Abstract
With the emergence of Internet of Things, massive amount of data is produced, processed, propagated, and stored each and everyday. These IoT devices are built only to fulfill the aimed requirement with very limited resources. As a result, their security and privacy are not prioritized. Implementing any solution for the privacy and security issues of IoT devices is a challenging and crucial job with such limited resources. However, with the development of blockchain technology, incorporating security methods into IoT systems is no longer an unattainable goal. We conducted multiple experiments in this research to determine that Practical Byzantine Fault Tolerance (pBFT) is the best suitable technique for protecting IoT systems. The blockchain concept is used with pBFT in the same way that Zilliqa and Hyperledger are used for IoT security. As a result, by identifying and preventing security breaches with the aforementioned algorithm, data integrity, and authenticity will be maintained.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Husamuddin M, Qayyum M (2017) Internet of things: a study on security and privacy threats. 2017 2nd Int Conf Anti-Cyber Crimes, ICACC 2017, October:93–97. https://doi.org/10.1109/Anti-Cybercrime.2017.7905270
Cisco T, Internet A (2020) Cisco: 2020 CISO benchmark report. Comput. Fraud Secur. 2020(3):4–4. https://doi.org/10.1016/s1361-3723(20)30026-9
Chen S, Xu H, Liu D, Hu B, Wang H (2014) A vision of IoT: applications, challenges, and opportunities with China perspective. IEEE Internet Things J 1(4):349–359. https://doi.org/10.1109/JIOT.2014.2337336
Nespoli P, Díaz-López D, Gómez Mármol F (2021) Cyberprotection in IoT environments: a dynamic rule-based solution to defend smart devices. J Inf Secur Appl 60. https://doi.org/10.1016/j.jisa.2021.102878
A. Hamid Lone and R. Naaz, “Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain.”
Kasemsap K (2019) Internet of things and security perspectives. Secur. Internet Things 5(1):1–20. https://doi.org/10.4018/978-1-5225-9866-4.ch001
Lu C (2014) Overview of security and privacy issues in the internet of things abstract: keywords: table of contents 1–11
Yassein MB, Mardini W, Al-Abdi A (2017) Security issues in the internet of things. 8(6):186–200. https://doi.org/10.4018/978-1-5225-3029-9.ch009
Castro M, Liskov B (2010) Practical byzantine fault tolerance Miguel. Juv Delinq Eur Beyond Results Second Int Self-Report Delinq Study February:359–368
Meshcheryakov Y, Melman A, Evsutin O, Morozov V, Koucheryavy Y (2021) On performance of PBFT blockchain consensus algorithm for IoT-applications with constrained devices. IEEE Access 9(June):80559–80570. https://doi.org/10.1109/ACCESS.2021.3085405
Li L, Chen Y, Lin B (2021) Intrusion detection analysis of internet of things considering practical byzantine fault tolerance (PBFT) algorithm. Wirel Commun Mob Comput 2021. https://doi.org/10.1155/2021/6856284
Hosmer C (2018) IoT vulnerabilities. Defending IoT Infrastructures with Raspberry Pi 1–15. https://doi.org/10.1007/978-1-4842-3700-7_1
Bouscaren E (1989) Elementary pairs of models. Ann Pure Appl Log 45(2) PART 1:129–137. https://doi.org/10.1016/0168-0072(89)90057-2
Sultan A, Mushtaq MA, Abubakar M (2019) IoT security issues via blockchain: a review paper. PervasiveHealth Pervasive Comput Technol Healthc Part F1481:60–65. https://doi.org/10.1145/3320154.3320163
Rachit SB, Ragiri PR (2021) Security trends in internet of things: a survey. SN Appl Sci 3(1):1–14. https://doi.org/10.1007/s42452-021-04156-9
Inside Secure, Iot security solutions white paper. Veritmatrix
Wheelus C, Zhu X (2020) IoT network security: threats, risks, and a data-driven defense framework. IoT 1(2):259–285. https://doi.org/10.3390/iot1020016
Hernandez-Ramos JL, Pawlowski MP, Jara AJ, Skarmeta AF, Ladid L (2015) Toward a lightweight authentication and authorization framework for smart objects. IEEE J Sel Areas Commun 33(4):690–702. https://doi.org/10.1109/JSAC.2015.2393436
Azamuddin, Rotation project title : survey on IoT security. [Online]. Available: https://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_sec2.pdf
Goyal TK, Sahula V (2016) Lightweight security algorithm for low power IoT devices. 2016 international conference on advances in computing, communications and informatics, ICACCI 2016, September, 1725–1729. https://doi.org/10.1109/ICACCI.2016.7732296
Satamraju KP, Malarkodi B (2019) A secured and authenticated internet of things model using blockchain architecture. Proc. 2019 TEQIP - III Sponsored international conference on microwave integrated circuits, photonics and wireless networks, IMICPW 2019, 19–23. https://doi.org/10.1109/IMICPW.2019.8933275
Zhang H, Lang W (2019) Research on the blockchain technology in the security of internet of things. Proc. 2019 IEEE 4th Advanced information technology, electronic and automation control conference IAEAC 2019, no. Iaeac, 764–768. https://doi.org/10.1109/IAEAC47372.2019.8997876
Kurniawan A, Mayasari R, Murti MA (2018) Implementation of cryptographic algorithm on Iot device’s Id. J Sist Cerdas 01(02):19–26
Zhang J, Li Z (2020) Design of internet of things information security based on blockchain. Proc. - 2020 3rd World conference on mechanical engineering and intelligent manufacturing WCMEIM 2020, 114–117. https://doi.org/10.1109/WCMEIM52463.2020.00030
Moinet A, Darties B, Baril J-L (2017) Blockchain based trust and authentication for decentralized sensor networks, pp 1–6. [Online]. Available: http://arxiv.org/abs/1706.01730
Na D, Park S (2021) Fusion chain: a decentralized lightweight blockchain for iot security and privacy. Electron 10(4):1–18. https://doi.org/10.3390/electronics10040391
Yuan X, Luo F, Haider MZ, Chen Z, Li Y (2021) Efficient Byzantine consensus mechanism based on reputation in IoT blockchain. Wirel Commun Mob Comput 2021. https://doi.org/10.1155/2021/9952218
Patil P, Sangeetha M, Bhaskar V (2021) Blockchain for IoT access control, security and privacy: a review. Wirel Pers Commun 117(3):1815–1834. https://doi.org/10.1007/s11277-020-07947-2
Mackenzie B, Ferguson RI, Bellekens X (2018) An assessment of blockchain consensus protocols for the internet of things. In: 2018 international conference on internet of things, embedded systems and communications. IINTEC 2018—Proceedings, 183–190. https://doi.org/10.1109/IINTEC.2018.8695298
Kuzminykh I, Yevdokymenko M, Ageyev D (2021) Analysis of encryption key management systems: strengths, weaknesses, opportunities, threats. In: 2020 IEEE international conference on problems of infocommunications. Science and technology. PIC S T 2020—proceedings, 515–520. https://doi.org/10.1109/PICST51311.2020.9467909
Seshadri SS et al (2021) IoTCop: a blockchain-based monitoring framework for detection and isolation of malicious devices in internet-of-things systems. IEEE Internet Things J 8(5):3346–3359. https://doi.org/10.1109/JIOT.2020.3022033
Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2019) Applications of blockchains in the internet of things: a comprehensive survey. IEEE Commun Surv Tutorials 21(2):1676–1717. https://doi.org/10.1109/COMST.2018.2886932
Lone AH, Naaz R (2021) Applicability of blockchain smart contracts in securing Internet and IoT: a systematic literature review. Comput Sci Rev 39:100360. https://doi.org/10.1016/j.cosrev.2020.100360
Meshcheryakov Y, Melman A, Evsutin O, Morozov V, Koucheryavy Y (2021) On performance of PBFT blockchain consensus algorithm for IoT-applications with constrained devices. IEEE Access 9(April):80559–80570. https://doi.org/10.1109/ACCESS.2021.3085405
Hyperledger A, Edge ALF, Decentralized ID and access management (DIAM ) for IoT networks
Goyal H, Saha S, Practical byzantine consensus for internet-of-things
Sharma V, Lal N (2020) A novel comparison of consensus algorithms in blockchain. Adv Appl Math Sci 20(1):1–13
Driscoll K, Hall B, Sivencrona H, Zumsteg P (2003) Byzantine fault tolerance, from theory to reality 1 what you thought could never happen. Thought A Rev Cult Idea 2:235–248. https://doi.org/10.1007/978-3-540-39878-3_19
Li W, Feng C, Zhang L, Xu H, Cao B, Imran MA (2021) A scalable multi-layer PBFT consensus for blockchain. IEEE Trans Parallel Distrib Syst 32(5):1146–1160. https://doi.org/10.1109/TPDS.2020.3042392
Gorkey I, Sennema E, El Moussaoui C, Wijdeveld V (2020) Comparative study of byzantine fault tolerant consensus algorithms on permissioned blockchains supervised by Zekeriya Erkin supervised by Miray Aysen, April, pp 1–11
Misic J, Misic VB, Chang X, Qushtom H (2020) Multiple entry point PBFT for IoT systems. 2020 IEEE Global Communications Conference 2020, 0–5. https://doi.org/10.1109/GLOBECOM42002.2020.9322641
Misic J, Misic VB, Chang X, Qushtom H (2021) Adapting PBFT for use with blockchain-enabled IoT systems. IEEE Trans Veh Technol 70(1):33–48. https://doi.org/10.1109/TVT.2020.3048291
Liangchen X (2020) Design and implementation of internet of things information security transmission based on PBFT algorithm. In: International conference on computer engineering and application (ICCEA), 201–205. https://doi.org/10.1109/ICCEA50009.2020.00051
Waheed N, He X, Ikram M, Usman M, Hashmi SS, Usman M (2021) Security and privacy in IoT using machine learning and blockchain: threats and countermeasures. ACM Comput Surv 53(6). https://doi.org/10.1145/3417987
Xiong H, Chen M, Wu C, Zhao Y, Yi W (2022) Research on progress of blockchain consensus algorithm: a review on recent progress of blockchain consensus algorithms. Futur Internet 14(2). https://doi.org/10.3390/fi14020047
Kuznetsov P, Tonkikh A, Zhang YX (2021) Revisiting optimal resilience of fast byzantine consensus. Assoc Comput Mach 1(1)
Noura M, Atiquzzaman M, Gaedke M (2019) Interoperability in internet of things: taxonomies and open challenges. Mob Networks Appl 24(3):796–809. https://doi.org/10.1007/s11036-018-1089-9
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zafar, N., Khanna, A., Jain, S., Ali, Z., Ahamed, J. (2024). Safeguarding IoT: Harnessing Practical Byzantine Fault Tolerance for Robust Security. In: Swaroop, A., Polkowski, Z., Correia, S.D., Virdee, B. (eds) Proceedings of Data Analytics and Management. ICDAM 2023. Lecture Notes in Networks and Systems, vol 785. Springer, Singapore. https://doi.org/10.1007/978-981-99-6544-1_22
Download citation
DOI: https://doi.org/10.1007/978-981-99-6544-1_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-6543-4
Online ISBN: 978-981-99-6544-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)