Autors: Tsochev, G. R., Krastev F., Trifonov, R. I., Raynova, K. S. Title: Enhance Security Levels of Internet of Things Through a Blockchain: A Review Keywords: Abstract: The growth of the Internet of Things (IoT) in industry, as well as the massive and continuous flow of data that IoT devices produce, necessitates the use of security mechanisms to help mitigate and prevent security issues that IoT devices encounter. Another significant challenge for IoT is the very distributed architecture of IoT networks. In any IoT network, any IoT device is a vulnerability that can be used for cyberattacks such as DDoS attacks in order to block network resources. A major concern when designing IoT systems is the cloud services they use to run IoT applications. The client-server setting for cloud computing is susceptible to a single point of failure. This article examines the problems associated with cybersecurity in the field of smart connected devices and the possibilities of using a blockchain to improve security mechanisms. References - Statistica, „Business digitization - Statistics & Facts“, 21 May 2023. [Online]. Available: https://www.statista.com/topics/3127/business-digitization/.
- Statistica, „Global IoT end-user spending worldwide 2017-2025“, 21 May 2023. [Online]. Available: https://www.statista.com/statistics/976313/global-iot-market-size/.
- Statistica, „Global digital population as of January 2021“, 5 May 2023. [Online]. Available: https://www.statista.com/statistics/617136/digital-population-worldwide/.
- Sh. Upadhyay, R. Yadav, Ch. Canales, R. Contu, El. Kim, N. Smith, S. Rakheja, M. Wah, D. Messett, R. Malik, „ Forecast: Information Security and Risk Management, Worldwide, 2020-2026, 3Q22 Update “, 14 April 2023. [Online]. Available: https://www.gartner.com/en/documents/4019160
- Milkovich and Devon, „15 Alarming Cyber Security Facts and Stats“, 23 December 2022. [Online]. Available: https://www.cybintsolutions.com/cyber-security-facts-stats/.
- P. Inc., „2020 State of the Phish“, 2020. [Online]. Available: https://www.proofpoint.com/sites/default/files/gtdpfpt-uk-tr-state-of-the-phish-2020-a4_final.pdf.
- B. Kelly, „THE COST OF CYBERCRIME“, 2020. [Online]. Available: https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-StudyFinal.pdf#zoom=50.
- Varonis, „2019 GLOBAL DATA RISK REPORT FROM THE VARONIS DATA LAB,“[Online]. Available: https://info.varonis.com/hubfs/Varonis%202019%20Global%20Data%20Risk%20Report.pdf.
- R. B. S. Inc, „2020 Q3 Report Data Breach QuickView“, 2020. [Online]. Available: https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q3%20Data%20Breach%20QuickView%20Report.pdf.
- L. Atzori, A. Iera and G. Morabito, „The internet of things: A survey,“Computer networks,, vol. 54, No 15, p. 2787-2805, 2010.
- M. M. Hossain, M. Fotouhi and R Hasan, „Towards an analysis of security is-sues, challenges, and open problems in the internet of things“, World Congress on Services, 2015.
- M. J. Covington and R. Carskadden, „Threat implications of the internet of things“, 5th International Conference on Cyber Conflict (CYCON 2013), 2013.
- N. Gruschka and M. Jensen, „Attack surfaces: A taxonomy for attacks on cloud services“, 3rd international conference on cloud computing, 2010.
- M. Wazid, A. K. Das, S. Kumari and M. K. Khan, „Design of sinkhole node detection mechanism for hierarchical wireless sensor networks“, Security and Communication Networks, vol. 9, No 17, 2016.
- M. A. Khan and K. Salah, „Iot security: Review, blockchain solutions and open challenges “, Future Generation Computer Systems, vol. 82, 2018.
- K. Weekly and K. Pister, „Evaluating sinkhole defense techniques in rpl networks “, International Conference on Network protocols, 2012.
- F. Ahmed and Y.-B. Ko, „Mitigation of black hole attacks in routing protocol for low power and lossy networks “, Security and Communication Networks, vol. 9, No 18, 2016.
- K. Zhang, X. Liang, R. Lu and X. Shen, „Sybil attacks and their defences in the internet of things “, Internet of Things Journal, vol. 1, No 5, 2014.
- K. Zhang, X. Liang, R. Lu and X. Shen, „Sybil attacks and their defences in the internet of things “, Internet of Things Journal, vol. 1, No 5.
- M. Henze, B. Wolters, R. Matzutt, T. Zimmermann and K. Wehrle, „Distributed configuration, authorization and management in the cloud based internet of things “, Trustcom/BigDataSE/ICESS, 2017.
- Y. Chen, W. Trappe and R. P. Martin, „Detecting and localizing wireless spoofing attacks“, Annual IEEE Communications Society Conference, 2007.
- L. Xiao, L. J. Greenstein, N. B. Mandayam and W. Trappe, „Channel based detection of sybil attacks in wireless networks “, Tansactions on Information Forensics and Security, vol. 4, No 3, 2009.
- R. Riaz, K.-H. Kim and H. F. Ahmed, „Security analysis survey and framework design for ip connected lowpans “, International Symposium on Autonomous Decentralized Systems, 2009.
- J. Granjal, E. Monteiro and J. S. Silva, „Network-layer security for the internet of things using tinyos and blip “, International Journal of Communication Systems, vol. 27, No 10, 2014.
- „Enabling network-layer security on ipv6 wireless sensor networks “, GLOBECOM.
- W. Xu, W. Trappe, Y. Zhang and T. Wood, „The feasibility of launching and detecting jamming attacks in wireless networks “, 6th ACM international symposium on Mobile ad hoc networking and computing, 2005.
- G. Noubir and G. Lin, „Low-power dos attacks in data wireless lans and countermeasures “, Mobile Computing and Communications Review, vol. 7, No 3, 2003.
- T. Bhattasali, R. Chaki and S. Sanyal, Sleep deprivation attack detection in wire-less sensor network, arXiv, 2012.
- H. Kim, „Protection against packet fragmentation attacks at 6lowpan adaptation layer “, International Conference on Convergence and Hybrid Information Technology, 2008.
- R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafagh and K. Wehrle, „lowpan fragmentation attacks and mitigation mechanisms “, ACM conference on Security and privacy in wireless and mobile networks, 2013.
- A. Aris, S. F. Oktug and S. B. O. Yalcin, „Rpl version number attacks: In-depth study “, Network Operations and Management Symposium, 2016.
- N. Park and N. Kang, „Mutual authentication scheme in secure internet of things technology for comfortable lifestyle “, Sensors, vol. 16, No 1, 2016.
- M. H. Ibrahim, „Octopus: An edge-fog mutual authentication scheme “, IJ Network Security, vol. 18, No 6, 2016.
- M. Dıaz, C. Mart and B. Rubio, „State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing “, Journal of Network and Computer Applications, vol. 67, 2016.
- A. Reyna, C. Martin, J. Chen, E. Soler and M. Dıaz, „On blockchain and its integration with iot. challenges and opportunities “, Future Generation Computer Systems, 2018.
- N. Kshetri, „Can blockchain strengthen the internet of things? “, IT Profession-al, vol. 9, No 4, 2017.
- M. Banerje, J. Lee and K. K. R. Choo, „A blockchain future for internet of things security: a position paper “, Digital Communications and Networks, vol. 4, No 3, 2018.
- J. Lin, Z. Shen and C. Miao, „Using blockchain technology to buildtrust in sharing lorawan iot “, 2nd International Conference on Crowd Science and Engineering, 2017.
- J. C. Buzby and T. Roberts, „The economics of enteric infections: human food-borne disease costs “, Gastroenterology, vol. 136, No 6, 2009.
- P. Veena, S. Panikkar, S. Nair and P. Brody, „Empowering the edge practical in-sights on a decentralized internet of things “, 2015.
- G. Prisco, „Slock. it to introduce smart locks linked to smart Ethereum contracts, decentralize the sharing economy “, Bitcoin Magazine, 2015.
- E. F. Jesus, V. R. Chicarino, C. V. D. Albuquerque and A. A. D. A. Rocha, „A survey of how to use blockchain to secure internet of things and the stalker attack “, Communication Networks, vol. 2018, 2018., 2018.
- A. Dorri, S. S. Kanhere and R. Jurdak, „Blockchain in internet of things: challenges and solutions “, arXiv, 2016.
- „Towards an optimized blockchain for iot “, 2017, Second International Conference on Internet-of-Things.
- A. Banafa, „Iot and blockchain convergence: Benefits and challenges “, Internet of Things, 2017.
- F. Buccafurri, G. Lax, S. Nicolazzo and A. Nocera, „Overcoming limits of blockchain for iot applications “, 12th International Conference on Availability, Reliability and Security, 2017.
- I. Eyal, A. E. Gencer, E. G. Sirer and R. V. Renesse, „Bitcoin-ng: A scalable blockchain protocol “, 3th fUSENIXg Symposium on Networked Systems Design and Implementation, 2016.
- Y. Sompolinsky and A. Zohar, „Accelerating bitcoin’s transaction processing. fast money grows on trees, not chains “, IACR Cryptology ePrint Archive, 2013.
- Litecoin, „Litecoin “, 2019. [Online]. Available: https://litecoin:org/.
- K. Christidis and M. Devetsikiotis, „Blockchains and smart contracts for the internet of things “, Ieee Access2016, vol. 4.
- A. Dorri, S. S. Kanhere, R. Jurdak and P. Gauravaram, „Blockchain for iot security and privacy: The case study of a smart home “, International Conference on. IEEE, 2017.
- R. Roman, J. Zhou and J. Lopez, „On the features and challenges of security and privacy in distributed internet of things “, Computer Networks, vol. 57, No 10, 2013.
- P. Ruckebusch, E. D. Poorter, C. Fortuna and I. Moerman, „Gitar: Generic extension for internet-of-things architectures enabling dynamic updates of network and application modules “, Ad Hoc Networks, 2016.
- A. Taherkordi, F. Loiret, R. Rouvoy and F. Eliassen, „Optimizing sensor network reprogramming via in situ reconfigurable components “, ACM Transactions on Sensor Networks (TOSN), 2013.
- R. Kamath, „Food traceability on blockchain: Walmarts pork and mango pilots with ibm “, The JBBA, vol. 1, No 1, 2018.
- A. Ukil, S. Bandyopadhyay and A. Pal, „Iot-privacy: To be private or not to be private “, Conference on. IEEE, 2014.
- H. Suo, J. Wan, C. Zou and J. Liu, „Security in the internet of things: a review “, omputer Science and Electronics Engineering (ICCSEE), 2012 international conference, 2012.
- T. Xu, J. B. Wendt and M. Potkonjak, „Security of iot systems: Design challenges and opportunities “, Proceedings of the 2014 IEEE/ACM, 2014.
- R. Thayer, N. Doraswamy and R. Glenn, „Ip security document roadmap “, Tech. Rep, 1998.
- A. Freier, P. Karlton and P. Kocher, „Тhe secure sockets layer (ssl) protocol version 3.0“, Tech. Rep., 2011.
- T. Dierks and E. Rescorla, „The transport layer security (tls) protocol version 1.2“, Tech. Rep., 2008.
- E. Rescorla and N. Modadugu, „Datagram transport layer security version 1.2“, Tech. Rep., 2012.
- C. Fernandez-Gago, F. Moyano and J. Lopez, „Modelling trust dynamics in the internet of things “, Information Sciences, 2017.
Issue
| AIP Conference Proceedings, vol. 3182, 2025, United States, https://doi.org/10.1063/5.0246134 |
|