Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing
- URL: http://arxiv.org/abs/2401.06384v2
- Date: Fri, 2 Aug 2024 14:43:24 GMT
- Title: Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing
- Authors: Muhammad Baqer Mollah, Md Abul Kalam Azad, Yinghui Zhang,
- Abstract summary: We design STarEdgeChain, a security and privacy aware message dissemination in IoT to show how blockchain along with advanced cryptographic techniques are devoted to address such concerns.
In fact, the STarEdgeChain employs a permissioned blockchain assisted edge computing in order to expedite a single signcrypted message dissemination among targeted groups of devices.
- Score: 1.381577845997074
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Smart devices are considered as an integral part of Internet of Things (IoT), have an aim to make a dynamic network to exchange information, collect data, analysis, and make optimal decisions in an autonomous way to achieve more efficient, automatic, and economical services. Message dissemination among these smart devices allows adding new features, sending updated instructions, alerts or safety messages, informing the pricing information or billing amount, incentives, and installing security patches. On one hand, such message disseminations are directly beneficial to the all parties involved in the IoT system. On the other hand, due to remote procedure, smart devices, vendors, and other involved authorities might have to meet a number of security, privacy, and performance related concerns while disseminating messages among targeted devices. To this end, in this paper, we design STarEdgeChain, a security and privacy aware targeted message dissemination in IoT to show how blockchain along with advanced cryptographic techniques are devoted to address such concerns. In fact, the STarEdgeChain employs a permissioned blockchain assisted edge computing in order to expedite a single signcrypted message dissemination among targeted groups of devices, at the same time avoiding the dependency of utilizing multiple unicasting approaches. Finally, we develop a software prototype of STarEdgeChain and show it's practicability for smart devices. The codes are publicly available at https://github.com/mbaqer/Blockchain-IoT
Related papers
- AI-Protected Blockchain-based IoT environments: Harnessing the Future of Network Security and Privacy [0.0]
This paper explores the pivotal role of artificial intelligence in bolstering blockchain-enabled IoT systems.
When coupled with AI, these systems gain the ability to not only automate and optimize security protocols but also respond to new and evolving cyber threats.
This paper aims to provide an in-depth understanding of how AI-enhanced blockchain technology can revolutionize network security and privacy in IoT environments.
arXiv Detail & Related papers (2024-05-22T17:14:19Z) - Blockchains for Internet of Things: Fundamentals, Applications, and Challenges [38.29453164670072]
Not every blockchain system is suitable for specific IoT applications.
Public blockchains are not suitable for storing sensitive data.
We explore the blockchain's application in three pivotal IoT areas: edge AI, communications, and healthcare.
arXiv Detail & Related papers (2024-05-08T04:25:57Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - A Review on the Use of Blockchain for the Internet of Things [0.0]
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our daily objects will be interconnected and will interact with their environment.
Such a vision requires, among other things, seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance.
Such features can be brought by blockchain, a technology born with a cryptocurrency called Bitcoin.
arXiv Detail & Related papers (2024-02-01T15:48:45Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Realizing Open and Decentralized Marketplace for Exchanging Data of Expected IoT Behaviors [10.8289414098768]
This paper proposes creating a special marketplace focused on IoT cybersecurity.
The goal is to openly share knowledge about IoT devices' behavior, using structured data formats.
We employ technologies like blockchain and smart contracts to build a practical and secure foundation.
arXiv Detail & Related papers (2023-12-30T04:59:00Z) - IoT Device Identification Based on Network Communication Analysis Using
Deep Learning [43.0717346071013]
The risk of attacks on an organization's network has increased due to the growing use of less secure IoT devices.
To tackle this threat and protect their networks, organizations generally implement security policies in which only white listed IoT devices are allowed on the network.
In this research, deep learning is applied to network communication for the automated identification of IoT devices permitted on the network.
arXiv Detail & Related papers (2023-03-02T13:44:58Z) - The Internet of Senses: Building on Semantic Communications and Edge
Intelligence [67.75406096878321]
The Internet of Senses (IoS) holds the promise of flawless telepresence-style communication for all human receptors'
We elaborate on how the emerging semantic communications and Artificial Intelligence (AI)/Machine Learning (ML) paradigms may satisfy the requirements of IoS use cases.
arXiv Detail & Related papers (2022-12-21T03:37:38Z) - Blockchain-based Smart-IoT Trust Zone Measurement Architecture [1.5749416770494706]
Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment.
In this paper, we propose a behavior monitor in IoT- setup which can provide trust-confidence to outside networks.
In addition, we also incorporate Trusted Execution Technology (Intel SGX) in order to provide a secure execution environment for applications and data on blockchain.
arXiv Detail & Related papers (2020-01-08T03:41:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.