Skip to main content

Advertisement

Log in

Achieving IoT data security based blockchain

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Security in Internet of Things (IoT) remains a significant concern within academia and industry. With the great potential of IoT data, the traditional centralized architecture of IoT system is limited and cannot afford security solutions. In this paper, to address the issue of IoT data security, we propose a blockchain-based data acquisition and processing architecture. The proposed architecture ensures IoT data security through data consistency. It supports distributed IoT nodes to negotiate consensus on the processed data, and decides to write the consensus data to blockchain ledger. Since distributed nodes are non-peer and have different voting weights in the proposed architecture, traditional consensus algorithms are not applicable. Therefore, we design a novel consensus algorithm for data consistency between non-peer nodes: Byzantine Fault-Tolerant consensus algorithm based on Dynamic Permission Adjustment (DPA-PBFT) algorithm. The DPA-PBFT algorithm works in the consensus domain of different weight nodes with the ability of self-optimize. It improves consensus efficiency and reduces communication overhead for data consistency. Finally, we conduct numerous experiments to evaluate the performance improvement of the DPA-PBFT algorithm under the proposed distributed architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Kharb S, Singhrova A (2019) Fuzzy based priority aware scheduling technique for dense industrial IoT networks [J]. J Netw Comput Appl 125:17–27

    Article  Google Scholar 

  2. De La Torre G, Rad P, Choo KKR (2019) Implementation of deep packet inspection in smart grids and industrial internet of things: challenges and opportunities [J]. J Netw Comput Appl 135:32–46

    Article  Google Scholar 

  3. Puri V, Jagdev SS, Tromp JG et al (2020) Smart bicycle: IoT-based transportation service. Intelligent computing in engineering: select proceedings of RICE 2019, pp 1037–1043

  4. Alaa M, Zaidan AA, Zaidan BB et al (2017) A review of smart home applications based on internet of things [J]. J Netw Comput Appl 97:48–65

    Article  Google Scholar 

  5. Pal S, Hitchens M, Varadharajan V et al (2019) Policy-based access control for constrained healthcare resources in the context of the internet of things [J]. J Netw Comput Appl 139:57–74

    Article  Google Scholar 

  6. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Available at:  https://bitcoin.org/bitcoin.pdf. Accessed 7 2019

  7. Calderbank M (2007) The RSA cryptosystem: history, algorithm, primes. Available at:http://www.math.uchicago.edu/~may/VIGRE/VIGRE2007/REUPapers/FINALAPP/Calderbank.pdf. Accessed 7 2019

  8. Zheng Z, Xie S, Dai HN et al (2020) An overview on smart contracts: challenges, advances and platforms. Future Generation Computer Systems 105:475–491

    Article  Google Scholar 

  9. Agrawal S, Bünz KB, Zamani M et al (2019) Blockchain system for confidential and anonymous smart contracts. United States patent application US No.16/206, 661. Accessed 3 2020

  10. Kolluri A, Nikolic I, Sergey I et al (2019) Exploiting the laws of order in smart contracts. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 363–373

  11. Aggarwal S, Chaudhary R, Aujla GS et al (2019) Blockchain for smart communities: applications, challenges and opportunities[J]. J Netw Comput Appl 144:13–48

    Article  Google Scholar 

  12. Zhu L, Wu Y, Gai K et al (2019) Controllable and trustworthy blockchain-based cloud data management. Futur Gener Comput Syst 91:527–535

    Article  Google Scholar 

  13. Huang X, Xu C, Wang P et al (2018) Lnsc: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access, pp 1–1

  14. Song G, Kim S, Hwang H et al (2019) Blockchain-based notarization for social media. IEEE International Conference on Consumer Electronics (ICCE), pp 1–2

  15. Mcghin T, Choo KR, Liu CZ et al (2019) Blockchain in healthcare applications: research challenges and opportunities [J]. J Netw Comput Appl 135:62–75

    Article  Google Scholar 

  16. Patil AS, Hamza R, Hassan A et al (2020) Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Computers & Security 97:101958

    Article  Google Scholar 

  17. Misra S, Mukherjee A, Roy A et al (2021) Blockchain at the edge: performance of resource-constrained IoT networks. IEEE Trans Parallel Distrib Syst 32:174–183

  18. Fox A, Brewer EA (1999) Harvest, yield, and scalable tolerant systems. Hot Topics in Operating Systems, pp 174–178

  19. Brewer EA (2000) Towards robust distributed systems. Available at: http://pld.cs.luc.edu/courses/353/spr11/notes/brewer_keynote.pdf

  20. Browne J. Brewer's cap theorem-the kool aid Amazon and Ebay have been drinking. Available at: http://www.julianbrowne.com/article/viewer/brewers-cap-theorem. Retrieved. 25.03.2016

  21. Gilbert S, Lynch N (2002) Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, pp 51–59

  22. Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols. Secure Information Networks, pp 258–272

  23. Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. Annual international cryptology conference, pp 139–147

  24. Han R, Foutris N, Kotselidis C (2019) Demystifying crypto-mining: analysis and optimizations of memory-hard PoW algorithms. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp 22–33

  25. Sukhwani H, Martínez JM, Chang X et al (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). Reliable Distributed Systems, pp 253–255

  26. Castro M, Liskov B (1999) Practical byzantine fault tolerance. USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp 173–186

  27. Cachin C (2016) Architecture of the hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, pp 310

  28. Sousa J, Bessani A, Vukolic M (2018) A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp 51–58

  29. Lamport L, Shostak R, Pease M (1982) The byzantine generals problem. ACM Trans Program Lang Syst 4:382–401

    Article  Google Scholar 

  30. Vukolić M (2015) The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. International Workshop on Open Problems in Network Security, pp 112–125

  31. Wan SH, Li MJ, Liu GY et al (2020) Recent advances in consensus protocols for blockchain: a survey. Wirel Netw 26:5579–5593

    Article  Google Scholar 

  32. Larimer D (2013) Transactions as proof-of-stake. Available at:https://bravenewcoin.com/assets/Uploads/TransactionsAsProofOfStake10.pdf. Accessed 3 2020

  33. Nguyen CT, Hoang DT, Nguyen DN et al (2019) Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access:5727–85745

  34. Saleh F (2019) Blockchain without waste: proof-of-stake. Social Science Electronic Publishing. Available at SSRN 3183935

  35. Yang F, Zhou W, Wu Q, et al. (2019) Delegated proof of stake with downgrade: a secure and efficient Blockchain consensus algorithm with downgrade mechanism. IEEE Access, pp 18541–118555

  36. The go programming language (2009) Available at:https://golang.org. Accessed 5 2020

  37. GRPC Remote Procedure Call. Available at: https://grpc.io. Accessed on 2015

  38. Seres IA, Gulyás L, Nagy DA et al (2019) Topological analysis of bitcoin's lightning network. arXiv preprint arXiv:1901.04972

  39. Protocol Buffers (2008) Available at:https://developers.google.com/protocol-buffers. Accessed 6 2020

Download references

Acknowledgements

This research was partially supported by National Key R&D Program of China (2018YFC0831002), Sichuan science and technology program (2020YFG0040), National Natural Science Foundation of China (61971105), Science and Technology on Complex Electronic System Simulation Laboratory (DXZT-JC-ZZ-2017-012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Liao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing

Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liao, D., Li, H., Wang, W. et al. Achieving IoT data security based blockchain. Peer-to-Peer Netw. Appl. 14, 2694–2707 (2021). https://doi.org/10.1007/s12083-020-01042-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01042-w

Keywords

Navigation