Skip to main content

Advertisement

Log in

Blockchain-based security management of IoT infrastructure with Ethereum transactions

  • Original Article
  • Published:
Iran Journal of Computer Science Aims and scope Submit manuscript

Abstract

The blockchain is nothing but a skilled magician one after one it is providing the mankind with wonders in the era of information technology and financial industry. In recent years, blockchain has received tremendous attention to providing a distributed, definitive, and auditable application in the Internet of Things (IoT). Most Internet of Things (IoT) is moving towards momentous scalability and security challenges. Blockchain technology is extravagant and entangles high bandwidth, prolongation, and memory overhead that are not compatible with IoT devices. This paper brings forward a new definitive, intimate, and lightweight masonry for IoT-based blockchain technology which forsakes the memory overhead and centralized system, while security and privacy benefits are maintaining. The preliminary investigation method is discussed a standardized IoT infrastructure, where data are stored and access is managed by a decentralized blockchain technology. The following integration method used terminal devices as network technology and Ethereum as the blockchain platform that produced backend that ensures high availability, security, and privacy, while replacing traditional backend systems. Diametrically, we illustrate the simulation outcome to highlight our approach that significantly related to security and privacy of Blockchain-based IoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications. Work. PerCom Work. 2017 618–623, https://doi.org/10.1109/percomw.2017.7917634 (2017)

  2. Quadri, S.A.I., Sathish, P.: IoT based home automation and surveillance system. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 861–866. IEEE, 15–16 June 2017 (2017). https://doi.org/10.1109/ICCONS.2017.8250586

  3. Ramachandran, G.S., Krishnamachari, B.: Blockchain for the IoT: Opportunities and challenges, pp. 21–33 (2018). http://arxiv.org/abs/1805.02818

  4. Toffler, A.: Future Shock: IoT benefits beyond traffic and lighting energy optimization. 98–100 (1990)

  5. Lee, J.H.: BIDaaS: Blockchain Based ID As a Service. IEEE Access 6, 2274–2278 (2017). https://doi.org/10.1109/ACCESS.2017.2782733

    Article  Google Scholar 

  6. Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E., Yang, C.: Blockchain as a decentralized security framework. IEEE Consumer Electron Mag 7, 18–21 (2018). https://doi.org/10.1109/MCE.2017.2776459

    Article  Google Scholar 

  7. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. [Online]. https://bitcoin.org/bitcoin.pdf (2008). Accessed Aug 2018

  8. Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in internet of things: challenges and solutions. (2016). arXiv: 1605.05187

  9. Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: Proceedings of—2017 IEEE 6th International Congress on Big Data, BigData Congress. 2017 557–564, https://doi.org/10.1109/bigdatacongress.2017.85 (2017)

  10. Liu, X.: IOT2. 0: Internet of Things Based on Blockchain. IEEE IEMCON 2018 - The 9th IEEE Annual Information Technology, Electronics & Mobile Communication Conference, Vancouver, BC, 1–3 November 2018 (2018)

  11. Conteh, J., Copland, F., Cresese, A.: Multilingual teachers’ resources in three different contexts: empowering learning. Multiling Turn Lang Educ 1, 158–178 (2014). https://doi.org/10.1007/978-3-319-40162-1

    Article  Google Scholar 

  12. Jesus, E.F., Chicarino, V.R., De Albuquerque, C.V., Rocha, A.A.A.: A survey of how to use blockchain to secure internet of things and the Stalker attack. Secur Commun Netw (2018). https://doi.org/10.1155/2018/9675050

    Google Scholar 

  13. Foil Arms and Hog.: WTF is Brexit?—Foil Arms and Hog—YouTube. YouTube 1–9, https://doi.org/10.1007/s10838-008-9062-0 (2016)

  14. Eibhlín, O.: Detecting Patterns in the Ethereum Transactional Data using Unsupervised Learning. (2018). https://scss.tcd.ie/publications/theses/diss/2018/TCD-SSSDISSERTATION-2018-027.pdf

  15. Donsez, D., Quéma, V.: Blockchains for Trusted IoT. https://wiki.eclipse.org/images/0/01/Eclipse-IoT-Days-Grenoble-2018-lockchain.pdf (2018)

  16. Buterin, V.: OffsetMapping. (2009). https://doi.org/10.5663/aps.v1i1.10138

  17. Hildenbrandt, E. et al.: KEVM: A complete semantics of the ethereum virtual machine. In: Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018, vol. 2018, pp. 204–217. IEEE Computer Society. (2018). https://doi.org/10.1109/CSF.2018.00022

  18. Tonelli, R., Destefanis, G., Marchesi, M., Ortu, M.: Smart Contracts Software Metrics: a First Study. arXiv: 1802.01517v1 (2018)

  19. Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., Santamaría, V.: Blockchain and smart contracts for insurance: is the technology mature enough? Future Internet 10, 8–13 (2018). https://doi.org/10.3390/fi10020020

    Article  Google Scholar 

  20. https://rinkeby.etherscan.io/address/0x513c67ef8dd393a423900aafcc78a6878e465ae5#writeContract. Accessed Oct 2018

  21. https://rinkeby.etherscan.io/address/0x513c67ef8dd393a423900aafcc78a6878e465ae5#code. Accessed Oct 2018

  22. Opportunities and Use Cases for Distributed Ledger Technologies in IoT, pp. 1–42 (2018). https://www.gsma.com/iot/opportunities-distributed-ledger-in-iot

  23. Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. Commun Surv Tutorials IEEE (2014). https://doi.org/10.1109/comst.2014.2320093

    Google Scholar 

  24. Wadhwa, N., Hussain, S.Z., Rizvi, S.A.M.: A Combined Method for Confidentiality, Integrity, Availability and Authentication (CMCIAA). In: World Congress on Engineering II, 6–9 (2013)

  25. Özyılmaz, K.R., Yurdakul, A.: Designing a blockchain-based IoT infrastructure with Ethereum, Swarm and LoRa. (2018). http://arxiv.org/abs/1809.07655

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. K. Tanzir Mehedi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (INO 5 kb)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehedi, S.K.T., Shamim, A.A.M. & Miah, M.B.A. Blockchain-based security management of IoT infrastructure with Ethereum transactions. Iran J Comput Sci 2, 189–195 (2019). https://doi.org/10.1007/s42044-019-00044-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42044-019-00044-z

Keywords

Navigation