| Literature DB >> 32423025 |
Alma E Guerrero-Sanchez1, Edgar A Rivas-Araiza1, Jose Luis Gonzalez-Cordoba1, Manuel Toledano-Ayala1, Andras Takacs1.
Abstract
The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requirements in IoT Systems. If these issues are not guaranteed, the IoT system could be susceptible to malicious users and malicious use. In centralized IoT systems, attacks and risks are greater, especially when data is transmitted between devices and shared with other organizations. To avoid these types of situations, this work presents a decentralized system that guarantees the autonomy and security of an IoT system. The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools. The accuracy of the proposed methodology was measured on a temperature and humidity sensing IoT-based Wireless Sensor Network (WSN). The obtained results prove that the proposal fulfils the main requirements of an IoT system. It is autonomous, secure to share and send information between devices and users, has privacy, it is reliable, and the information is available in the infrastructure. Furthermore, this research demonstrates that the proposal is less susceptible to the most frequent attacks against IoT systems, such as linking attack, man in the middle, and Distributed Denial of Service (DDoS) attack.Entities:
Keywords: Advanced Encryption Standard (AES); Internet of Things (IoT); Wireless Sensor Network (WSN); blockchain; decentralized network
Year: 2020 PMID: 32423025 PMCID: PMC7287648 DOI: 10.3390/s20102798
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Blockchain general structure.
Figure 2Operation scheme of Advanced Encryption Standard (AES) encryption algorithm.
Figure 3Proposed methodology.
Comparison of investigations with the contribution in this paper.
| Cryptographic Tool | Key Size (bit) | Block Size (bit) | Round |
|---|---|---|---|
|
| 56 | 64 | 16 |
|
| 168,112,64 | 64 | 48 |
|
| 184 | 64 | 16 |
|
| 128,192,256 | 128 | It depends on the block size |
|
| 80 | 64 | 32 |
|
| 128 | 64 | 32 |
* Data Encryption Standard (DES), Triple Data Encryption Algorithm (3DES), Data Encryption Standard-X(DES-X), Advanced Encryption Standard (AES), HIGh security and light weigHT (HIGHT).
Figure 4Architecture system scheme of Wireless Sensor Networks (WSN) together with the blockchain mechanism and symmetric encryption.
Figure 5Data encryption operating scheme with the Message Queue Telemetry Transport (MQTT) communication protocol.
Figure 6(a) Wireless sensor node monitoring environmental data, (b) wireless sensor nodes and their internal structure.
Figure 7Graphic display of information collected by the sensor network system.
Figure 8Blockchain design.
Figure 9Composition diagram of blockchain system blocks.
Figure 10Hardware system temperature for test I.
Figure 11Hardware system temperature for test 2.
Figure 12CPU usage frequency for test I.
Figure 13CPU usage frequency for test II.
Figure 14CPU usage percentage for test I.
Figure 15CPU usage percentage for test II.
Comparison of investigations with the contribution in this paper.
| Security Criteria | Reference [ | Reference [ | Current |
|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| --- | --- | Hashand AES |
|
| Public | Public | Private |
*Distributed Denial of Service (DDoS).
Characteristics, pros, and cons of each related scheme.
| Advantages | Disadvantages | |
|---|---|---|
|
| Confidentiality, integrity, and availability to the IoT system and the information it shares. | It can disturb the performance of the system, it depends on the resources that are used. |
|
| The decentralized approach helps the overall security and integrity of the system. | It could represent a high computational cost for the system. |
|
| Prevent unknown devices from spamming the system, trying to spread malware, or launching a Distributed Denial of Service (DDoS) attack. | A static architecture could be represented as a limitation for some IoT systems. |
|
| Due to its characteristics, it can boast of having a really low consumption as well as using very few resources for its operation. | Being designed as a lightweight protocol, the use of cryptographic tools for data transmission is not contemplated. |
|
| Integrity and reliability of the information that is shared locally and externally. | It could represent a high computational cost for the system, depending on the resources used and the way they are applied. |
|
| A private blockchain is custom-designed based on the needs of the system. | The needs of the IoT system change according to time and interaction with users. Blockchain’s designs, being more robust, cover the needs of the system without having to make changes to the design. |