4,065 research outputs found
UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things
The Internet of Things (IoT) has caused a revolutionary paradigm shift in
computer networking. After decades of human-centered routines, where devices
were merely tools that enabled human beings to authenticate themselves and
perform activities, we are now dealing with a device-centered paradigm: the
devices themselves are actors, not just tools for people. Conventional identity
access management (IAM) frameworks were not designed to handle the challenges
of IoT. Trying to use traditional IAM systems to reconcile heterogeneous
devices and complex federations of online services (e.g., IoT sensors and cloud
computing solutions) adds a cumbersome architectural layer that can become hard
to maintain and act as a single point of failure. In this paper, we propose
UniquID, a blockchain-based solution that overcomes the need for centralized
IAM architectures while providing scalability and robustness. We also present
the experimental results of a proof-of-concept UniquID enrolment network, and
we discuss two different use-cases that show the considerable value of a
blockchain-based IAM.Comment: 15 pages, 10 figure
Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT
An Intrusion Detection System (IDS) aims to alert users of incoming attacks
by deploying a detector that monitors network traffic continuously. As an
effort to increase detection capabilities, a set of independent IDS detectors
typically work collaboratively to build intelligence of holistic network
representation, which is referred to as Collaborative Intrusion Detection
System (CIDS). However, developing an effective CIDS, particularly for the IoT
ecosystem raises several challenges. Recent trends and advances in blockchain
technology, which provides assurance in distributed trust and secure immutable
storage, may contribute towards the design of effective CIDS. In this poster
abstract, we present our ongoing work on a decentralized CIDS for IoT, which is
based on blockchain technology. We propose an architecture that provides
accountable trust establishment, which promotes incentives and penalties, and
scalable intrusion information storage by exchanging bloom filters. We are
currently implementing a proof-of-concept of our modular architecture in a
local test-bed and evaluate its effectiveness in detecting common attacks in
IoT networks and the associated overhead.Comment: Accepted to ACM/IEEE IoTDI 202
When Mobile Blockchain Meets Edge Computing
Blockchain, as the backbone technology of the current popular Bitcoin digital
currency, has become a promising decentralized data management framework.
Although blockchain has been widely adopted in many applications, e.g.,
finance, healthcare, and logistics, its application in mobile services is still
limited. This is due to the fact that blockchain users need to solve preset
proof-of-work puzzles to add new data, i.e., a block, to the blockchain.
Solving the proof-of-work, however, consumes substantial resources in terms of
CPU time and energy, which is not suitable for resource-limited mobile devices.
To facilitate blockchain applications in future mobile Internet of Things
systems, multiple access mobile edge computing appears to be an auspicious
solution to solve the proof-of-work puzzles for mobile users. We first
introduce a novel concept of edge computing for mobile blockchain. Then, we
introduce an economic approach for edge computing resource management.
Moreover, a prototype of mobile edge computing enabled blockchain systems is
presented with experimental results to justify the proposed concept.Comment: Accepted by IEEE Communications Magazin
- …