Blockchain Based Credibility Verification Method for IoT Entities

With the fast development of mobile Internet, Internet of Things (IoT) has been found in many important applications recently. However, it still faces many challenges in security and privacy. Blockchain (BC) technology, which underpins the cryptocurrency Bitcoin, has played an important role in the development of decentralized and data intensive applications running on millions of devices. In this paper, to establish the relationship between IoT and BC for device credibility verification, we propose a framework with layers, intersect, and self-organization Blockchain Structures (BCS). In this new framework, each BCS is organized by Blockchain technology. We describe the credibility verification method and show how it provide the verification. The efficiency and security analysis are also given in this paper, including its response time, storage efficiency, and verification. The conducted experiments have been shown to demonstrate the validity of the proposed method in satisfying the credible requirement achieved by Blockchain technology and certain advantages in storage space and response time.

[1]  Zhuzhong Qian,et al.  AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..

[2]  Jin Li,et al.  Differentially private Naive Bayes learning over multiple data sources , 2018, Inf. Sci..

[3]  Fagui Liu,et al.  Ontologies for the Transactions on IoT , 2015, Int. J. Distributed Sens. Networks.

[4]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[5]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.

[6]  George K. Karagiannidis,et al.  Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.

[7]  Xiaojun Zhang,et al.  A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage , 2018, Secur. Commun. Networks.

[8]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[9]  Mianxiong Dong,et al.  Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes , 2017, Future Gener. Comput. Syst..

[10]  Jian Shen,et al.  A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things , 2018, Secur. Commun. Networks.

[11]  Yang Liu,et al.  UAI-IOT Framework: A Method of Uniform Interfaces to Acquire Information from Heterogeneous Enterprise Information Systems , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[12]  Jin Li,et al.  Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..

[13]  Ting Wu,et al.  Generating stable biometric keys for flexible cloud computing authentication using finger vein , 2016, Inf. Sci..

[14]  Wenbin Chen,et al.  Lattice-based linearly homomorphic signatures in the standard model , 2016, Theor. Comput. Sci..

[15]  Jian Shen,et al.  Secure data uploading scheme for a smart home system , 2018, Inf. Sci..

[16]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[17]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[18]  Jian Shen,et al.  A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.

[19]  Dongqing Xie,et al.  Social influence modeling using information theory in mobile social networks , 2017, Inf. Sci..

[20]  Siobhán Clarke,et al.  Smart management of next generation bike sharing systems using Internet of Things , 2015, 2015 IEEE First International Smart Cities Conference (ISC2).

[21]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[22]  Jing Chen,et al.  Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[23]  Jing Chen,et al.  Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks , 2017, IEEE Transactions on Mobile Computing.

[24]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[25]  Jong Hyuk Park,et al.  Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions , 2017, Symmetry.

[26]  Jin Li,et al.  Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..

[27]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[28]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[29]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[30]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[31]  Mianxiong Dong,et al.  Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach , 2018, IEEE Transactions on Industrial Informatics.

[32]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[33]  Arun Kumar Sangaiah,et al.  Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT , 2018, IEEE Access.

[34]  Guoliang Xue,et al.  DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2016, IEEE Transactions on Computers.

[35]  Qing Wang,et al.  Distance metric optimization driven convolutional neural network for age invariant face recognition , 2018, Pattern Recognit..

[36]  Fagui Liu,et al.  An OWL-S based specification model of dynamic entity services for Internet of Things , 2016, J. Ambient Intell. Humaniz. Comput..

[37]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[38]  Jie Wu,et al.  Effective Query Grouping Strategy in Clouds , 2017, Journal of Computer Science and Technology.

[39]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[40]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[41]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[42]  Jin Li,et al.  Privacy-preserving machine learning with multiple data providers , 2018, Future Gener. Comput. Syst..