Advertisement

Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain

  • Sophie Dramé-MaignéEmail author
  • Maryline Laurent
  • Laurent Castillo
  • Hervé Ganem
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 254)

Abstract

Recording the ownership of assets has historically constituted a cumbersome procedure requiring the intervention of third parties that cannot be freely chosen and take a hefty fee. Its high cost had this process reserved for valuable assets such as real estate, cars, jewelry or artwork. The system itself is also vulnerable to corruption as records can be manipulated by malicious actors. The blockchain presents a solution to both these issues.

The blockchain, as a distributed and persistent ledger, removes the need for third parties and lowers the cost of ownership record operations. Consequently, more modest assets such as IoT devices can benefit from this process as well. By registering IoT devices to the blockchain and documenting their transfers, we aim to create a chain of ownership that can be used to keep track and prove the ownership of IoT devices. In this system, a pseudonymous Proof of Ownership (PoO) must be produced and verified before a sale can occur. A PoO can also replace the product’s registration process that currently depends on the original product vendor and requires the user to volunteer personal information to a private company.

An extension is proposed to facilitate remote configuration of IoT devices and to improve the management of device-related secrets for owners that must configure a great number of devices.

References

  1. 1.
    Arcade City. https://arcade.city/. Accessed 16 Feb 2018
  2. 2.
    Exodus. https://www.exodus.io/. Accessed 23 Feb 2018
  3. 3.
    First blood. https://firstblood.io/. Accessed 16 Feb 2018
  4. 4.
    Follow my vote. https://followmyvote.com/. Accessed 16 Feb 2018
  5. 5.
    Melonport. https://melonport.com/. Accessed 23 Feb 2018
  6. 6.
    Nxt. https://nxtplatform.org/. Accessed 23 Feb 2018
  7. 7.
    Buterin, V., et al.: Ethereum white paper (2013). https://github.com/ethereum/wiki/wiki/White-Paper. Accessed 23 Sept 2016
  8. 8.
    Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)CrossRefGoogle Scholar
  9. 9.
    Conoscenti, M., Vetro, A., De Martin, J.C.: Blockchain for the internet of things: a systematic literature review. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1–6. IEEE (2016)Google Scholar
  10. 10.
    Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)
  11. 11.
    Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE International Conference on Peer-to-Peer Computing, pp. 1–10 (2013)Google Scholar
  12. 12.
    Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 464–467. IEEE (2017)Google Scholar
  13. 13.
    Kshetri, N.: Can blockchain strengthen the internet of things? IT Prof. 19(4), 68–72 (2017)CrossRefGoogle Scholar
  14. 14.
    Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. IJ Netw. Secur. 19(5), 653–659 (2017)Google Scholar
  15. 15.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  16. 16.
    Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 147–176. Springer, Boston (2008).  https://doi.org/10.1007/978-0-387-76481-8_7CrossRefGoogle Scholar
  17. 17.
    Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643–673. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-56614-6_22CrossRefzbMATHGoogle Scholar
  18. 18.
    Ray, B.R., Abawajy, J., Chowdhury, M., Alelaiwi, A.: Universal and secure object ownership transfer protocol for the internet of things. Future Gener. Comput. Syst. 78, 838–849 (2018)CrossRefGoogle Scholar
  19. 19.
    Rekleitis, E., Rizomiliotis, P., Gritzalis, S.: How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. Secur. Commun. Netw. 7(12), 2669–2683 (2014)CrossRefGoogle Scholar
  20. 20.
    Rosenfeld, M.: Overview of colored coins. White paper, bitcoil.co.il, p. 41 (2012)Google Scholar
  21. 21.
    Szabo, N.: Formalizing and securing relationships on public networks. First Monday, 2(9) (1997).  https://doi.org/10.5210/fm.v2i9.548
  22. 22.
    Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper (2014)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  • Sophie Dramé-Maigné
    • 1
    • 2
    Email author
  • Maryline Laurent
    • 2
  • Laurent Castillo
    • 1
  • Hervé Ganem
    • 3
  1. 1.Gemalto SAMeudonFrance
  2. 2.SAMOVAR, Télécom SudParis, CNRSUniversité Paris-SaclayEvryFrance
  3. 3.ParisFrance

Personalised recommendations