Achieving IoT data security based blockchain

Security in Internet of Things (IoT) remains a significant concern within academia and industry. With the great potential of IoT data, the traditional centralized architecture of IoT system is limited and cannot afford security solutions. In this paper, to address the issue of IoT data security, we propose a blockchain-based data acquisition and processing architecture. The proposed architecture ensures IoT data security through data consistency. It supports distributed IoT nodes to negotiate consensus on the processed data, and decides to write the consensus data to blockchain ledger. Since distributed nodes are non-peer and have different voting weights in the proposed architecture, traditional consensus algorithms are not applicable. Therefore, we design a novel consensus algorithm for data consistency between non-peer nodes: Byzantine Fault-Tolerant consensus algorithm based on Dynamic Permission Adjustment (DPA-PBFT) algorithm. The DPA-PBFT algorithm works in the consensus domain of different weight nodes with the ability of self-optimize. It improves consensus efficiency and reduces communication overhead for data consistency. Finally, we conduct numerous experiments to evaluate the performance improvement of the DPA-PBFT algorithm under the proposed distributed architecture.

[1]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[2]  Xiaohong Huang,et al.  LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem , 2018, IEEE Access.

[3]  Eryk Dutkiewicz,et al.  Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and Opportunities , 2019, IEEE Access.

[4]  Christos Kotselidis,et al.  Demystifying Crypto-Mining: Analysis and Optimizations of Memory-Hard PoW Algorithms , 2019, 2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS).

[5]  Kim-Kwang Raymond Choo,et al.  Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..

[6]  Aleksander Berentsen Aleksander Berentsen Recommends “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto , 2019, 21st Century Economics.

[7]  Kishor S. Trivedi,et al.  Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[8]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[9]  Nan Jiang,et al.  Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts , 2020, Comput. Secur..

[10]  Wei Zhou,et al.  Delegated Proof of Stake With Downgrade: A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism , 2019, IEEE Access.

[11]  Albert Y. Zomaya,et al.  Blockchain for smart communities: Applications, challenges and opportunities , 2019, J. Netw. Comput. Appl..

[12]  Eric A. Brewer,et al.  Towards robust distributed systems (abstract) , 2000, PODC '00.

[13]  Keke Gai,et al.  Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..

[14]  Anita Singhrova,et al.  Fuzzy based priority aware scheduling technique for dense industrial IoT networks , 2019, J. Netw. Comput. Appl..

[15]  Fahad Saleh,et al.  Blockchain Without Waste: Proof-of-Stake , 2020, The Review of Financial Studies.

[16]  Chen Wang,et al.  Recent advances in consensus protocols for blockchain: a survey , 2019, Wireless Networks.

[17]  Marko Vukolic,et al.  The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.

[18]  B. B. Zaidan,et al.  A review of smart home applications based on Internet of Things , 2017, J. Netw. Comput. Appl..

[19]  Eric A. Brewer,et al.  Harvest, yield, and scalable tolerant systems , 1999, Proceedings of the Seventh Workshop on Hot Topics in Operating Systems.

[20]  Muttukrishnan Rajarajan,et al.  Blockchain at the Edge: Performance of Resource-Constrained IoT Networks , 2021, IEEE Transactions on Parallel and Distributed Systems.

[21]  Markus Jakobsson,et al.  Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.

[22]  Prateek Saxena,et al.  Exploiting the laws of order in smart contracts , 2018, ISSTA.

[23]  Suhyun Kim,et al.  Blockchain-based Notarization for Social Media , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[24]  Hong-Ning Dai,et al.  An Overview on Smart Contracts: Challenges, Advances and Platforms , 2019, Future Gener. Comput. Syst..

[25]  Jolanda G. Tromp,et al.  Smart Bicycle: IoT-Based Transportation Service , 2020 .

[26]  Nancy A. Lynch,et al.  Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services , 2002, SIGA.

[27]  Brian W. Kernighan,et al.  The Go Programming Language , 2015 .

[28]  Paul Rad,et al.  Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities , 2019, J. Netw. Comput. Appl..

[29]  Marko Vukolic,et al.  A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform , 2018, DSN.

[30]  Vijay Varadharajan,et al.  Policy-based access control for constrained healthcare resources in the context of the Internet of Things , 2019, J. Netw. Comput. Appl..

[31]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.