14 research outputs found

    Efficient decentralized security service architecture for Industrial IoT

    No full text
    Abstract The current evolution of industrial systems is characterized by expectations of increased production efficiency, data security, regulatory compliance, scalability, and environmental sustainability. One of the key technologies driving these advancements is the Industrial Internet of Things (IIoT), together with 5th Generation(5G) and beyond networks. These enable seamless connectivity between infrastructure, machines, and people, facilitating rapid data exchange, automation, monitoring, and control of industrial systems. In this thesis, the main contributions are threefold. First, the thesis proposes a novel decentralized service architecture to establish confidentiality, integrity, and authentication of cloud-integrated IIoT. Secondly, the research proposed a decentralized architecture incorporating Game Theory for efficient and secured network slice brokering and service-level agreement establishment. Finally, the thesis proposed a novel consensus mechanism for reliable IIoT data formulation. This thesis proposes to utilise reputation score as a numerical indicator for the IIoT data reliability in combination with BulletProof zero-knowledge proof to defend the data formulation IIoT from slowly adaptive adversaries to yield energy efficiency. Identifying the scalability limitations in the centralized security services, the thesis incorporated blockchain-based smart contracts as a decentralized service enabler that provides decentralization, lower latency, and transparency with cryptographically integrity-preserved ledger. The proposed service architecture was implemented and evaluated with numerical and programmatic simulations. The thesis results were derived from the comparisons of partial implementations from state-of-art to distinguish the numerical advantages of the proposal. The proposed architecture has yielded significant efficiency improvements, including storage utilization (to 20% in IIoT authentication), latency (Up to 55% in IIoT authentication), resource offer pricing (Up to 21% in slice requests), and energy consumption (Up to 53% in reputation score verification) beyond key state-of-art. In addition, the proposed consensus protocol in the thesis was verified for robustness of chain growth in attack scenarios.Tiivistelmä Teollisten järjestelmien nykykehitykselle on ominaista odotukset tuotannon tehostamisesta, tietoturvasta, säännösten noudattamisesta, skaalautuvuudesta ja ympäristön kestävyydestä. Yksi tähän kehitykseen johtavista keskeisistä teknologioista on teollinen esineiden internet (IIoT) yhdessä viidennen sukupolven (5G) ja muiden verkkojen kanssa. Ne mahdollistavat saumattoman yhteyden infrastruktuurin, koneiden ja ihmisten välillä, mikä helpottaa nopeaa tiedonvaihtoa, automaatiota, valvontaa ja teollisten järjestelmien hallintaa. Tämän väitöstutkimuksen tärkeimmät tulokset ovat kolmella alueella. Ensinnäkin työssä ehdotetaan uutta hajautettua palveluarkkitehtuuria pilvilaskentaan integroidun IIoT:n luottamuksellisuuden, eheyden ja todentamisen varmistamiseksi. Toiseksi tutkimuksessa ehdotetaan hajautettua arkkitehtuuria, joka hyödyntää peliteoriaa tehokkaan ja suojatun verkon viipaloinnin välitys- ja palvelutasosopimuksen toteuttamiseksi. Lopuksi työssä ehdotetaan uutta konsensusmekanismia luotettavaa IIoT-tietojen laatimista varten. Tässä tutkimuksessa ehdotetaan mainepisteiden hyödyntämistä numeerisena indikaattorina IIoT-tietojen luotettavuudelle yhdessä BulletProof-tietokannan kanssa, joka puolustaa datan luomista IIoT järjestelmissä hitaasti mukautuvilta hyökkäyksiltä, energiatehokkuuden huomioiden. Keskitettyjen turvallisuuspalvelujen skaalautuvuusrajoitukset huomioiden, lohkoketjupohjaiset älykkäät sopimukset sopivat hajautetuksi palvelun mahdollistajaksi, joka tarjoaa hajauttamisen, pienemmän viiveen ja läpinäkyvyyden kryptografisesti eheyden säilyttävällä tilikirjalla. Ehdotettu palveluarkkitehtuuri toteutettiin ja arvioitiin numeerisilla ja ohjelmallisilla simulaatioilla. Väitöstutkimuksen tulokset on johdettu vertaamalla osatoteutusta uusinta tekniikkaa erottamaan ehdotuksen numeeriset edut. Ehdotettu arkkitehtuuri on tuottanut merkittäviä tehokkuusparannuksia, joita ovat muun muassa tallennuksen käyttö (20 prosenttiin IIoT-todennuksessa), viive (55 prosenttiin IIoT-todennuksessa), resurssitarjonnan hinnoittelu (21 prosenttiin viipalointipyynnöissä) ja energiankulutus (53 prosenttiin mainepisteiden verifioinnissa) nykytoteutuksiin verrattuna. Lisäksi opinnäytetyössä ehdotettu konsensusprotokolla todennettiin, siten että ketjun kasvu on vakaata hyökkäysskenaarioissa

    Survey on blockchain based smart contracts:applications, opportunities and challenges

    No full text
    Abstract Blockchain is one of the disruptive technical innovation in the recent computing paradigm. Many applications already notoriously hard and complex are fortunate to ameliorate the service with the blessings of blockchain and smart contracts. The decentralized and autonomous execution with in-built transparency of blockchain based smart contracts revolutionize most of the applications with optimum and effective functionality. The paper explores the significant applications which already benefited from the smart contracts. We also highlight the future potential of the blockchain based smart contracts in these applications perspective

    Fog computing and blockchain-based security service architecture for 5G industrial IoT-enabled cloud manufacturing

    Get PDF
    Abstract Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-time process monitoring, which is renowned as cloud manufacturing (CM). However, cloud integration exposes the entire manufacturing ecosystem to a new set of security risks and increments in end-to-end latency. Moving security services toward the edge eradicates message routing latency toward the cloud and eliminates the central point of failure while leveraging the entire system’s performance. We propose a blockchain and fog-computing-enabled security service architecture that operates on fog nodes at the edge of manufacturing equipment clusters. The proposed service facilitates CM equipment authentication and equipment-cloud channel privacy protection while preserving anonymity and unlinkability over the blockchain. We implemented the proposed architecture with hyperledger fabric and compared the performance advantage over the state-of-the-art solutions

    Multi-access edge computing and blockchain-based secure telehealth system connected with 5G and IoT

    No full text
    Abstract There is a global hype in the development of digital healthcare infrastructure to cater the massive elderly population and infectious diseases. The digital facilitation is expected to ensure the patient privacy, scalability, and data integrity on the sensitive life critical healthcare data, while aligning to the global healthcare data protection standards. The patient data sharing to third parties such as research institutions and universities is also concerned as a significant contribution to the society to sharpen the research and investigations. The emergence of 5G communication technologies eradicates the borders between patients, hospital and other institutions with high end service standards. In patients’ perspective, healthcare service delivery through the digital medium is beneficial in terms of time, costs, and risks. In this paper, we propose a novel Multi-access Edge Computing(MEC) and blockchain based service architecture utilizing the lightweight ECQV (Elliptic Curve Qu-Vanstone) certificates for the realtime data privacy, integrity, and authentication between IoT, MEC, and cloud. We further attached storage offloading capability to the blockchain to ensure scalability with a massive number of connected medical devices to the cloud. We introduced a rewarding scheme to the patients and hospitals through the blockchain to encourage data sharing. The access control is handled through the smart contracts. We evaluated the proposed system in a near realistic implementation using Hyperledger Fabric blockchain platform with Raspberry Pi devices to simulate the activity of the medical sensors

    Scalable storage scheme for blockchain-enabled IoT equipped food supply chains

    Get PDF
    Abstract Blockchain is an innovative technology which enabled new applications for solving numerous problems in distributed environments such as the internet of things (IoT) equipped food supply chains (FSCs). In FSCs, the large volume of IoT data such as audio, video, images, and sensor data will be transferred to ensure the traceability of the food to its source. When blockchain technology is used in an FSC, the storage requirements in the nodes will grow with time, since blockchain only allows information adding, without deleting the already stored information. Therefore, it is evident that offchain storage offers more flexibility than onchain storage in IoT equipped supply chains. This paper proposes a scalable storage scheme using offchain storage, where the data from IoT devices in the supply chain will store offchain. To reduce the growth of offchain storage, we exploit the fact that some information regarding a particular food item may not be required after the expiration date. The scalability of the proposed scheme is validated through numerical and experimental results

    Blockchain-based automated certificate revocation for 5G IoT

    No full text
    Abstract Internet of Things (IoT) is a key topic of interest in modern communication context with the evolution of 5G and beyond ecosystems. 5G will interconnects billions of IoT devices wirelessly. The wireless communication exposes the devices to massive security risks in different dimensions. The Public Key Infrastructure (PKI) is one of the promising solutions to eliminate security risks. It ensures the authentication and communication integrity by using public key certificates. However, the overhead of certificate storage is a significant problem for the resource constrained IoT devices. We propose an application of Elliptic Curve Qu Vanstone (ECQV) certificates, which are lightweight in size for the resource restricted IoT devices. Furthermore, we incorporate the blockchain based smart contracts to handle the certificate related operations. We utilize the smart contracts in the certificate issuance and developed a smart contract based threat scoring mechanism to automatically revoke the certificates. The lightweight nature of ECQV certificates enables the distributed ledger to store, update, and revoke the certificates. We evaluated the proposed solution in Hyperledger Fabric blockchain platform

    How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?

    No full text
    Abstract Several recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is that it can be victimized by DoS (Denial of Service) attack. Thus, the aim of this work is three fold. First, to present the possible ways in which DoS/DDoS attacks can be mounted on NSB and their adverse effects. Second, to propose and implement initial blockchain-based solution named as Security Service Blockchain (SSB) to prevent DoS attacks on NSB. Third, to enumerate the challenges and future research directions to effectively utilize blockchain for mitigating DoS/DDoS attacks on NSB. To evaluate the performance the proposed SSB framework is implemented using Hyperledger Fabric. The results manifest that the latency impact of the legitimate slice creation over scaled up malicious traffic remains minimal with the use of SSB framework. The integration of SSB with NSB results in gaining several fold reduction in latency under DoS attack scenario

    Blockchain-based roaming and offload service platform for local 5G operators

    No full text
    Abstract Local 5G Operator (L5GO) concept is one of the most prominent versatile applications of the 5G in the near future. The popularity of L5GOs will trigger a greater number of roaming and offloading events between mobile operators. However, existing static and the operator-assisted roaming and offloading procedures are inefficient for L5GO ecosystem due to poor service quality, data privacy issues, data transferring delays, excessive costs for intermediary parties and existence of roaming fraud. To address these challenges, we propose a blockchain / Distributed Ledger Technology (DLT) based service platform for L5GOs to facilitate efficient roaming and offload services. As the key contribution, blockchain-based smart contract scheme is proposed to establish dynamic and automated agreements between operators. By using smart contracts, we introduce several novel features such as universal wallet for subscribers, service quality based L5GO rating system, user-initiated roaming process and the roaming fraud prevention system to improve the operational quality of a L5GO. A prototype of the proposed platform is emulated with the Ethereum blockchain platform and Rinkeby Testnet to evaluate the performance and justify the feasibility of the proposal. Upon an extensive evaluation on the prototype, it was observed that the proposed platform offered benefits such as cost effective, more secure and reliable experience

    Blockchain for 5G and IoT:opportunities and challenges

    No full text
    Abstract Hitherto, the evolution of mobile networks have fulfilled the increasing demands for enhanced performance, availability, portability, elasticity, and energy efficiency posed by the ever growing network services. In line with the progression, 5G depicts the next generation of mobile networks that further promises remarkable performance improvements as well as creation of new value chain. In parallel to 5G, the Internet of Things (IoT) has emerged as another new paradigm for interconnection of massive communication-capable heterogeneous smart objects. 5G is envisaged to broaden IoT’s scope and fields of applicability. However, since current mobile networks and also more general IoT systems are based on centralized models thus it is anticipated that they will face tremendous challenges to meet-up the requirements of future 5G-enabled-IoT use cases. To solve these inevitable issues Blockchain stands out as promising technology. Some of the offerings of Blockchain technology are immutability, non-repudiation, proof of provenance, integrity, privacy, etc. Blockchain’s combination with 5G and IoT still requires essential insights with respect to concrete application domains, scalability, privacy issues, performance, and potential financial benefits. The paper aims to elaborate and emphasize the key aspects of the use of Blockchain for 5G and IoT

    A novel blockchain-as-a-service (BaaS) platform for local 5G operators

    No full text
    Abstract 5G is a promising technology that has the potential to support verticals and applications such as Industrial Internet of Things IoT (IIoT), smart cities, autonomous vehicles, remote surgeries, virtual and augmented realities, and so on. These verticals have a diverse set of network connectivity requirements, and it is challenging to deliver customized services for each by using a common 5G infrastructure. Thus, the operation of Local 5G operator (L5GO) networks or private 5G networks are a viable option to tackle this challenge. A L5GO network is a localized small cell network which can offer tailored service delivery. The adaptation of network softwarization in 5G allows vertical owners to deploy and operate L5GO networks. However, the deployment of L5GOs raises various issues related to management of subscribers, roaming users, spectrum, security, and also the infrastructure. This paper proposes a blockchain-based platform to address these issues. The paper introduces a set of blockchain-based modularized functions such as service rating systems, bidding techniques, and selection functions, which can be used to deploy different services for L5GOs. Exploitation of blockchain technology ensures availability, non-reliance on trusted third parties, secure transfer payments, and stands to gain many more advantages. The performance and the viability of the proposed platform are analyzed by using simulations and a prototype implementation
    corecore