A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain

Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client’s house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.

[1]  Neil W. Bergmann,et al.  IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..

[2]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[3]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[4]  Huaping Liu,et al.  Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme , 2019, IEEE Access.

[5]  Paul E. Baclace Competitive agents for information filtering , 1992, CACM.

[6]  Zhen Wang,et al.  Blockchain for digital rights management , 2018, Future Gener. Comput. Syst..

[7]  A. Khatoon A Blockchain-Based Smart Contract System for Healthcare Management , 2020, Electronics.

[8]  Richard Evans,et al.  Blockchain-based electronic healthcare record system for healthcare 4.0 applications , 2020, J. Inf. Secur. Appl..

[9]  Debiao He,et al.  DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain , 2020, IEEE Transactions on Information Forensics and Security.

[10]  Ronald L. Rivest,et al.  Responses to NIST's proposal , 1992, CACM.

[11]  Neo C.K. Yiu,et al.  An Empirical Analysis of Implementing Enterprise Blockchain Protocols in Supply Chain Anti-Counterfeiting and Traceability , 2021, ArXiv.

[12]  Yong Yu,et al.  Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems , 2018, IEEE Access.

[13]  Eoghan Casey,et al.  IoT forensic challenges and opportunities for digital traces , 2019, Digit. Investig..

[14]  Pankaj Rohatgi,et al.  Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.

[15]  Shailesh Kumar,et al.  5G: a new era of wireless communication , 2020 .

[16]  Issa Traore,et al.  Secure remote anonymous user authentication scheme for smart home environment , 2020, Internet Things.

[17]  Hong Jiang,et al.  Dynamic and Public Auditing with Fair Arbitration for Cloud Data , 2018, IEEE Transactions on Cloud Computing.

[18]  Thar Baker,et al.  Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems , 2020, Inf. Process. Manag..

[19]  Mouzhi Ge,et al.  Blockchain-Based Access Control for IoT in Smart Home Systems , 2020, DEXA.

[20]  Sean Smith,et al.  Central Alarm Stations and Dispatch Operations , 2010 .

[21]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[22]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[23]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[24]  Rajeev Kumar,et al.  Evaluating the Impact of Blockchain Models for Secure and Trustworthy Electronic Healthcare Records , 2020, IEEE Access.

[25]  Aruna Seneviratne,et al.  A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain , 2018, IEEE Access.

[26]  Mahesh K. Nalla,et al.  Have the standards for private security guards become more stringent in the post 9/11 era? An assessment of security guard regulations in the US from 1982 to 2010 , 2017 .

[27]  Dezhi Han,et al.  Fabric-iot: A Blockchain-Based Access Control System in IoT , 2020, IEEE Access.

[28]  Moayad Aloqaily,et al.  An incentive-aware blockchain-based solution for internet of fake media things , 2020, Inf. Process. Manag..

[29]  Md. Zakirul Alam Bhuiyan,et al.  CRAB: Blockchain Based Criminal Record Management System , 2018, SpaCCS.

[30]  Feroz Ahmad,et al.  Bitcoin: Digital Decentralized Cryptocurrency , 2018 .

[31]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.