Skip to main content

A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Included in the following conference series:

Abstract

With the continuous development of information technology and internet of things, technology of the mobile Internet of Things (mobile IOT) has been widely used in medical and health, smart home, transportation, logistics and other industries. At the same time, the network security issues of mobile IOT have become increasingly prominent. What’s more serious is that the destructive power of these cyber threats has grown geometrically by taking the advantage of cloud computing and big data. This threat can be summarized as a non-trusted model threat under a “centralized” network architecture. By analyzing such security threats through real-world cases, this paper proposes a model to solve such security problems. Firstly, a variety of smart home and intelligent voice-controlled robots in the market are selected as research objects, and then the Man-in-the-Middle Attacks such as intelligence mining and data packet hijacking are used to detect the security vulnerabilities of such mobile IOT schemes. Through illustrating the huge network security threat faced by mobile IOT under the new situation, the example summarizes the current security risks in such mobile IOT solutions, and propose a secure and trusted mobile IOT network interconnection security model based on blockchain technology to remedy this problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li, S., Zhao, S., Yang, P., Andriotis, P., Xu, L., Sun, Q.: Distributed consensus algorithm for events detection in cyber physical systems. IEEE Internet Things J. 6(2), 2299–2308 (2019)

    Article  Google Scholar 

  2. Li, S., Choo, K.-K. R., Sun, Q., Buchanan, W., Cao, J.: IoT forensics: Amazon Echo as a use case. IEEE Internet Things (2019). ISSN: 2327-4662

    Google Scholar 

  3. Algorithms; study findings on algorithms are outlined in reports from G. Oliva and Colleagues (Distributed calculation of edge-disjoint spanning trees for robustifying distributed algorithms against man-in-the-middle attacks). Comput. Networks Commun. (2019)

    Google Scholar 

  4. Information technology - Information forensics and security; new findings from Ben Gurion University of the Negev in the area of information forensics and security reported (Vesper: using echo analysis to detect man-in-the-middle attacks in LANs). Comput. Networks Commun. (2019)

    Google Scholar 

  5. Li, S., Zhao, S., Yuan, Y., Sun, Q., Zhang, K.: Dynamic security risk evaluation via hybrid Bayesian risk graph in cyber-physical social systems. IEEE Trans. Comput. Soc. Syst. 5(4), 1133–1141 (2018)

    Article  Google Scholar 

  6. Li, S., Tryfonas, T., Li, H.: The Internet of Things: a security point of view. Internet Res. 26(2), 337–359 (2016)

    Article  Google Scholar 

  7. Li, S., Tryfonas, T., Russell, G., Andriotis, P.: Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. IEEE Trans. Cybern. 46(8), 1749–1759 (2016)

    Article  Google Scholar 

  8. Ahmad, F., Adnane, A., Franqueira, V., Kurugollu, F., Liu, L.: Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies. Sensors (Basel, Switzerland) 18(11), 4040 (2018)

    Article  Google Scholar 

  9. Elakrat, M.A., Jung, J.C.: Development of field programmable gate array–based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network. Nucl. Eng. Technol. 50(5), 780–787 (2018)

    Article  Google Scholar 

  10. Fei, Y.Y., Meng, X.D., Gao, M., Wang, H., Ma, Z.: Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Sci. Rep. 8(1), 4283 (2018)

    Article  Google Scholar 

  11. Qian, Y., et al.: Towards decentralized IoT security enhancement: a blockchain approach. Comput. Electr. Eng. 72, 266–273 (2018)

    Article  Google Scholar 

  12. Si, H., Sun, C., Li, Y., Qiao, H., Shi, L.: IoT information sharing security mechanism based on blockchain technology. Future Gener. Comput. Syst. 101, 1028–1040 (2019)

    Article  Google Scholar 

  13. Tariq, N., et al.: The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors (Basel, Switzerland) 19(8), 1788 (2019)

    Article  Google Scholar 

  14. Derhab, A., et al.: Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors (Basel, Switzerland) 19(14), 3119 (2019)

    Article  Google Scholar 

Download references

Acknowledgment

This work is partially supported by Ministry of Education Humanities and Social Sciences Project (11YJCZH021, 15YJCZH111). Shandong Social Science Planning Research Project (17CHLJ41, 16CTQJ02, 18CHLJ34). Teachers Research Support Foundation of Jining Medical University 2018 (JYFC2018KJ063, JYFC2018KJ025, JY2017KJ054). Education Research Project of Jining Medical University (18048).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, B., Li, J., Zheng, X., Ge, J., Sun, J. (2019). A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics