A blockchain future for internet of things security: a position paper

Published on Oct 1, 2017in Digital Communications and Networks6.797
· DOI :10.1016/J.DCAN.2017.10.006
Mandrita Banerjee3
Estimated H-index: 3
(UTSA: University of Texas at San Antonio),
Junghee Lee10
Estimated H-index: 10
(UTSA: University of Texas at San Antonio),
Kim-Kwang Raymond Choo92
Estimated H-index: 92
(UTSA: University of Texas at San Antonio)
Sources
Abstract
Abstract Internet-of-Things (IoT) are increasingly found in civilian and military contexts, ranging from Smart Cities to Smart Grids to Internet-of-Medical-Things to Internet-of-Vehicles to Internet-of-Military-Things to Internet-of-Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a number of observations, include the lack of publicly available IoT datasets that can be used by the research and practitioner communities. Given the potential sensitive nature of IoT datasets, there is a need to develop a standard for the sharing of IoT datasets among the research and practitioner communities and other relevant stakeholders. We then posit the potential for blockchain technology in facilitating secure sharing of IoT datasets (e.g. using blockchain to ensure the integrity of shared datasets) and securing IoT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions.
đź“– Papers frequently viewed together
References94
Newest
Faked deauthentication and disassociation frames introduce serious denial of service (DoS) attacks on wireless local area networks (WLANs), and these attacks include deauthentication flooding (DeauthF) and disassociation flooding (DisassF). IEEE 802.11w standard was introduced to extend 802.11i functionalities for preventing DeauthF and DisassF, and so far there has been no detailed theoretical and experimental study on the performance of 802.11w for resolving these attacks. We implemented a pro...
Source
#1Tomas Zitta (CTU: Czech Technical University in Prague)H-Index: 3
#2Marek Neruda (CTU: Czech Technical University in Prague)H-Index: 8
Last. Lukas Vojtech (CTU: Czech Technical University in Prague)H-Index: 8
view all 3 authors...
This paper presents developed detection rules for LLRP (Low Level Reader Protocol) interface, implementation of IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) solution for UHF (Ultra High Frequency) RFID (Radio Frequency Identification) reader using Raspberry Pi 3. Developed security solution is used for securing current RFID readers supporting LLRP. The paper also deals with a comparison of IPS/IDS solutions and subsequently selection of the appropriate one for the imple...
Source
#1Won Hyung Park (Communist University of the Toilers of the East)H-Index: 5
#2Seongjin Ahn (SKKU: Sungkyunkwan University)H-Index: 7
Recently, crimes are cause in the internet by hacking to target one's and the companies financial. Due to the massive crimes that are caused by digital convergence and ubiquitous IT system, it is clear that the amount of network packet which need to be processed are rising. The digital convergence and ubiquitous IT system caused the IDS (Intrusion Detection System) to process packets more than the past. Snort (version 2.x) is a leading open source IDS which has a long history but since it was bu...
Source
#3Wei Wang (NTU: Nanyang Technological University)H-Index: 35
False data injection (FDI) attacks are crucial security threats to smart grid cyber-physical system (CPS), and could result in cataclysmic consequences to the entire power system. However, due to the high dependence on open information networking, countering FDI attacks is challenging in smart grid CPS. Most existing solutions are based on state estimation (SE) at the highly centralized control center; thus, computationally expensive. In addition, these solutions generally do not provide a high ...
Source
Apr 2, 2017 in CCS (Computer and Communications Security)
#1Arash Shaghaghi (UNSW: University of New South Wales)H-Index: 5
#2Mohamed Ali Kaafar (CSIRO: Commonwealth Scientific and Industrial Research Organisation)H-Index: 33
Last. Sanjay Jha (UNSW: University of New South Wales)H-Index: 40
view all 3 authors...
Networks are vulnerable to disruptions caused by malicious forwarding devices. The situation is likely to worsen in Software Defined Networks (SDNs) with the incompatibility of existing solutions, use of programmable soft switches and the potential of bringing down an entire network through compromised forwarding devices. In this paper, we present WedgeTail, an Intrusion Prevention System (IPS) designed to secure the SDN data plane. WedgeTail regards forwarding devices as points within a geometr...
Source
#1Mehrnoosh Monshizadeh (Bell Labs)H-Index: 5
#2Vikramajeet Khatri (Bell Labs)H-Index: 4
Last. Raimo Kantola (Aalto University)H-Index: 18
view all 3 authors...
In a cloud computing environment, future networks will most probably utilize network functions virtualization (NFV) which is a network architecture concept that proposes virtualizing network node functions into “building blocks” or entities that may be operationally connected or linked together to provide services. However, applying these mechanisms brings security challenges. Due to the programmability of software defined networking (SDN), if attackers gain access to an SDN controller, then the...
Source
#1Neha Agrawal (IIIT: Indian Institutes of Information Technology)H-Index: 7
#2Shashikala Tapaswi (IIIT: Indian Institutes of Information Technology)H-Index: 16
Wireless network security is becoming a great challenge as its popularity is in the high spirit. On account of open medium, insignificant software implementation, potential for hardware deficits, and improper configuration; Wi-Fi network is vulnerable to Rogue Access Point (RAP). Rogue Access Point is an unauthorized access point which can be installed by end-users without the knowledge of security administrator. When this rogue device is connected to the Internet, it can be used by an assailant...
Source
#1Yousef FarhaouiH-Index: 1
Jan 1, 2017 in PRDC (Pacific Rim International Symposium on Dependable Computing)
#1Mohammad A. Noureddine (UIUC: University of Illinois at Urbana–Champaign)H-Index: 4
#2Andrew Marturano (UIUC: University of Illinois at Urbana–Champaign)H-Index: 2
Last. William H. Sanders (UIUC: University of Illinois at Urbana–Champaign)H-Index: 51
view all 5 authors...
Given the growing sophistication of cyber attacks, designing a perfectly secure system is not generally possible. Quantitative security metrics are thus needed to measure and compare the relative security of proposed security designs and policies. Since the investigation of security breaches has shown a strong impact of human errors, ignoring the human user in computing these metrics can lead to misleading results. Despite this, and although security researchers have long observed the impact of ...
Source
#1Ana YacchirenaH-Index: 1
#2Darwin AlulemaH-Index: 6
Last. Evelio GranizoH-Index: 2
view all 6 authors...
This article describes the preparation of a Wi-Fi wireless network in production system, with intrusion detection systems Snort and Kismet; for subsequent evaluation under attack. Through Penetration Testing with Backtrack 5 R3 using Fern WiFi Cracker and Ettercap to monitor response reaction of IDSs. Once the attacks are completed, the results are analyzed, in terms of the captured traffic by the system using Wireshark, and the attack description, in order to determine the response characterist...
Source
Cited By222
Newest
#1Xiang Fu (National University of Defense Technology)H-Index: 4
#2Huaimin Wang (National University of Defense Technology)H-Index: 14
Last. Xunhui Zhang (National University of Defense Technology)H-Index: 1
view all 5 authors...
Source
#1Mehmet Baygin (Ardahan University)H-Index: 9
#2Orhan Yaman (Fırat University)H-Index: 9
Last. Mehmet Karakose (Fırat University)H-Index: 20
view all 4 authors...
Abstract null null Today, the continuous growth of electronic commerce volume increases the importance of point-to-point shipment transportation. For this reason, it is extremely important that shipment management systems provide effective, efficient and fast service. A study of the literature shows that the improvements made in the field of transportation have been generally aimed at global logistics networks. In this study, unlike the existing literature, a blockchain-based solution is develop...
Source
#2Passent El-KafrawyH-Index: 7
Last. Ahmed A. Abd El-LatifH-Index: 36
view all 3 authors...
Source
view all 3 authors...
Source
#1Nitul DuttaH-Index: 6
#2Nilesh Kumar JadavH-Index: 1
view all 5 authors...
Source
#1Uddalak ChatterjeeH-Index: 1
#2Sangram RayH-Index: 9
Source
#1Mohammad Kamrul Hasan (UKM: National University of Malaysia)H-Index: 11
#2Taher M. Ghazel (Skyline University College)
view all 8 authors...
Source
This exploration aims to attain more detailed technical terms and form structured knowledge representation. An unsupervised knowledge representation learning method is constructed here, and a term model is constructed by the neural network of deep learning to drill down the English terms in the Internet of Things (IoT). After analyzing the IoT English language characteristics, an expert interaction method is proposed based on the Delphi method. Besides, the N-Gram model is utilized for unsupervi...
Source
#1Abderahman Rejeb (Széchenyi István University)H-Index: 10
#2Karim RejebH-Index: 5
Last. John G. Keogh (University of Reading)H-Index: 8
view all 4 authors...
Blockchain can function as a foundational technology with numerous applications in smart cities. The objective of this paper is twofold. First, it provides a detailed overview of the extant literature on blockchain applications in smart cities; second, it reveals the trends and suggests future research directions for scholars who wish to contribute to this rapidly growing field. We conducted a bibliometric review using a keyword co-occurrence network and article co-citation analysis. The analysi...
Source
#3Wei Liang (Hunan University of Science and Technology)H-Index: 19
ABSTRACT null null The Internet of Vehicles (IoV) is regarded as the application of the Internet of Things (IoT) in transportation. Each vehicle will acts as a separate node on the Internet of Vehicles, which possesses specific ability to collect data and then send the collected data to the network. In this paper, we propose a scheme with the features of lightweight anonymous mutual authentication and key agreement using blockchain technology to obtain the session key. The security of this schem...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.