DOI QR코드

DOI QR Code

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid (Department of Computer Science, College of Science and Humanities of Al-Ghat, Majmaah University)
  • Received : 2021.06.05
  • Published : 2021.06.30

Abstract

The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Keywords

Acknowledgement

The author would like to express thankful for Deanship of Scientific Research at Majmaah University for funding this project.

References

  1. I. Yaqoob et al., "Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges," IEEE Wirel. Commun., vol. 24, no. 3, pp. 10-16, 2017. https://doi.org/10.1109/MWC.2017.1600421
  2. P. P. Ray, "A survey on Internet of Things architectures," J. King Saud Univ. Inf. Sci., vol. 30, no. 3, pp. 291-319, 2018.
  3. S. K. Singh, S. Rathore, and J. H. Park, "Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence," Futur. Gener. Comput. Syst., vol. 110, pp. 721-743, 2020. https://doi.org/10.1016/j.future.2019.09.002
  4. M. Ben Ayed, A. Massaoudi, and S. A. Alshaya, "Smart Recognition COVID-19 System to Predict Suspicious Persons Based on Face Features," J. Electr. Eng. Technol., pp. 1-6, 2021.
  5. C. Xenofontos, I. Zografopoulos, C. Konstantinou, A. Jolfaei, M. K. Khan, and K.-K. R. Choo, "Consumer, commercial and industrial iot (in) security: attack taxonomy and case studies," IEEE Internet Things J., 2021.
  6. Z. Ellouze, N. Louati, M. Ben Ayed, S. A. Alshaya, and R. Bouaziz, "Design, Implementation, and Evaluation of a Real-Time Object-Oriented Database System," Int. J. Comput. Sci. Netw. Secur., vol. 19, no. 10, pp. 125-137, 2019. https://doi.org/10.22937/IJCSNS.2019.19.10.20
  7. C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer (Long. Beach. Calif)., vol. 50, no. 7, pp. 80-84, 2017. https://doi.org/10.1109/MC.2017.201
  8. D. Arivudainambi, V. K. KA, and S. S. Chakkaravarthy, "LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks," Neural Comput. Appl., vol. 31, no. 5, pp. 1491-1501, 2019. https://doi.org/10.1007/s00521-018-3383-7
  9. S. Koprda, Z. Balogh, M. Magdin, J. Reichel, and G. Molnar, "The Possibility of Creating a Low-Cost Laser Engraver CNC Machine Prototype with Platform Arduino," Acta Polytech. Hungarica, vol. 17, no. 9, 2020.
  10. C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and I. Akyildiz, "A new wireless communication paradigm through software-controlled metasurfaces," IEEE Commun. Mag., vol. 56, no. 9, pp. 162-169, 2018. https://doi.org/10.1109/mcom.2018.1700659
  11. Q. Jiang, X. Zhang, and J. You, "SnO2: a wonderful electron transport layer for perovskite solar cells," Small, vol. 14, no. 31, p. 1801154, 2018. https://doi.org/10.1002/smll.201801154
  12. B. Peng, "Research On Detection Of Malicious Software," in 2021 2nd International Conference on E-Commerce and Internet Technology (ECIT), 2021, pp. 400-403.
  13. M. Busch, J. Westphal, and T. Mueller, "Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment," in 14th $\{$USENIX$\}$ Workshop on Offensive Technologies ($\{$WOOT$\}$ 20), 2020.
  14. D. Berdik, S. Otoum, N. Schmidt, D. Porter, and Y. Jararweh, "A survey on blockchain for information systems management and security," Inf. Process. \& Manag., vol. 58, no. 1, p. 102397, 2021. https://doi.org/10.1016/j.ipm.2020.102397
  15. S. Bouraga, "A taxonomy of blockchain consensus protocols: A survey and classification framework," Expert Syst. Appl., vol. 168, p. 114384, 2021. https://doi.org/10.1016/j.eswa.2020.114384
  16. G. Zyskind, O. Nathan, and A. Pentland, "Enigma: Decentralized computation platform with guaranteed privacy," arXiv Prepr. arXiv1506.03471, 2015.
  17. Y. Zhang and J. Wen, "An IoT electric business model based on the protocol of bitcoin," in 2015 18th international conference on intelligence in next generation networks, 2015, pp. 184-191.
  18. A. Bahga and V. K. Madisetti, "Blockchain platform for industrial internet of things," J. Softw. Eng. Appl., vol. 9, no. 10, pp. 533-546, 2016. https://doi.org/10.4236/jsea.2016.910036
  19. K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," Ieee Access, vol. 4, pp. 2292-2303, 2016. https://doi.org/10.1109/ACCESS.2016.2566339
  20. A. Islam and S. Y. Shin, "A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things," Comput. \& Electr. Eng., vol. 84, p. 106627, 2020. https://doi.org/10.1016/j.compeleceng.2020.106627
  21. S. Biswas, F. Li, Z. Latif, K. Sharif, A. K. Bairagi, and S. P. Mohanty, "GlobeChain: An Interoperable Blockchain for Global Sharing of Healthcare Data-A COVID-19 Perspective," IEEE Consum. Electron. Mag., 2021.
  22. W. Ren, X. Wan, and P. Gan, "A double-blockchain solution for agricultural sampled data security in Internet of Things network," Futur. Gener. Comput. Syst., vol. 117, pp. 453-461, 2021. https://doi.org/10.1016/j.future.2020.12.007
  23. A. Banotra, S. Gupta, S. K. Gupta, and M. Rashid, "Asset Security in Data of Internet of Things Using Blockchain Technology," in Multimedia Security, Springer, 2021, pp. 269-281.
  24. A. R. Harish, X. L. Liu, R. Y. Zhong, and G. Q. Huang, "Log-flock: A blockchain-enabled platform for digital asset valuation and risk assessment in E-commerce logistics financing," Comput. \& Ind. Eng., vol. 151, p. 107001, 2021. https://doi.org/10.1016/j.cie.2020.107001
  25. J. Kolb, M. AbdelBaky, R. H. Katz, and D. E. Culler, "Core concepts, challenges, and future directions in blockchain: a centralized tutorial," ACM Comput. Surv., vol. 53, no. 1, pp. 1-39, 2020.
  26. Y. El Housni, "Introduction to the Mathematical Foundations of Elliptic Curve Cryptography," 2018.
  27. N. Grech, M. Kong, A. Jurisevic, L. Brent, B. Scholz, and Y. Smaragdakis, "Madmax: Surviving out-of-gas conditions in ethereum smart contracts," Proc. ACM Program. Lang., vol. 2, no. OOPSLA, pp. 1-27, 2018.
  28. I. Scott, M. de Castro Neto, and F. L. Pinheiro, "Bringing trust and transparency to the opaque world of waste management with blockchain: a Polkadot parathread application," Available SSRN 3825072, 2021.
  29. A. Bora, A. Jalal, E. Price, and A. G. Dimakis, "Compressed sensing using generative models," in International Conference on Machine Learning, 2017, pp. 537-546.
  30. M. Ben Ayed, A. Massaoudi, S. A. Alshaya, and M. Abid, "System-level co-simulation for embedded systems," AIP Adv., vol. 10, no. 3, p. 35113, 2020. https://doi.org/10.1063/1.5140466