Skip to main content

Security in MANETs: The Blockchain Issue

  • Conference paper
  • First Online:
Advanced Communication Systems and Information Security ( ACOSIS 2019)

Abstract

With the emergence of the IoT (Internet of Things) technology, security features must take into account the developments and possible uses. The blockchain is considered as a new technology devoted to data sharing, it allows to guarantee the integrity of data by IoT devices thanks to intelligent contracts allowing to verify and enforce the conditions of the monitored goods during their processing. In our work, we will address the security of Blockchain-based systems and networks to improve and simplify the communication of messages and informations, using the most innovative and sophisticated processes and a form of device independent control. In order to do so, we will analyse the solutions advanced by researchers from all over the world who are dedicated to guaranteeing a good state of security on these networks. Finally, our manuscript will present an approach to enhance security which is founded on the Blockchain principle and which we have entitled “MPR Blockchain”. This solution proves to be the most appropriate to our requirements and expectations as a team working within IoT systems and especially ad hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ali, I., Sabir, S., Ullah, Z.: Internet of things security, device authentication and access control: a review. arXiv preprint arXiv:1901.07309 (2019)

  2. Benjbara, C., Habbani, A.: Communication in a heterogeneous ad hoc network. Int. J. Comput. Inf. Eng. 13(10), 524–529 (2019)

    Google Scholar 

  3. Benjbara, C., Habbani, A., Mahdi, F.E., Essaid, B.: Multi-path routing protocol in the smart digital environment. In: Proceedings of the 2017 International Conference on Smart Digital Environment, pp. 14–18 (2017)

    Google Scholar 

  4. Berradi, H., Habbani, A., Benjbara, C., Mouchfiq, N., Souidi, M.: Enhanced mobile network stability using average spatial dependency. In: Ben Ahmed, M., Boudhir, A.A., Santos, D., El Aroussi, M., Karas, İ.R. (eds.) SCA 2019. LNITI, pp. 495–509. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-37629-1_36

    Chapter  Google Scholar 

  5. Berradi, H., Habbani, A., Benjbara, C., Mouchfiq, N., Souidi, M.: Enhancement wireless network stability based on spatial dependency. In: Proceedings of the 4th International Conference on Smart City Applications, pp. 1–6 (2019)

    Google Scholar 

  6. Boudguiga, A., et al.: Towards better availability and accountability for IoT updates by means of a blockchain. In: IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 50–58. IEEE (2017)

    Google Scholar 

  7. Busygin, A., Kalinin, M., Konoplev, A.: Supporting connectivity of vanet/manet network nodes and elastic software-configurable security services using blockchain with floating genesis block. In: SHS Web of Conferences, vol. 44, p. 00020. EDP Sciences (2018)

    Google Scholar 

  8. Chourabi, H., et al.: Understanding smart cities: an integrative framework. In: 45th Hawaii International Conference on System Sciences, pp. 2289–2297. IEEE (2012)

    Google Scholar 

  9. Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 173–178. IEEE (2017)

    Google Scholar 

  10. Fakhri, D., Mutijarsa, K.: Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1–6. IEEE (2018)

    Google Scholar 

  11. Forsyth, T.: Community-based adaptation: a review of past and future challenges. Wiley Interdisc. Rev. Climate Change 4(5), 439–446 (2013)

    Article  Google Scholar 

  12. Li, S., Da Xu, L., Zhao, S.: 5G internet of things: a survey. J. Ind. Inf. Integr. 10, 1–9 (2018)

    Google Scholar 

  13. Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for internet of things. IEEE Internet Things J. 5(1), 257 (2018)

    Article  Google Scholar 

  14. Mahdi, F.E., Habbani, A., Mouchfiq, N., Essaid, B.: Study of security in MANETs and evaluation of network performance using ETX metric. In: Proceedings of the 2017 International Conference on Smart Digital Environment, pp. 220–228 (2017)

    Google Scholar 

  15. Minoli, D., Occhiogrosso, B.: Blockchain mechanisms for IoT security. Internet Things 1, 1–13 (2018)

    Article  Google Scholar 

  16. Nguyen-Minh, H.: Contribution to the intelligent transportation system: security of safety applications in vehicle ad hoc networks. Avignon (2016)

    Google Scholar 

  17. Ribeiro, S.L., Nakamura, E.T.: Pseudonymization approach in a health IoT system to strengthen security and privacy results from OCARIoT project. In: Doss, R., Piramuthu, S., Zhou, W. (eds.) FNSS 2019. CCIS, vol. 1113, pp. 134–146. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34353-8_10

    Chapter  Google Scholar 

  18. Swan, M.: Blockchain thinking: the brain as a decentralized autonomous corporation [commentary]. IEEE Tech. Soc. Mag. 34(4), 41–52 (2015)

    Article  Google Scholar 

  19. Vukobratovic, D., et al.: Condense: a reconfigurable knowledge acquisition architecture for future 5G IoT. IEEE Access 4, 3360–3378 (2016)

    Article  Google Scholar 

  20. Wessling, F., Gruhn, V.: Engineering software architectures of blockchain-oriented applications. In: IEEE International Conference on Software Architecture Companion (ICSA-C), pp. 45–46. IEEE (2018)

    Google Scholar 

  21. Yang, X., Lau, W.F., Ye, Q., Au, M.H., Liu, J.K., Cheng, J.: Practical escrow protocol for bitcoin. IEEE Trans. Inf. Forensics Secur. 15, 3023–3034 (2020)

    Article  Google Scholar 

  22. Zhang, Q., Li, Y., Li, J., Gan, Y., Zhang, Y., Hu, J.: Blockchain-based asymmetric group key agreement protocol for mobile ad hoc network. In: Meng, W., Furnell, S. (eds.) SocialSec 2019. CCIS, vol. 1095, pp. 47–56. Springer, Singapore (2019). https://doi.org/10.1007/978-981-15-0758-8_4

    Chapter  Google Scholar 

  23. Zhang, Z.K., Cho, M.C.Y., Shieh, S.: Emerging security threats and countermeasures in IoT. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2015, pp. 1–6. Association for Computing Machinery, New York (2015). https://doi.org/10.1145/2714576.2737091

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nada Mouchfiq .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mouchfiq, N., Benjbara, C., Habbani, A. (2020). Security in MANETs: The Blockchain Issue. In: Belkasmi, M., Ben-Othman, J., Li, C., Essaaidi, M. (eds) Advanced Communication Systems and Information Security. ACOSIS 2019. Communications in Computer and Information Science, vol 1264. Springer, Cham. https://doi.org/10.1007/978-3-030-61143-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61143-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61142-2

  • Online ISBN: 978-3-030-61143-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics