Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.6.16

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks  

Aldriwish, Khalid (Department of Computer Science, College of Science and Humanities of Al-Ghat, Majmaah University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.6, 2021 , pp. 119-126 More about this Journal
Abstract
The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.
Keywords
Internet of Things; Blockchain; Information security; Encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Q. Jiang, X. Zhang, and J. You, "SnO2: a wonderful electron transport layer for perovskite solar cells," Small, vol. 14, no. 31, p. 1801154, 2018.   DOI
2 D. Berdik, S. Otoum, N. Schmidt, D. Porter, and Y. Jararweh, "A survey on blockchain for information systems management and security," Inf. Process. \& Manag., vol. 58, no. 1, p. 102397, 2021.   DOI
3 Y. Zhang and J. Wen, "An IoT electric business model based on the protocol of bitcoin," in 2015 18th international conference on intelligence in next generation networks, 2015, pp. 184-191.
4 M. Ben Ayed, A. Massaoudi, and S. A. Alshaya, "Smart Recognition COVID-19 System to Predict Suspicious Persons Based on Face Features," J. Electr. Eng. Technol., pp. 1-6, 2021.
5 A. R. Harish, X. L. Liu, R. Y. Zhong, and G. Q. Huang, "Log-flock: A blockchain-enabled platform for digital asset valuation and risk assessment in E-commerce logistics financing," Comput. \& Ind. Eng., vol. 151, p. 107001, 2021.   DOI
6 I. Yaqoob et al., "Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges," IEEE Wirel. Commun., vol. 24, no. 3, pp. 10-16, 2017.   DOI
7 P. P. Ray, "A survey on Internet of Things architectures," J. King Saud Univ. Inf. Sci., vol. 30, no. 3, pp. 291-319, 2018.
8 S. Biswas, F. Li, Z. Latif, K. Sharif, A. K. Bairagi, and S. P. Mohanty, "GlobeChain: An Interoperable Blockchain for Global Sharing of Healthcare Data-A COVID-19 Perspective," IEEE Consum. Electron. Mag., 2021.
9 C. Xenofontos, I. Zografopoulos, C. Konstantinou, A. Jolfaei, M. K. Khan, and K.-K. R. Choo, "Consumer, commercial and industrial iot (in) security: attack taxonomy and case studies," IEEE Internet Things J., 2021.
10 D. Arivudainambi, V. K. KA, and S. S. Chakkaravarthy, "LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks," Neural Comput. Appl., vol. 31, no. 5, pp. 1491-1501, 2019.   DOI
11 W. Ren, X. Wan, and P. Gan, "A double-blockchain solution for agricultural sampled data security in Internet of Things network," Futur. Gener. Comput. Syst., vol. 117, pp. 453-461, 2021.   DOI
12 J. Kolb, M. AbdelBaky, R. H. Katz, and D. E. Culler, "Core concepts, challenges, and future directions in blockchain: a centralized tutorial," ACM Comput. Surv., vol. 53, no. 1, pp. 1-39, 2020.
13 K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," Ieee Access, vol. 4, pp. 2292-2303, 2016.   DOI
14 A. Banotra, S. Gupta, S. K. Gupta, and M. Rashid, "Asset Security in Data of Internet of Things Using Blockchain Technology," in Multimedia Security, Springer, 2021, pp. 269-281.
15 C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer (Long. Beach. Calif)., vol. 50, no. 7, pp. 80-84, 2017.   DOI
16 S. Koprda, Z. Balogh, M. Magdin, J. Reichel, and G. Molnar, "The Possibility of Creating a Low-Cost Laser Engraver CNC Machine Prototype with Platform Arduino," Acta Polytech. Hungarica, vol. 17, no. 9, 2020.
17 A. Islam and S. Y. Shin, "A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things," Comput. \& Electr. Eng., vol. 84, p. 106627, 2020.   DOI
18 Y. El Housni, "Introduction to the Mathematical Foundations of Elliptic Curve Cryptography," 2018.
19 A. Bora, A. Jalal, E. Price, and A. G. Dimakis, "Compressed sensing using generative models," in International Conference on Machine Learning, 2017, pp. 537-546.
20 Z. Ellouze, N. Louati, M. Ben Ayed, S. A. Alshaya, and R. Bouaziz, "Design, Implementation, and Evaluation of a Real-Time Object-Oriented Database System," Int. J. Comput. Sci. Netw. Secur., vol. 19, no. 10, pp. 125-137, 2019.   DOI
21 M. Busch, J. Westphal, and T. Mueller, "Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment," in 14th $\{$USENIX$\}$ Workshop on Offensive Technologies ($\{$WOOT$\}$ 20), 2020.
22 I. Scott, M. de Castro Neto, and F. L. Pinheiro, "Bringing trust and transparency to the opaque world of waste management with blockchain: a Polkadot parathread application," Available SSRN 3825072, 2021.
23 M. Ben Ayed, A. Massaoudi, S. A. Alshaya, and M. Abid, "System-level co-simulation for embedded systems," AIP Adv., vol. 10, no. 3, p. 35113, 2020.   DOI
24 S. K. Singh, S. Rathore, and J. H. Park, "Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence," Futur. Gener. Comput. Syst., vol. 110, pp. 721-743, 2020.   DOI
25 C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and I. Akyildiz, "A new wireless communication paradigm through software-controlled metasurfaces," IEEE Commun. Mag., vol. 56, no. 9, pp. 162-169, 2018.   DOI
26 B. Peng, "Research On Detection Of Malicious Software," in 2021 2nd International Conference on E-Commerce and Internet Technology (ECIT), 2021, pp. 400-403.
27 S. Bouraga, "A taxonomy of blockchain consensus protocols: A survey and classification framework," Expert Syst. Appl., vol. 168, p. 114384, 2021.   DOI
28 G. Zyskind, O. Nathan, and A. Pentland, "Enigma: Decentralized computation platform with guaranteed privacy," arXiv Prepr. arXiv1506.03471, 2015.
29 N. Grech, M. Kong, A. Jurisevic, L. Brent, B. Scholz, and Y. Smaragdakis, "Madmax: Surviving out-of-gas conditions in ethereum smart contracts," Proc. ACM Program. Lang., vol. 2, no. OOPSLA, pp. 1-27, 2018.
30 A. Bahga and V. K. Madisetti, "Blockchain platform for industrial internet of things," J. Softw. Eng. Appl., vol. 9, no. 10, pp. 533-546, 2016.   DOI