al.  Energy Efficient Routing Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2019, Sensors.

[39]  Jong Hyuk Park,et al.  Distributed denial of service attacks and its defenses in IoT: a survey , 2019, The Journal of Supercomputing.

[40]  Yi Pan,et al.  BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network , 2019, Sustainability.

[41]  Sebastian J. F. Fudickar,et al.  Mass Surveilance of C. elegans—Smartphone-Based DIY Microscope and Machine-Learning-Based Approach for Worm Detection , 2019, Sensors.

[42]  Ahmad Ashari,et al.  Internet of Things (IoT) of Smart Home: Privacy and Security , 2019, International Journal of Computer Applications.

[43]  D. Andrejko,et al.  Assessment of the Potential Use of Young Barley Shoots and Leaves for the Production of Green Juices , 2019, Sustainability.

[44]  Nalini Venkatasubramanian,et al.  Smart Home Survey on Security and Privacy , 2019, ArXiv.

[45]  Geong Sen Poh,et al.  PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment , 2019, IEEE Transactions on Dependable and Secure Computing.