LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy

In recent years, Blockchain has attracted tremendous attention due to its salient features including auditability, immutability, security, and anonymity. Resulting from these salient features, blockchain has been applied in multiple non-monetary applications including the Internet of Things (IoT). However, blockchain is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited for most IoT applications. In this paper, we propose a Lightweight Scalable blockchain (LSB) that is optimized for IoT requirements while also providing end-to-end security. Our blockchain instantiation achieves decentralization by forming an overlay network where high resource devices jointly manage the blockchain. The overlay is organized as distinct clusters to reduce overheads and the cluster heads are responsible for managing the public blockchain. We propose a Distributed Time-based Consensus algorithm (DTC) which reduces the mining processing overhead and delay. Distributed trust approach is employed by the cluster heads to progressively reduce the processing overhead for verifying new blocks. LSB incorporates a Distributed Throughput Management (DTM) algorithm which ensures that the blockchain throughput does not significantly deviate from the cumulative transaction load in the network. We explore our approach in a smart home setting as a representative example for broader IoT applications. Qualitative arguments demonstrate that our approach is resilient to several security attacks. Extensive simulations show that packet overhead and delay are decreased and blockchain scalability is increased compared to relevant baselines.

[1]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[2]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[3]  Azeddine Bilami,et al.  Compressed and distributed host identity protocol for end-to-end security in the IoT , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).

[4]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[5]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[6]  Eduardo Castelló Ferrer The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.

[7]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[8]  S. Popov The Tangle , 2015 .

[9]  Salil S. Kanhere,et al.  A trust architecture for blockchain in IoT , 2019, MobiQuitous.

[10]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[11]  David Mazières The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus , 2015 .

[12]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[13]  Michele Amoretti,et al.  Blockchain-Based Proof of Location , 2016, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[14]  Meejeong Lee,et al.  mSCTP for soft handover in transport layer , 2004, IEEE Communications Letters.

[16]  Konstantin Mikhaylov,et al.  Analysis of Capacity and Scalability of the LoRa Low Power Wide Area Network Technology , 2016 .

[17]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[18]  Salil S. Kanhere,et al.  MOF-BC: A Memory Optimized and Flexible BlockChain for Large Scale Networks , 2018, Future Gener. Comput. Syst..

[19]  Christian Cachin,et al.  Architecture of the Hyperledger Blockchain Fabric , 2016 .

[20]  Ling Xu,et al.  Resisting Sybil Attack By Social Network and Network Clustering , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[21]  Dariusz R. Kowalski,et al.  Time and Communication Efficient Consensus for Crash Failures , 2006, DISC.

[22]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[23]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[24]  Salil S. Kanhere,et al.  On the Activity Privacy of Blockchain for IoT , 2018, 2019 IEEE 44th Conference on Local Computer Networks (LCN).

[25]  Nancy Alonistioti,et al.  SYSTAS: Density-based algorithm for clusters discovery in wireless networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[26]  Mohsen Guizani,et al.  A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..

[27]  Otto Petrovic,et al.  3.3 The Internet of Things as Disruptive Innovation for the Advertising Ecosystem , 2017 .

[28]  Vijay Sivaraman,et al.  Low-cost flow-based security solutions for smart-home IoT devices , 2016, International Workshop on Ant Colony Optimization and Swarm Intelligence.

[29]  Roy H. Campbell,et al.  World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).

[30]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[31]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[32]  Gang Qu,et al.  BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[33]  Rachid Guerraoui,et al.  On the complexity of asynchronous gossip , 2008, PODC '08.

[34]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[35]  Arati Baliga,et al.  Understanding Blockchain Consensus Models , 2017 .

[36]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.

[37]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[38]  Michael Abramowicz,et al.  Cryptocurrency-Based Law , 2015 .

[39]  Subhas Chandra Mukhopadhyay,et al.  Internet of Things: Challenges and Opportunities , 2014 .

[40]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[41]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[42]  Srinivas Devadas,et al.  Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[43]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[44]  Andrey Bogdanov,et al.  spongent: A Lightweight Hash Function , 2011, CHES.

[45]  Lin Chen,et al.  On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.

[46]  Marko Vukolic,et al.  The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.

[47]  Erez Shmueli,et al.  openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.

[48]  Roberto Baldoni,et al.  PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.

[49]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .