Abstract
With the continuous development of information technology and internet of things, technology of the mobile Internet of Things (mobile IOT) has been widely used in medical and health, smart home, transportation, logistics and other industries. At the same time, the network security issues of mobile IOT have become increasingly prominent. What’s more serious is that the destructive power of these cyber threats has grown geometrically by taking the advantage of cloud computing and big data. This threat can be summarized as a non-trusted model threat under a “centralized” network architecture. By analyzing such security threats through real-world cases, this paper proposes a model to solve such security problems. Firstly, a variety of smart home and intelligent voice-controlled robots in the market are selected as research objects, and then the Man-in-the-Middle Attacks such as intelligence mining and data packet hijacking are used to detect the security vulnerabilities of such mobile IOT schemes. Through illustrating the huge network security threat faced by mobile IOT under the new situation, the example summarizes the current security risks in such mobile IOT solutions, and propose a secure and trusted mobile IOT network interconnection security model based on blockchain technology to remedy this problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li, S., Zhao, S., Yang, P., Andriotis, P., Xu, L., Sun, Q.: Distributed consensus algorithm for events detection in cyber physical systems. IEEE Internet Things J. 6(2), 2299–2308 (2019)
Li, S., Choo, K.-K. R., Sun, Q., Buchanan, W., Cao, J.: IoT forensics: Amazon Echo as a use case. IEEE Internet Things (2019). ISSN: 2327-4662
Algorithms; study findings on algorithms are outlined in reports from G. Oliva and Colleagues (Distributed calculation of edge-disjoint spanning trees for robustifying distributed algorithms against man-in-the-middle attacks). Comput. Networks Commun. (2019)
Information technology - Information forensics and security; new findings from Ben Gurion University of the Negev in the area of information forensics and security reported (Vesper: using echo analysis to detect man-in-the-middle attacks in LANs). Comput. Networks Commun. (2019)
Li, S., Zhao, S., Yuan, Y., Sun, Q., Zhang, K.: Dynamic security risk evaluation via hybrid Bayesian risk graph in cyber-physical social systems. IEEE Trans. Comput. Soc. Syst. 5(4), 1133–1141 (2018)
Li, S., Tryfonas, T., Li, H.: The Internet of Things: a security point of view. Internet Res. 26(2), 337–359 (2016)
Li, S., Tryfonas, T., Russell, G., Andriotis, P.: Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. IEEE Trans. Cybern. 46(8), 1749–1759 (2016)
Ahmad, F., Adnane, A., Franqueira, V., Kurugollu, F., Liu, L.: Man-in-the-middle attacks in vehicular ad-hoc networks: evaluating the impact of attackers’ strategies. Sensors (Basel, Switzerland) 18(11), 4040 (2018)
Elakrat, M.A., Jung, J.C.: Development of field programmable gate array–based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network. Nucl. Eng. Technol. 50(5), 780–787 (2018)
Fei, Y.Y., Meng, X.D., Gao, M., Wang, H., Ma, Z.: Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Sci. Rep. 8(1), 4283 (2018)
Qian, Y., et al.: Towards decentralized IoT security enhancement: a blockchain approach. Comput. Electr. Eng. 72, 266–273 (2018)
Si, H., Sun, C., Li, Y., Qiao, H., Shi, L.: IoT information sharing security mechanism based on blockchain technology. Future Gener. Comput. Syst. 101, 1028–1040 (2019)
Tariq, N., et al.: The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors (Basel, Switzerland) 19(8), 1788 (2019)
Derhab, A., et al.: Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors (Basel, Switzerland) 19(14), 3119 (2019)
Acknowledgment
This work is partially supported by Ministry of Education Humanities and Social Sciences Project (11YJCZH021, 15YJCZH111). Shandong Social Science Planning Research Project (17CHLJ41, 16CTQJ02, 18CHLJ34). Teachers Research Support Foundation of Jining Medical University 2018 (JYFC2018KJ063, JYFC2018KJ025, JY2017KJ054). Education Research Project of Jining Medical University (18048).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, B., Li, J., Zheng, X., Ge, J., Sun, J. (2019). A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-37352-8_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37351-1
Online ISBN: 978-3-030-37352-8
eBook Packages: Computer ScienceComputer Science (R0)