Skip to main content

Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?

  • Chapter
  • First Online:
Advances in Core Computer Science-Based Technologies

Part of the book series: Learning and Analytics in Intelligent Systems ((LAIS,volume 14))

Abstract

The Internet of Things (IoT) has changed the traditional computing models. While it has enabled multiple new computing applications, it has also raised significant issues regarding security and privacy. We are gradually shifting to using extended computing architectures, the nodes of which may be lightweight devices limited in hardware resources, scattered in terms of network topology and too diverse in terms of hardware and software to be efficiently administered and managed. Additionally, such nodes usually store, process and transmit sensitive private data of their users; thus, the risk of a security breach is significantly high. Blockchain technology, introduced through Bitcoin, enables the development of secure decentralized systems. It offers guarantees regarding data integrity, application logic integrity and service availability, while it lags behind in terms of privacy and efficiency. Because of the decentralized architecture of blockchain systems, there seems to be a good fit between blockchain and the IoT. Blockchain systems can be employed to develop solutions to some of the main security and privacy issues encountered in the IoT domain. In this chapter we discuss the convergence of the two technologies, we analyze possible use cases, where blockchain technology can enhance internet of things security and privacy, and we propose enhancements of blockchain technology to make it appropriate for application in the IoT domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.ghost-iot.eu/

  2. ISO/IEC 25010:2011(en) Systems and software engineering Systems and software Quality Requirements and Evaluation (SQuaRE) System and software quality models

    Google Scholar 

  3. Proofpoint Uncovers Internet of Things (IoT) Cyberattack (Jan 2014), https://www.proofpoint.com/us/proofpoint-uncovers-internet-things-iot-cyberattack

  4. M.S. Ali, K. Dolui, F. Antonelli, IoT data privacy via blockchains and IPFS, in Proceedings of the Seventh International Conference on the Internet of Things (ACM, 2017), p. 14

    Google Scholar 

  5. O. Alphand, M. Amoretti, T. Claeys, S. Dall’Asta, A. Duda, G. Ferrari, F. Rousseau, B. Tourancheau, L. Veltri, F. Zanichelli, IoTChain: a blockchain security architecture for the Internet of Things. IEEE Wirel. Commun. Netw. Conf. WCNC 2018-April(October),  1–6 (2018). https://doi.org/10.1109/WCNC.2018.8377385

  6. S. Badr, I. Gomaa, E. Abd-Elrahman, Multi-tier blockchain framework for iot-ehrs systems. Proc. Comput. Sci. 141, 159–166 (2018)

    Article  Google Scholar 

  7. D. Bayer, S. Haber, W.S. Stornetta, Improving the efficiency and reliability of digital time-stamping, in Sequences Ii (Springer, 1993), pp. 329–334

    Google Scholar 

  8. K. Biswas, V. Muthukkumarasamy, Securing Smart Cities Using Blockchain Technology (2017). https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198, https://www.researchgate.net/publication/311716550

  9. J. Brito, A. Castillo, Bitcoin: A Primer for Policymakers (Mercatus Center at George Mason University, 2013)

    Google Scholar 

  10. V. Buterin, On Public and Private Blockchains (2015). https://ethereum.github.io/blog/2015/08/07/on-public-and-private-blockchains/

  11. M. Chanson, A. Bogner, D. Bilgeri, E. Fleisch, F. Wortmann, Privacy-preserving data certification in the internet of things: leveraging blockchain technology to protect sensor data. J. Assoc. Inf. Syst. (2019)

    Google Scholar 

  12. A. Collen, N. Nijdam, J. Augusto-Gonzalez, S. Katsikas, K. Giannoutakis, G. Spathoulas, E. Gelenbe, K. Votis, D. Tzovaras, N. Ghavami et al., Ghost-safe-guarding home IoT environments with personalised real-time risk control, in International ISCIS Security Workshop (Springer, Cham, 2018), pp. 68–78

    Google Scholar 

  13. M. Conoscenti, A. Vetr, J.C. De Martin, Peer to peer for privacy and decentralization in the internet of things, in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) (2017), pp. 288–290. https://doi.org/10.1109/ICSE-C.2017.60

  14. M. Conoscenti, A. Vetro, J.C. De Martin, Blockchain for the internet of things: a systematic literature review, in 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA) (IEEE, 2016), pp. 1–6

    Google Scholar 

  15. T.L.N. Dang, M.S. Nguyen, An approach to data privacy in smart home using blockchain technology, in 2018 International Conference on Advanced Computing and Applications (ACOMP) (IEEE, 2018), pp. 58–64

    Google Scholar 

  16. N. Dilawar, M. Rizwan, F. Ahmad, S. Akram, Blockchain: securing internet of medical things (iomt). Int. J. Adv. Comput. Sci. Appl. 10(1), 82–89 (2019)

    Google Scholar 

  17. A. Dorri, S.S. Kanhere, R. Jurdak, Towards an optimized blockchain for IoT (October), 173–178 (2017). https://doi.org/10.1145/3054977.3055003

  18. A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, LSB: a lightweight scalable blockchain for IoT security and privacy. Tech. rep. https://arxiv.org/pdf/1712.02969.pdf

  19. A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: the case study of a smart home, in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (IEEE, 2017), pp. 618–623

    Google Scholar 

  20. A.D. Dwivedi, G. Srivastava, S. Dhar, R. Singh, A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19, 326 (2019)

    Article  Google Scholar 

  21. A. Fayad, B. Hammi, R. Khatoun, An adaptive authentication and authorization scheme for IoTs gateways: a blockchain based approach, in 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (IEEE, 2018), pp. 1–7

    Google Scholar 

  22. P. Francis, Blockchain, The Byzantine Generals Problem, and The Future of Identity Management (2016). https://medium.com/@philfrancis77/blockchain-the-byzantine-generalproblem-and-the-future-of-identity-management-6b50a2eb815d

  23. S. Haber, W.S. Stornetta, How to time-stamp a digital document, in Conference on the Theory and Application of Cryptography (Springer, 1990), pp. 437–455

    Google Scholar 

  24. M.T. Hammi, B. Hammi, P. Bellot, A. Serhrouchni, Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Secur. 78, 126–142 (2018). https://doi.org/10.1016/j.cose.2018.06.004, http://www.sciencedirect.com/science/article/pii/S0167404818300890

  25. T. Hardjono, N. Smith, Cloud-based commissioning of constrained devices using permissioned blockchains, in Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (ACM, 2016), pp. 29–36

    Google Scholar 

  26. Q. He, Y. Xu, Z. Liu, J. He, Y. Sun, R. Zhang, A privacy-preserving internet of things device management scheme based on blockchain. Int. J. Distrib. Sens. Netw. 14(11), 1550147718808750 (2018)

    Google Scholar 

  27. A. Heikkila, The Blockchain and The Byzantine Generals Problem (2017). http://techblog.cosmobc.com/2017/03/16/blockchain-byzantine-generals-problem/

  28. M.N. Islam, V.C. Patii, S. Kundu, On IC traceability via blockchain, in 2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT) (IEEE, 2018), pp. 1–4

    Google Scholar 

  29. U. Javaid, M.N. Aman, B. Sikdar, Blockpro: blockchain based data provenance and integrity for secure IoT environments, in Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems (ACM, 2018), pp. 13–18

    Google Scholar 

  30. X. Jiang, Y. Shen, Y. Zhang, J. Wan, S. Kasahara, Smart contract-based access control for the internet of things. IEEE Internet of Things J. PP(c),  1–1 (2018). https://doi.org/10.1109/jiot.2018.2847705

  31. L. Kokoris-Kogias, L. Gasser, I. Khoffi, P. Jovanovic, N. Gailly, B. Ford, Managing identities using blockchains and CoSi, in HotPETs 2016—9th Workshop on Hot Topics in Privacy Enhancing Technologies (EPFL-TALK-220210) (2016). https://infoscience.epfl.ch/record/220210/files/1_Managing_identities_bryan_ford_etc.pdf

  32. C.S. Kouzinopoulos, K.M. Giannoutakis, K. Votis, D. Tzovaras, A. Collen, N.A. Nijdam, D. Konstantas, G. Spathoulas, P. Pandey, S. Katsikas, Implementing a forms of consent smart contract on an IoT-based blockchain to promote user trust, in 2018 Innovations in Intelligent Systems and Applications (INISTA) (IEEE, 2018), pp. 1–6

    Google Scholar 

  33. C.S. Kouzinopoulos, G. Spathoulas, K.M. Giannoutakis, K. Votis, P. Pandey, D. Tzovaras, S.K. Katsikas, A. Collen, N.A. Nijdam, Using blockchains to strengthen the security of internet of things, in International ISCIS Security Workshop (Springer, Cham, 2018), pp. 90–100

    Google Scholar 

  34. L. Lamport, R. Shostak, M. Pease, The byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382–401 (1982)

    Article  Google Scholar 

  35. C. Li, L.J. Zhang, A blockchain based new secure multi-layer network model for internet of things, in 2017 IEEE International Congress on Internet of Things (ICIOT) (IEEE, 2017), pp. 33–41

    Google Scholar 

  36. X. Liang, J. Zhao, S. Shetty, D. Li, Towards data assurance and resilience in IoT using blockchain, in MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) (IEEE, 2017), pp. 261–266

    Google Scholar 

  37. B. Liu, X.L. Yu, S. Chen, X. Xu, L. Zhu, Blockchain based data integrity service framework for IoT data, in Proceedings—2017 IEEE 24th International Conference on Web Services, ICWS 2017 (2017), pp. 468–475. https://doi.org/10.1109/ICWS.2017.54

  38. C. Machado, A.A.M. Fröhlich, IoT data integrity verification for cyber-physical systems using blockchain, in 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC) (IEEE, 2018), pp. 83–90

    Google Scholar 

  39. S. Nakamoto, Bitcoin: A Peer-to-peer Electronic Cash System (2008)

    Google Scholar 

  40. L. Negka, G. Gketsios, N.A. Anagnostopoulos, G. Spathoulas, A. Kakarountas, S. Katzenbeisser, Employing blockchain and physical unclonable functions for counterfeit IoT devices detection, in Proceedings of the International Conference on Omni-Layer Intelligent Systems (ACM, 2019), pp. 172–178

    Google Scholar 

  41. O. Novo, Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet of Things J. 5(2), 1184–1195 (2018)

    Article  Google Scholar 

  42. A. Ouaddah, A. Abou Elkalam, A. Ait Ouahman, Fairaccess: a new blockchain-based access control framework for the internet of things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)

    Article  Google Scholar 

  43. A. Ouaddah, A.A. Elkalam, A.A. Ouahman, Towards a novel privacy-preserving access control model based on blockchain technology in IoT, in Europe and MENA Cooperation Advances in Information and Communication Technologies (Springer, 2017), pp. 523–533

    Google Scholar 

  44. A. Ouaddah, A.A. Elkalam, A.A. Ouahman, Harnessing the power of blockchain technology to solve IoT security and privacy issues, pp. 1–10, 2018 (2017). https://doi.org/10.1145/3018896.3018901

  45. J. Pan, J. Wang, A. Hester, I. AlQerm, Y. Liu, Y. Zhao, Edgechain: an edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet of Things J. (2018)

    Google Scholar 

  46. O.J.A. Pinno, A.R.A. Grégio, L.C. De Bona, Controlchain: a new stage on the IoT access control authorization. Concurrency and Computation: Practice and Experience, p. e5238

    Google Scholar 

  47. G.C. Polyzos, N. Fotiou, Blockchain-assisted information distribution for the internet of things, in 2017 IEEE International Conference on Information Reuse and Integration (IRI) (IEEE, 2017), pp. 75–78

    Google Scholar 

  48. H. Qiu, M. Qiu, G. Memmi, Z. Ming, M. Liu, A dynamic scalable blockchain based communication architecture for IoT, in International Conference on Smart Blockchain (Springer, 2018), pp. 159–166

    Google Scholar 

  49. C. Qu, M. Tao, J. Zhang, X. Hong, R. Yuan, Blockchain based credibility verification method for IoT entities. Secur. Commun. Netw. 2018 (2018)

    Google Scholar 

  50. M.A. Rahman, M.S. Hossain, G. Loukas, E. Hassanain, S.S. Rahman, M.F. Alhamid, M. Guizani, Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access 6, 72469–72478 (2018)

    Article  Google Scholar 

  51. Y. Rahulamathavan, R.C.W. Phan, M. Rajarajan, S. Misra, A. Kondoz, Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption, in 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (IEEE, 2017), pp. 1–6

    Google Scholar 

  52. M. Samaniego, R. Deters, Internet of smart things-iost: using blockchain and clips to make things autonomous, in 2017 IEEE International Conference on Cognitive Computing (ICCC) (IEEE, 2017), pp. 9–16

    Google Scholar 

  53. L. Seitz, G. Selander, E. Wahlstroem, S. Erdtman, H. Tschofenig, Authentication and authorization for constrained environments (ace). Internet Engineering Task Force, Internet-Draft draft-ietf-aceoauth-authz-07 (2017)

    Google Scholar 

  54. H. Shafagh, L. Burkhalter, A. Hithnawi, S. Duquennoy, Towards blockchain-based auditable storage and sharing of IoT data, in Proceedings of the 2017 on Cloud Computing Security Workshop (ACM, 2017), pp. 45–50

    Google Scholar 

  55. J.C. Song, M.A. Demir, J.J. Prevost, P. Rad, Blockchain design for trusted decentralized IoT networks, in 2018 13th Annual Conference on System of Systems Engineering (SoSE) (IEEE, 2018), pp. 169–174

    Google Scholar 

  56. G. Spathoulas, A. Collen, P. Pandey, N.A. Nijdam, S. Katsikas, C.S. Kouzinopoulos, M.B. Moussa, K.M. Giannoutakis, K. Votis, D. Tzovaras, Towards reliable integrity in blacklisting: facing malicious IPS in ghost smart contracts, in 2018 Innovations in Intelligent Systems and Applications (INISTA) (IEEE, 2018), pp. 1–8

    Google Scholar 

  57. M. Vučinić, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, R. Guizzetti, Oscar: object security architecture for the internet of things. Ad Hoc Netw. 32, 3–16 (2015)

    Article  Google Scholar 

  58. J. Wan, J. Li, M. Imran, D. Li et al., A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans. Ind. Inform. (2019)

    Google Scholar 

  59. H. Watanabe, H. Fan, A novel chip-level blockchain security solution for the internet of things networks. Technologies 7(1), 28 (2019). https://doi.org/10.3390/technologies7010028, https://www.mdpi.com/2227-7080/7/1/28

  60. L. Zhou, L. Wang, T. Ai, Y. Sun, Beekeeper 2.0: confidential blockchain-enabled IoT system with fully homomorphic computation. Sensors 18(11),  3785 (2018)

    Google Scholar 

  61. X. Zhu, Y. Badr, J. Pacheco, S. Hariri, Autonomic identity framework for the internet of things, in Proceedings—2017 IEEE International Conference on Cloud and Autonomic Computing, ICCAC 2017 (2017), pp. 69–79. https://doi.org/10.1109/ICCAC.2017.14

  62. G. Zyskind, O. Nathan, A.S. Pentland, Decentralizing privacy: using blockchain to protect personal data, in Proceedings—2015 IEEE Security and Privacy Workshops, SPW 2015 (2015), pp. 180–184. https://doi.org/10.1109/SPW.2015.27

  63. G. Zyskind, N. Oz, A.S. Pentland, Enigma: Decentralized Computation Platform with Guaranteed Privacy. Tech. rep. (2015). https://arxiv.org/pdf/1506.03471.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sokratis Katsikas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Spathoulas, G., Negka, L., Pandey, P., Katsikas, S. (2021). Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?. In: Tsihrintzis, G., Virvou, M. (eds) Advances in Core Computer Science-Based Technologies. Learning and Analytics in Intelligent Systems, vol 14. Springer, Cham. https://doi.org/10.1007/978-3-030-41196-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41196-1_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41195-4

  • Online ISBN: 978-3-030-41196-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics