Browse > Article
http://dx.doi.org/10.17662/ksdim.2021.17.4.043

A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks  

Park, jongsoon (서일대학교 소프트웨어공학과)
Park, chankil (숭실사이버대 정보보안학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.17, no.4, 2021 , pp. 43-52 More about this Journal
Abstract
IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.
Keywords
Internet of Things; Blockchain; Information security; Encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 옥인준, "완전 자동화를 위한 주차관제시스템에 관한 연구", 디지털산업정보학회논문지 15권 3호, 2019.09, p79~88.   DOI
2 K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," Ieee Access, vol. 4, 2016, pp.2292-2303.   DOI
3 Y. El Housni, "Introduction to the Mathematical Foundations of Elliptic Curve Cryptography," 2018.
4 N. Grech, M. Kong, A. Jurisevic, L. Brent, B. Scholz, and Y. Smaragdakis, "Madmax: Surviving out-of-gas conditions in ethereum smart contracts," Proc. ACM Program. Lang., vol. 2, no. OOPSLA, 2018, pp.1-27.
5 A. Bora, A. Jalal, E. Price, and A. G. Dimakis, "Compressed sensing using generative models," in International Conference on Machine Learning, 2017, pp.537-546.
6 M. Ben Ayed, A. Massaoudi, S. A. Alshaya, and M. Abid, "System-level co-simulation for embedded systems," AIP Adv., vol. 10, no. 3, 2020, pp.113-125.
7 M. Busch, J. Westphal, and T. Mueller, "Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment," in 14th Workshop on Offensive Technologies, 2020.
8 M. Ben Ayed, A. Massaoudi, and S. A. Alshaya, "Smart Recognition COVID-19 System to Predict Suspicious Persons Based on Face Features," J. Electr. Eng. Technol., 2021, pp.1-6.
9 Z. Ellouze, N. Louati, M. Ben Ayed, S. A. Alshaya, and R. Bouaziz, "Design, Implementation, and Evaluation of a Real- Time Object-Oriented Database System," Int. J. Comput. Sci. Netw. Secur., vol. 19, no. 10, 2019, pp.125-137.   DOI
10 C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer (Long. Beach. Calif)., vol. 50, no. 7, 2017, pp.80-84.   DOI
11 S. Bouraga, "A taxonomy of blockchain consensus protocols: A survey and classification framework," Expert Syst. Appl., vol. 168, 2021, pp.384-395.   DOI
12 S. Koprda, Z. Balogh, M. Magdin, J. Reichel, and G. Molnar, "The Possibility of Creating a Low-Cost Laser Engraver CNC Machine Prototype with Platform Arduino," Acta Polytech. Hungarica, vol. 17, no. 9, 2020.
13 C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and I. Akyildiz, "A new wireless communication paradigm through software-controlled metasurfaces," IEEE Commun. Mag., vol. 56, no. 9, 2018, pp.162-169.   DOI
14 B. Peng, "Research On Detection Of Malicious Software," in 2021 2nd International Conference on E-Commerce and Internet Technology (ECIT), 2021, pp.400-403.
15 G. Zyskind, O. Nathan, and A. Pentland, "Enigma: Decentralized computation platform with guaranteed privacy," arXiv Prepr. ar Xiv1506.03471, 2015.
16 A. Bahga and V. K. Madisetti, "Blockchain platform for industrial internet of things," J. Softw. Eng. Appl., vol. 9, no. 10, 2016, pp.533-546.   DOI
17 Q. Jiang, X. Zhang, and J. You, "SnO2: a wonderful electron transport layer for perovskite solar cells," Small, vol. 14, no. 31, pp.154-165., 2018, pp.154-165.
18 D. Berdik, S. Otoum, N. Schmidt, D. Porter, and Y. Jararweh, "A survey on blockchain for information systems management and security," Inf. Process. Manag., vol. 58, no. 1, 2021, pp.397-407.
19 C. Xenofontos, I. Zografopoulos, C. Konstantinou, A. Jolfaei, M. K. Khan, and K.-K. R. Choo, "Consumer, commercial and industrial iot (in) security: attack taxonomy and case studies," IEEE Internet Things J., 2021.
20 D. Arivudainambi, V. K. KA, and S. S. Chakkaravarthy, "LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks," Neural Comput. Appl., vol. 31, no. 5, 2019, pp.1491-1501.   DOI
21 Y. Zhang and J. Wen, "An IoT electric business model based on the protocol of bitcoin," in 2015 18th international conference on intelligence in next generation networks, 2015, pp.184-191.
22 J. Kolb, M. AbdelBaky, R. H. Katz, and D. E. Culler, "Core concepts, challenges, and future directions in blockchain: a centralized tutorial," ACM Comput. Surv., vol. 53, no. 1, 2020, pp.1-39.
23 I. Scott, M. de Castro Neto, and F. L. Pinheiro, "Bringing trust and transparency to the opaque world of waste management with blockchain: a Polkadot parathread application," Available SSRN 3825072, 2021.