Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing (2401.06384v2)

Published 12 Jan 2024 in cs.CR and cs.NI

Abstract: Smart devices are considered as an integral part of Internet of Things (IoT), have an aim to make a dynamic network to exchange information, collect data, analysis, and make optimal decisions in an autonomous way to achieve more efficient, automatic, and economical services. Message dissemination among these smart devices allows adding new features, sending updated instructions, alerts or safety messages, informing the pricing information or billing amount, incentives, and installing security patches. On one hand, such message disseminations are directly beneficial to the all parties involved in the IoT system. On the other hand, due to remote procedure, smart devices, vendors, and other involved authorities might have to meet a number of security, privacy, and performance related concerns while disseminating messages among targeted devices. To this end, in this paper, we design STarEdgeChain, a security and privacy aware targeted message dissemination in IoT to show how blockchain along with advanced cryptographic techniques are devoted to address such concerns. In fact, the STarEdgeChain employs a permissioned blockchain assisted edge computing in order to expedite a single signcrypted message dissemination among targeted groups of devices, at the same time avoiding the dependency of utilizing multiple unicasting approaches. Finally, we develop a software prototype of STarEdgeChain and show it's practicability for smart devices. The codes are publicly available at https://github.com/mbaqer/Blockchain-IoT

Definition Search Book Streamline Icon: https://streamlinehq.com
References (53)
  1. D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, and H. V. Poor, “6G Internet of Things: A comprehensive survey,” IEEE Internet of Things Journal, 2021.
  2. M. Vaezi, A. Azari, S. R. Khosravirad, M. Shirvanimoghaddam, M. M. Azari, D. Chasaki, and P. Popovski, “Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road towards 6G,” IEEE Communications Surveys & Tutorials, 2022.
  3. M. B. Mollah, M. A. K. Azad, and A. Vasilakos, “Secure data sharing and searching at the edge of cloud-assisted Internet of Things,” IEEE Cloud Computing, vol. 4, no. 1, pp. 34–42, 2017.
  4. A. Taneja and S. Rani, “Energy efficient digital twin enabled massive iot network with use case in consumer health,” IEEE Transactions on Consumer Electronics, pp. 1–1, 2024.
  5. Y. Yang, L. Zhang, Y. Zhao, K.-K. R. Choo, and Y. Zhang, “Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based VANET,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 317–331, 2022.
  6. F. Daidone, B. Carminati, and E. Ferrari, “Blockchain-based privacy enforcement in the IoT domain,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3887–3898, 2022.
  7. H. Tan and I. Chung, “RSU-aided remote V2V message dissemination employing secure group association for UAV-assisted VANETs,” Electronics, vol. 10, no. 5, p. 548, 2021.
  8. N. Gupta, R. Manaswini, B. Saikrishna, F. Silva, and A. Teles, “Authentication-based secure data dissemination protocol and framework for 5G-enabled VANET,” Future Internet, vol. 12, no. 4, p. 63, 2020.
  9. A. Hamza, D. Ranathunga, H. H. Gharakheili, T. A. Benson, M. Roughan, and V. Sivaraman, “Verifying and monitoring IoTs network behavior using MUD profiles,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 1–18, 2022.
  10. J. Bauwens, P. Ruckebusch, S. Giannoulis, I. Moerman, and E. De Poorter, “Over-the-air software updates in the Internet of Things: An overview of key principles,” IEEE Communications Magazine, vol. 58, no. 2, pp. 35–41, 2020.
  11. S. B. Prathiba, G. Raja, A. K. Bashir, A. A. Alzubi, and B. Gupta, “SDN-assisted safety message dissemination framework for vehicular critical energy infrastructure,” IEEE Transactions on Industrial Informatics, 2021.
  12. Y. Zou, D. Yu, J. Yu, Y. Zhang, F. Dressler, and X. Cheng, “Distributed Byzantine-resilient multiple-message dissemination in wireless networks,” IEEE/ACM Transactions on Networking, vol. 29, no. 4, pp. 1662–1675, 2021.
  13. R. Gupta, M. M. Patel, S. Tanwar, N. Kumar, and S. Zeadally, “Blockchain-based data dissemination scheme for 5G-enabled softwarized UAV networks,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 4, pp. 1712–1721, 2021.
  14. F. Ayaz, Z. Sheng, D. Tian, and Y. L. Guan, “A Proof-of-Quality-Factor (PoQF)-based blockchain and edge computing for vehicular message dissemination,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2468–2482, 2021.
  15. R. Arul, Y. D. Al-Otaibi, W. S. Alnumay, U. Tariq, U. Shoaib, and M. J. Piran, “Multi-modal secure healthcare data dissemination framework using blockchain in IoMT,” Personal and Ubiquitous Computing, pp. 1–13, 2021.
  16. M. Ambrosin, C. Busold, M. Conti, A.-R. Sadeghi, and M. Schunter, “Updaticator: Updating billions of devices by an efficient, scalable and secure software update distribution over untrusted cache-enabled networks,” in European Symposium on Research in Computer Security.   Springer, 2014, pp. 76–93.
  17. Y. Hong, L. Yang, W. Liang, and A. Xie, “Secure access control for electronic health records in blockchain-enabled consumer internet of medical things,” IEEE Transactions on Consumer Electronics, 2023.
  18. Z. Li, J. Zhang, J. Zhang, Y. Zheng, and X. Zong, “Integrated edge computing and blockchain: A general medical data sharing framework,” IEEE Transactions on Emerging Topics in Computing, 2023.
  19. C. Qiu, G. S. Aujla, J. Jiang, W. Wen, and P. Zhang, “Rendering secure and trustworthy edge intelligence in 5G-enabled IIoT using Proof of Learning consensus protocol,” IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 900–909, 2023.
  20. X. Tang, H. Zhang, R. Zhang, D. Zhou, Y. Zhang, and Z. Han, “Robust trajectory and offloading for energy-efficient UAV edge computing in industrial Internet of Things,” IEEE Transactions on Industrial Informatics, 2023.
  21. F. Wang, J. Cui, Q. Zhang, D. He, C. Gu, and H. Zhong, “Blockchain-based lightweight message authentication for edge-assisted cross-domain industrial Internet of Things,” IEEE Transactions on Dependable and Secure Computing, 2023.
  22. L. Zhang, H. Wang, H. Xue, H. Zhang, Q. Liu, D. Niyato, and Z. Han, “Digital twin-assisted edge computation offloading in industrial Internet of Things with NOMA,” IEEE Transactions on Vehicular Technology, 2023.
  23. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Manubot, Tech. Rep., 2019.
  24. D. Dolev and A. Yao, “On the security of public key protocols,” IEEE Transactions on information theory, vol. 29, no. 2, pp. 198–208, 1983.
  25. C. Hu, X. Cheng, Z. Tian, J. Yu, K. Akkaya, and L. Sun, “An attribute-based signcryption scheme to secure attribute-defined multicast communications,” in International Conference on Security and Privacy in Communication Systems (SecureComm).   Springer, 2015, pp. 418–437.
  26. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in 2007 IEEE symposium on security and privacy (SP’07).   IEEE, 2007, pp. 321–334.
  27. Z. Su, Y. Wang, Q. Xu, and N. Zhang, “LVBS: Lightweight vehicular blockchain for secure data sharing in disaster rescue,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 19–32, 2022.
  28. W. Liu, Z. Wan, J. Shao, and Y. Yu, “HyperMaze: Towards privacy-preserving and scalable permissioned blockchain,” IEEE Transactions on Dependable and Secure Computing, 2021.
  29. M. Wang, Y. Guo, C. Zhang, C. Wang, H. Huang, and X. Jia, “MedShare: A privacy-preserving medical data sharing system by using blockchain,” IEEE Transactions on Services Computing, 2021.
  30. M. B. Mollah, J. Zhao, D. Niyato, Y. L. Guan, C. Yuen, S. Sun, , K.-Y. Lam, and L. H. Koh, “Blockchain for the Internet of Vehicles towards intelligent transportation systems: A survey,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4157–4185, 2021.
  31. M. B. Mollah, J. Zhao, D. Niyato, K. Y. Lam, X. Zhang, A. M. Y. M. Ghias, L. H. Koh, and L. Yang, “Blockchain for future smart grid: A comprehensive survey,” IEEE Internet of Things Journal, vol. 8, no. 1, pp. 18–43, 2021.
  32. “Proof of Authority private chains,” Accessed: November 2022, available: https://github.com/ethereum/guide/blob/master/poa.md.
  33. “Proof-of-Authority consensus,” Accessed: November 2022, available: https://apla.readthedocs.io/en/latest/concepts/consensus.html.
  34. J. A. Akinyele, C. Garman, I. Miers, M. W. Pagano, M. Rushanan, M. Green, and A. D. Rubin, “Charm: a framework for rapidly prototyping cryptosystems,” Journal of Cryptographic Engineering, vol. 3, no. 2, pp. 111–128, 2013.
  35. “hashlib — secure hashes and message digests,” Accessed: November 2022, available: https://docs.python.org/3/library/hashlib.html.
  36. Z. Liu, F. Huang, J. Weng, K. Cao, Y. Miao, J. Guo, and Y. Wu, “BTMPP: balancing trust management and privacy preservation for emergency message dissemination in vehicular networks,” IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5386–5407, 2021.
  37. Z. Liu, J. Weng, J. Guo, J. Ma, F. Huang, H. Sun, and Y. Cheng, “PPTM: A privacy-preserving trust management scheme for emergency message dissemination in space-air-ground integrated vehicular networks,” IEEE Internet of Things Journal, 2021.
  38. K. Li, W. Ni, J. Zheng, E. Tovar, and M. Guizani, “Confidentiality and timeliness of data dissemination in platoon-based vehicular cyber-physical systems,” IEEE Network, vol. 35, no. 4, pp. 248–254, 2021.
  39. S. Falas, C. Konstantinou, and M. K. Michael, “A modular end-to-end framework for secure firmware updates on embedded systems,” arXiv preprint arXiv:2007.09071, vol. 18, no. 1, 2021.
  40. M. M. Rabbani, J. Vligen, M. Conti, and N. Mentens, “SHeFU: Secure hardware-enabled protocol for firmware updates,” in 2020 IEEE International Symposium on Circuits and Systems (ISCAS).   IEEE, 2020, pp. 1–5.
  41. G. Kornaros, O. Tomoutzoglou, D. Mbakoyiannis, N. Karadimitriou, M. Coppola, E. Montanari, I. Deligiannis, and G. Gherardi, “Towards holistic secure networking in connected vehicles through securing CAN-bus communication and firmware-over-the-air updating,” Journal of Systems Architecture, vol. 109, p. 101761, 2020.
  42. X. Liu, W. Chen, and Y. Xia, “Security-aware information dissemination with fine-grained access control in cooperative multi-RSU of VANETs,” IEEE Transactions on Intelligent Transportation Systems, 2020.
  43. Y. Xia, X. Liu, J. Ou, and W. Chen, “A policy enforcement framework for secure data dissemination in vehicular Ad Hoc network,” IEEE Transactions on Vehicular Technology, vol. 70, no. 12, pp. 13 304–13 314, 2021.
  44. M. La Manna, L. Treccozzi, P. Perazzo, S. Saponara, and G. Dini, “Performance evaluation of attribute-based encryption in automotive embedded platform for secure software over-the-air update,” Sensors, vol. 21, no. 2, p. 515, 2021.
  45. S. Tonyali, K. Akkaya, N. Saputro, and X. Cheng, “An attribute & network coding-based secure multicast protocol for firmware updates in smart grid AMI networks,” in 2017 26th International Conference on Computer Communication and Networks (ICCCN).   IEEE, 2017, pp. 1–9.
  46. S. Tonyali, K. Akkaya, and N. Saputro, “An attribute-based reliable multicast-over-broadcast protocol for firmware updates in smart meter networks,” in 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).   IEEE, 2017, pp. 97–102.
  47. B. Guehguih and H. Lu, “Blockchain-based privacy-preserving authentication and message dissemination scheme for VANET,” in Proceedings of the 2019 5th International Conference on Systems, Control and Communications, 2019, pp. 16–21.
  48. L. Cheng, J. Liu, G. Xu, Z. Zhang, H. Wang, H.-N. Dai, Y. Wu, and W. Wang, “SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs,” IEEE Transactions on Computational Social Systems, vol. 6, no. 6, pp. 1373–1385, 2019.
  49. A. Kumari, S. Tanwar, S. Tyagi, and N. Kumar, “Blockchain-based massive data dissemination handling in IIoT environment,” IEEE Network, vol. 35, no. 1, pp. 318–325, 2021.
  50. S. Aggarwal, M. Shojafar, N. Kumar, and M. Conti, “A new secure data dissemination model in Internet of Drones,” in ICC 2019-2019 IEEE International Conference on Communications (ICC).   IEEE, 2019, pp. 1–6.
  51. M. Baza, M. Nabil, N. Lasla, K. Fidan, M. Mahmoud, and M. Abdallah, “Blockchain-based firmware update scheme tailored for autonomous vehicles,” in 2019 IEEE Wireless Communications and Networking Conference (WCNC).   IEEE, 2019, pp. 1–7.
  52. E. Puggioni, A. Shaghaghi, R. Doss, and S. S. Kanhere, “Towards decentralized IoT updates delivery leveraging blockchain and Zero-Knowledge Proofs,” in 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA).   IEEE, 2020, pp. 1–10.
  53. J.-W. Hu, L.-Y. Yeh, S.-W. Liao, and C.-S. Yang, “Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices,” Computers & Security, vol. 86, pp. 238–252, 2019.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Muhammad Baqer Mollah (6 papers)
  2. Md Abul Kalam Azad (6 papers)
  3. Yinghui Zhang (19 papers)
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Github Logo Streamline Icon: https://streamlinehq.com