Abstract
Forest fires can have multiple engenderers including lighting and thunder, unauthorized human exercises, and unrestrained fire projects. In addition to precautions, quick detection, immediate communication, and prompt response are critical to keeping losses to life and property at bay. This work presents Sybil-secured Smart Forest Fire Surveillance based on Blockchain Technology. This work encompasses a detailed three-layer architecture consisting of IoT Layer (sensors planted in the forest), Fog Layer (a decentralized network of fog nodes), and Cloud Layer (Blockchain-based cloud storage capable of computations, decision making, and forecasting). Further, a Blockchain technology-based framework for secured and Sybil-protected data transmission in wildfire scenarios is proposed here. Moreover, an energy-efficient Blockchain consensus algorithm has also been designed and implemented here. Numerous QoS metrics have been considered and used for the evaluation of the proposed system. This work opens the gate to a vista of further research for secure data transmission in wildfire scenarios.




































Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abdelbar AM, Salama KM (2019) Parameter self-adaptation in an ant colony algorithm for continuous optimization. IEEE Access 7:18464–18479
Abraham I, Devadas S, Dolev D, Nayak K, Ren L (2017) Efficient synchronous byzantine consensus. arXiv preprint arXiv:abs/1704.02397
Agrawal R, Verma P, Sonanis R, Goel U, De A, Kondaveeti SA, Shekhar S (2018). Continuous security in IoT using blockchain. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 6423–6427. IEEE
Alachkar K, Gaastra D (2018) Blockchain-based sybil attack mitigation: a case study of the I2P Network. August, 22, 1–13
Alassaf N, Alkazemi B, Gutub A (2003) Applicable light-weight cryptography to secure medical data in IoT systems. Arabia
Alassaf N, Gutub A, Parah SA, Al Ghamdi M (2019) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl 78(23):32633–32657
Al-Ghamdi M, Al-Ghamdi M, Gutub A (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78(12):16283–16310
AlKhodaidi T, Gutub A (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng 45(4):3403–3423
Almazrooie M, Samsudin A, Gutub AAA, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ-Comput Inf Sci 32(1):24–34
Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A (2019) Secure mobile computing authentication utilizing hash, cryptography and steganography combination. J Inf Secur Cybercrimes Res 2(1):73–82
Aly SA, Alghamdi TA, Salim M, Gutub AA (2013) Data dissemination and collection algorithms for collaborative sensor devices using dynamic cluster heads. Trends Appl Sci Res 8(2):55
Bahga A, Madisetti VK (2016) Blockchain platform for industrial internet of things. J Softw Eng Appl 9(10):533–546
Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in WSNs for IoT application. IEEE Internet Things J 6(3):5132–5139
Ben-Or M (1983) Another advantage of free choice: completely asynchronous agreement protocols (Extended Abstract). In: Proceedings of the 2nd ACM annual symposium on principles of distributed computing. Montreal, Quebec, pp 27–30
Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In: 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pp 1392–1393. IEEE
Bochem A, Leiding B, Hogrefe D (2018) Unchained identities: putting a price on sybil nodes in mobile ad hoc networks. In: International conference on security and privacy in communication systems. Springer, Cham, pp. 358–374
Bouabdellah K, Noureddine H, Larbi S (2013) Using wireless sensor networks for reliable forest fires detection. Procedia Comput Sci 19:794–801
Brazilian amazon fires deforestation report (2019) https://news.mongabay.com/2019/09/brazilian-amazon-fires-scientifically-linked-to-2019-deforestation-report/
Castro M, Liskov B (1999) Practical byzantine fault tolerance. In: OSDI vol 99, no 1999, pp 173–186
Chen J, Micali S (2016) Algorand. arXiv preprint arXiv:abs/1607.01341
Chen B, Tan Z, Fang W (2018) Blockchain-based implementation for financial product management. In: 2018 28th international telecommunication networks and applications conference (ITNAC), pp 1–3. IEEE
Cui F (2020) Deployment and integration of smart sensors with IoT devices detecting fire disasters in huge forest environment. Comput Commun 150:818–827
Curtis S, Zafar B, Gutub A, Manocha D (2013) Right of way. Vis Comput 29(12):1277–1292
Datta S, Das AK, Kumar A, Sinha D (2019) Authentication and privacy preservation in IoT based forest fire detection by using blockchain—a review. In: International conference on internet of things and connected technologies. Springer, Cham, pp 133–143
Dolev D, Strong HR (1983) Authenticated algorithms for Byzantine agreement. SIAM J Comput 12(4):656–666
Dolev D, Fischer MJ, Fowler R, Lynch NA, Strong HR (1982) An efficient algorithm for Byzantine agreement without authentication. Inf Control 52(3):257–274
Dorri A, Roulin C, Jurdak R, Kanhere SS (2019) On the activity privacy of blockchain for IoT. In: 2019 IEEE 44th conference on local computer networks (LCN), pp 258–261. IEEE
Farooqi N, Gutub A, Khozium MO (2019) Smart community challenges: enabling IoT/M2M technology case study. Life Sci J 16(7)
Feldman P, Micali S (1989) An optimal probabilistic algorithm for synchronous byzantine agreement. In: International colloquium on automata, languages, and programming. Springer, Berlin, pp 341–378
Forest Survey of India (2011). http://www.fsi.nic.in/cover_2011/chapter2.pdf.
Gong S, Lee C (2020) Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance. Electronics 9(3):521
Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631–2644
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619
Jan MA, Nanda P, He X, Liu RP (2018) A Sybil attack detection scheme for a forest wildfire monitoring application. Futur Gener Comput Syst 80:613–626
Katz J, Koo CY (2006) On expected constant-round protocols for Byzantine agreement. In: Annual international cryptology conference. Springer, Berlin, pp 445–462
Kaur H, Sood SK (2019a) Adaptive neuro fuzzy inference system (ANFIS) based wildfire risk assessment. J Exp Theor Artif Intell 31(4):599–619
Kaur H, Sood SK (2019b) Fog-assisted IoT-enabled scalable network infrastructure for wildfire surveillance. J Netw Comput Appl 144:171–183
Kim S, Guy SJ, Hillesland K, Zafar B, Gutub AAA, Manocha D (2015) Velocity-based modeling of physical interactions in dense crowds. Vis Comput 31(5):541–555
Kumar G, Saha R, Rai MK, Thomas R, Kim TH (2019) Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE Internet Things J 6(4):6835–6842
Lamport L (2001) Paxos made simple. ACM SIGACT News 32(4):18–25
Lamport L, Shostak R, Pease M (2019) The Byzantine Generals problem. In: Concurrency: the works of leslie lamport, pp 203–226
Liu, Q., Guan, Q., Yang, X., Zhu, H., Green, G., & Yin, S. (2018, August). Education-industry cooperative system based on blockchain. In 2018 1st IEEE international conference on hot information-centric networking (HotICN) (pp. 207–211). IEEE.
Mahmoud MA, Ren H (2018) Forest fire detection using a rule-based image processing algorithm and temporal variation. Mathematical Problems in Engineering
Micali, S. Byzantine agreement made trivial (2018) https://pEOPle.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Distributed%20Computation/BYZANTYNE%20AGREEMENT%20MADE%20TRIVIAL.pdf
Miller A, Xia Y, Croman K, Shi E, Song D (2016) The honey badger of BFT protocols. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 31–42
Mishra AK, Tripathy AK, Puthal D, Yang LT (2018) Analytical model for sybil attack phases in internet of things. IEEE Internet Things J 6(1):379–387
Misra S, Mukherjee A, Roy A, Saurabh N, Rahulamathavan Y, Rajarajan M (2020) Blockchain at the edge: performance of resource-constrained IoT networks. IEEE Trans Parallel Distrib Syst 32(1):174–183
Moinet A, Darties B, Baril JL (2017) Blockchain based trust & authentication for decentralized sensor networks. arXiv preprint arXiv:abs/1706.01730
Najjar M (2015) d-HMAC—an improved HMAC algorithm. Int J Comput Sci Inf Secur 13(4):89
National Interagency Fire Center (NIFC) report (2019) https://www.nifc.gov/
Newsome, J., Shi, E., Song, D., & Perrig, A. (2004) The sybil attack in sensor networks: analysis & defenses. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 259–268). IEEE.
Novo O (2018) Scalable access management in IoT using blockchain: a performance evaluation. IEEE Internet Things J 6(3):4694–4701
Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IOT: modelling and defenses. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), pp 2323–2327. IEEE
Ramezan G, Leung C (2018) A blockchain-based contractual routing protocol for the internet of things using smart contracts. Wirel Commun Mob Comput
Reeds J (2019) A review of Sybil attack in wireless sensor networks. https://www.ivoryresearch.com/writers/15429-2/
Roy DG, De D, Alam MM, Chattopadhyay S (2016) Multi-cloud scenario based QoS enhancing virtual resource brokering. In: 2016 3rd international conference on recent advances in information technology (RAIT), pp 576–581. IEEE
Roy DG, Das P, De D, Buyya R (2019) QoS-aware secure transaction framework for internet of things using blockchain mechanism. J Netw Comput Appl 144:59–78
Shaker SH (2014) HMAC modification using new random key generator. Iraqi J Comput Commun Control Syst Eng 14(1):72–82
Sharanappa PH, Kakkasageri MS (2019) Intelligent Information Gathering Scheme in Internet of Things (IoT). In: 2019 11th International Conference on Advanced Computing (ICoAC), pp 134–138. IEEE
Sinha D, Kumari R, Tripathi S (2019) Semisupervised classification based clustering approach in WSN for forest fire detection. Wirel Pers Commun 109(4):2561–2605
Stula M, Krstinic D, Seric L (2012) Intelligent forest fire monitoring system. Inf Syst Front 14(3):725–739
Sudhakar S, Vijayakumar V, Kumar CS, Priya V, Ravi L, Subramaniyaswamy V (2020) Unmanned Aerial Vehicle (UAV) based Forest Fire Detection and monitoring for reducing false alarms in forest-fires. Comput Commun 149:1–16
Toledo-Castro J, Caballero-Gil P, Rodríguez-Pérez N, Santos-González I, Hernández-Goya C, Aguasca-Colomo R (2018) Forest fire prevention, detection, and fighting based on fuzzy logic and wireless sensor networks. Complexity
Tosh D, Shetty S, Foytik P, Kamhoua C, Njilla L (2018) CloudPoS: a proof-of-stake consensus design for blockchain integrated cloud. In: 2018 IEEE 11th international conference on cloud computing (CLOUD), pp 302–309. IEEE
Tuli S, Mahmud R, Tuli S, Buyya R (2019) Fogbus: a blockchain-based lightweight framework for edge and fog computing. J Syst Softw 154:22–36
Wang X, Xu X, Feagan L, Huang S, Jiao L, Zhao W (2018) Inter-bank payment system on enterprise blockchain platform. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp 614–621. IEEE
Yánez W, Mahmud R, Bahsoon R, Zhang Y, Buyya R (2020) Data allocation mechanism for Internet-of-Things systems with blockchain. IEEE Internet Things J 7(4):3509–3522
Yoshida H, Biryukov A (2005) Analysis of a SHA-256 variant. In: International workshop on selected areas in cryptography. Springer, Berlin, pp 245–260
Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375
Zheng Z, Pan J, Cai L (2020) Lightweight Blockchain consensus protocols for vehicular social networks. IEEE Trans Veh Technol 69(6):5736–5748
Acknowledgements
This research is found in parts by DST-SERB project ECR/2017/000983 Grants. The authors would like to thank DST-SERB for this support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Datta, S., Kumar, S., Sinha, D. et al. BSSFFS: blockchain-based sybil-secured smart forest fire surveillance. J Ambient Intell Human Comput 13, 2479–2510 (2022). https://doi.org/10.1007/s12652-021-03591-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03591-1