BLOCKCHAIN meets IoT to improve SECURITY

Aditya Bhardwaj
10 min readMay 15, 2020

What is Blockchain?

Photo by André François McKenzie on Unsplash

The last 10 years in the field of banking, investing and cryptocurrency have been exciting and rapidly changing the outlook of the modern tech-driven world. In this way, you might be acquainted with “Blockchain”, the innovation that helps keep records and keeps up a kind of log in the Bitcoin network.

If you have searched about it, I’m pretty sure you’ve come across: “Blockchain is a distributed, decentralized, public ledger”. Well, believe me I was as clueless upon reading this as you are but trust me it’s not as complicated as it looks.

Well you can think of it as blocks that are chained together, however, not at all in the strict meaning of each of these terms. The terms “block” and “chain” in this specific circumstance, allude to digitized data (the “block”) set aside in a type of open DB (the “chain”).

How secure is Blockchain?

Blockchain security model

The innovation behind Blockchain considers all the problems related to safety and confidence in some very distinct ways -

1. From the beginning itself blocks are stored in a linear manner i.e. they are always added at the “end” of the chain, which gives each of these blocks a certain “height” in the blockchain network.

2. The content inside the block is immutable. That is on the grounds that each block contains its own one of a kind hash value, alongside the hash estimation of the penultimate block.

3. Hashes are created by an algorithm that changes over computerized data into a string of alphanumeric characters.

4. Upon changing the information inside the block, the hash code changes too.

5. Public blockchains have however actualized tests for individuals who wish to take part in the network chain and append blocks and participate in the system. These tests only need that the individuals “prove” themselves, in other words make sure they are worthy and trusted. The Proof-of-Work system states that — If a user solves one of the complex computational math difficulties, they become qualified to append the chain with a block . The way blocks get inserted to the blockchain is known as “mining” and it is in reality very tough to achieve and requires skill, somewhat like actual mining of minerals.

Let me tell you why that’s integral to maintaining the security!!

For example, a programmer endeavours to make changes to your exchange with the goal that you really need to pay for your buy twice. In any case, the second they alter the measure of your exchange, the block’s hash will be mutated however the following block in the chain will at present contain its old hash, and the programmer would need to make changes to that block as well so as to effectively pull off the extortion. In the process the previous block’s hash would also be affected and this cycle would repeat itself again and again making it very cumbersome. Recalculating each one of those hashes would take a gigantic and far-fetched measure of processing power. Proof-of-Work doesn’t guarantee that there won’t be any assaults by programmers, however it makes them fairly pointless. In the event that a programmer wanted to assault the blockchain organize, they should be in charge of the greater part of all processing power on the system in order to have the option to overwhelm every other member. Given the gigantic size of the blockchain, a purported 51% attack is more likely than certainly not feasible.

What is IoT?

Internet of Things is an omnipresent web work of intelligent physical objects, called “Things”. IoT authorizes these “Things” to interface and convey, in this manner, changing the physical world into an extensive data framework.

Smart Home

The giant headway in the domain of IoT is answerable for development in Information and Communication Technology (ICT) organizations too. IoT is additionally liable for the advancement of new business methods, with one of its most fundamental angles lying in the data enhancement that will influence the development of the ICT marketplace.

Why does IoT need Blockchain?

Nonattendance of inborn well-being and safety efforts makes IoT weak against protection and security dangers. Most of the IoT gadgets accumulate and exchange a lot of information from our own spaces, in this manner opening up noteworthy protection concerns.

Security is a very challenging issue because of many factors such as low resource-consuming abilities of by far most of gadgets, huge scope, heterogeneity among the gadgets, and absence of normalization.

Blockchain uses the concept of “security by design” and that might help in tending to significant security needs in IoT. Blockchain features such as operational flexibility, auditability, immutability data encryption and transparency help explain most systematic weaknesses of IoT.

IoT has a huge swath of uses including smart frameworks, smart urban communities, and management of health. Be that as it may, the becoming unsee-able, and penetrating assortment, handling along with dispersion of information amidst individuals’ private lives offers ascend to genuine security and protection concerns. A couple of trademark features of IoT escalate its safety and trust challenges including: absence of focal control, heterogeneity in gadget resources, different attack points, context explicit risks, also, scope.

This is where blockchain comes in to provide a solution for the same, in blockchain, security for the most part originates from a cryptographic problem known as Proof-of-Work utilized for including (“mining”) new blocks in the chain. Blockchain expands its degree of security by utilizing a variable Public Key (PK) as the clients’ unique signature.

These notable features of Blockchain make it appealing for conveying distributed protection and security in IoT

What are the challenges faced at the time of integrating Blockchain with IoT?

Applying blockchain to IoT is not child’s play. There are several integral and architectural challenges that need to be addressed.

Approaches that have blockchain as their foundation provide distributed, safety and protection, yet include noteworthy vitality, delay, and processing load that is not appropriate for a few asset compelled IoT gadgets.

Basically, in spite of ongoing recommendations for giving security and protection in IoT using blockchain technology, three obstacles despite everything should be tended to and overcome:

  • Resource optimization: IoT Devices that are bound by the extent of consumption of resources can not equipped to significant degree, compounded security techniques.
  • Privacy: Securing client’s private data while uncovering various sorts of information.
  • Centralization: In IoT, unified techniques will in general be unseemly and always highlight difficulties of single point-of-failure, many-to-one traffic, and decreased versatility.

How to solve the problem of integration?

Present another kind of blockchain that is advanced and progressively reasonable for IoT.

According to a study done by The University of New South Wales (Sydney, Australia),a hierarchical structure can be adopted to upgrade resource utilization and increment network adaptability.

The structure they have come up with has three layers that are: smart home, overlay network, and cloud storage.

IoT gadgets in a smart home exploit a private Immutable Ledger (IL), that is fundamentally the same as blockchain however is centrally operated, and encrypted symmetrically to bring down the handling overhead, while higher resource devouring gadgets together make a dispersed overlay that recognizes an open blockchain.

Correspondences among objects in various layers are termed transactions which are assembled into blocks. Blocks are added into the blockchain without settling Proof-of-Work, this results in decreasing the appending overhead by a significant amount.

Authorized signed transactions over the existing system are accessible spontaneously, thus reducing the delay in IoT transactions, like accessing data or requests of IoT transactions, for example, accessing data or querying significantly.

Distributed trust technique is made use of in the overlay so as to reduce the computational load in affirming the newly added blocks.

The effectiveness and efficiency of the presented technique against malicious assaults and threats has been evaluated along with the processing overhead quantitatively through simulation.

CASE STUDY: Blockchain based Smart-Home architecture

With regards to smart homes, the researchers at The University of New South Wales talked about the security implications associated with sensor dispersion, capturing data, and sending data across the gateway.

The presented architecture, has three tiers or layers-the smart home, the overlay, and the cloud storage. Entities utilize transactions within each level to connect with one another.

Smart-Home

A smart home includes IoT systems, local IL and an open private storage system. Every smart home also has local private IL, comparable to a blockchain but centralized by the Smart Home Manager (SHM). SHM processes most inbound and outbound transactions and utilizes the shared key to communicate with local storage and IoT devices. Local gadgets inside the house or overlay access points may produce transactions for data sharing, requesting or storing.

Overlay

Overlay is somewhat of a peer-to-peer framework that offers an architecture with the distributed function. The constituent access points of this network are termed, overlay nodes, which can be SHMs, various major resource-consuming gadgets in the house or the client’s mobilephone or PC. To reduce network overhead and delay, nodes in the overlay are grouped in clusters and each cluster elects a Cluster Head (CH) using certain methods. Each CH has a distinct pubic key, acknowledged by multiple CHs in an overlay, that generate new blocks so that the block generator could be approved by other CHs. Every node is independent, if it is experiencing prolonged delays, it can change its cluster. At any time, nodes may elect a new head of the cluster.

The overlay cluster heads keep up an open blockchain, which records every overlay node that has shown the historical backdrop of exchanges delivered by the overlay client and is utilized to become reputed. Transactions are created by clients or gadgets to ask for or exchange information with others. Overlay contains multi-signature transactions, which means 2 entities-the requester and the requestee to be treated should sign them as a substantial exchange. Moreover, each transaction has 2 yields that shows the complete figure of acknowledged or dismissed transactions, by the requestees, that are asked by the generator of the present transaction.

Cloud Storage

Cloud storage is responsible for grouping user’s data acquired from the smart devices in identical blocks each having a distinguished block-number. The SHM uses the block-number for authentication as well as verification of hash of data. The user is authenticated, provided that the storage can correctly identify data with the specific block number and hash acquired from its SHM. First-In-First-Out order is used to store the inbound data packets from clients and are put aside in blocks alongside the unique hash of data in storage. Remember that each home owner has an option to either build separate ledgers for data storage for each of the gadgets, or one single unifying ledger for every one of the gadgets. The former is more common if the owner wants to offer an SP access to all data about a specific device.

EXACTLY what is being done to SOLVE the PRIVACY issues

The answer is- Distributed Trust and POW elimination method:

1.A consumer who initially doesn’t really have a transaction history is assumed malicious or fraudulent and every transaction is cross-checked and validated.

2.The first step to validate a transaction is always to ensure that its recipient also has the power to add transactions to that same ledger, which is achieved by matching the current transaction public key hash with the last transaction ‘s output public key.

3.Afterwards, the impression of the requester is validated by using his public key in the transaction.

4.Then, the verifying entity ensures that only one of the transaction’s outputs, either the count of transactions that have been successful or the total of declined transactions, is incremented by 1.

5.Transactions are verified only when all the listed steps are passed successfully.

Blockchain integrated IoT security

What can be Concluded from this study?

Blockchain can very well be the answer to solving privacy issues and increasing security in IoT. However, As I have already pointed out, the application of blockchain in IoT is not so simple and clear due to numerous related challenges, which include: high consumption of resources, extensibility and computational times.

(1) This paper presented an upgraded blockchain that’s capable of completely removing the load related to the traditional blockchain technology while retaining its key features like safety and trust.

(2) The aforementioned blockchain had no concept of mining and so wasn’t subjected to additional gaps in computing produced transactions.

(3) This is focused on a hierarchical system that equips a unified private IL to decrease workload at local IoT network layer, and shared distributed blockchain to higher-end resourceconsuming devices for greater confidence.

They achieve this with the help of a decentralized trust system, used to reduce overheads for processing new blocks.

CSE DEPARTMENT, BENNETT UNIVERSITY

--

--