Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication

The advancement of blockchain technology and the Internet of Things (IoT) has presented us with unlimited possibilities to integrate the physical and the virtual worlds. In this work, we demonstrate how to override any existing public blockchain, that has enough redundancy in its transactions, to covertly broadcast arbitrary information. Besides, we implement and demonstrate our technique on a real-world cryptocurrency and show how it can be utilized in two specific applications: recording IoT data, and circumventing censorship.

[1]  Bogdan Carbunar,et al.  Tithonus: A Bitcoin Based Censorship Resilient System , 2018, Proc. Priv. Enhancing Technol..

[2]  Ian Goldberg,et al.  SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.

[3]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[4]  John Langford,et al.  Provably Secure Steganography , 2009, IEEE Trans. Computers.

[5]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[6]  Milad Nasr,et al.  The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks , 2017, CCS.

[7]  Pedro Moreno-Sanchez,et al.  R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies , 2018, IACR Cryptol. ePrint Arch..

[8]  André Ricardo Abed Grégio,et al.  ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[9]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[10]  Srinivas Devadas,et al.  Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[11]  Eric Wustrow,et al.  TapDance: End-to-Middle Anticensorship without Flow Blocking , 2014, USENIX Security Symposium.

[12]  Evangelos Theodoridis,et al.  SmartSantander: IoT experimentation over a smart city testbed , 2014, Comput. Networks.

[13]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[14]  Klaus Wehrle,et al.  A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin , 2018, Financial Cryptography.

[15]  Vinod Yegneswaran,et al.  Bootstrapping Communications into an Anti-Censorship System , 2012, FOCI.

[16]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[17]  Fabrizio Lamberti,et al.  Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough? , 2018, Future Internet.

[18]  Li Jun,et al.  Smart Home System Based on IOT Technologies , 2013, 2013 International Conference on Computational and Information Sciences.

[19]  Yasushi Shinjo,et al.  VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls , 2014, NSDI.

[20]  Vinod Yegneswaran,et al.  StegoTorus: a camouflage proxy for the Tor anonymity system , 2012, CCS.

[21]  Gene Itkis,et al.  Upper and Lower Bounds on Black-Box Steganography , 2008, Journal of Cryptology.

[22]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[23]  Nikita Borisov,et al.  Cirripede: circumvention infrastructure using router redirection with plausible deniability , 2011, CCS '11.

[24]  Klaus Wehrle,et al.  POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store , 2016, CCS.