Securing Blockchain-based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs
- URL: http://arxiv.org/abs/2405.12322v1
- Date: Mon, 20 May 2024 18:40:27 GMT
- Title: Securing Blockchain-based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs
- Authors: Daniel Commey, Sena Hounsinou, Garth V. Crosby,
- Abstract summary: This paper presents a framework for securing blockchain-based IoT systems.
It integrates Physical Unclonable Functions (PUFs) and Zero-Knowledge Proofs (ZKPs) within a Hyperledger Fabric environment.
- Score: 1.3654846342364306
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This paper presents a framework for securing blockchain-based IoT systems by integrating Physical Unclonable Functions (PUFs) and Zero-Knowledge Proofs (ZKPs) within a Hyperledger Fabric environment. The proposed framework leverages PUFs for unique device identification and ZKPs for privacy-preserving authentication and transaction processing. Experimental results demonstrate the framework's feasibility, performance, and security against various attacks. This framework provides a comprehensive solution for addressing the security challenges in blockchain-based IoT systems.
Related papers
- Towards Credential-based Device Registration in DApps for DePINs with ZKPs [46.08150780379237]
We propose a credential-based device registration (CDR) mechanism that verifies device credentials on the blockchain.
We present a general system model, and technically evaluate CDR using zkSNARKs with Groth16 and Marlin.
arXiv Detail & Related papers (2024-06-27T09:50:10Z) - Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach [20.74679353443655]
We introduce a framework that melds blockchain with federated learning, thereby ensuring an immutable record of unlearning requests and actions.
Our key contributions encompass a certification mechanism for the unlearning process, the enhancement of data security and privacy, and the optimization of data management.
arXiv Detail & Related papers (2024-05-27T04:35:49Z) - Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments [60.51751612363882]
We investigate the security implications of and software-based Open Radio Access Network (RAN) systems.
We highlight the presence of potential vulnerabilities and misconfigurations in the infrastructure supporting the Near Real-Time RAN Controller (RIC) cluster.
arXiv Detail & Related papers (2024-05-03T07:18:45Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Security and Privacy Enhancing in Blockchain-based IoT Environments via Anonym Auditing [0.0]
We propose a novel framework that combines the decentralized nature of blockchain with advanced security protocols tailored for IoT contexts.
We outline the architecture of blockchain in IoT environments, emphasizing the workflow and specific security mechanisms employed.
We introduce a security protocol that integrates privacy-enhancing tools and anonymous auditing methods, including the use of advanced cryptographic techniques for anonymity.
arXiv Detail & Related papers (2024-03-03T01:09:43Z) - Securing OPEN-RAN Equipment Using Blockchain-Based Supply Chain Verification [0.0]
This paper puts forth a novel blockchain-based approach to secure OPEN-RAN equipment through its lifecycle.
We architect a tamper-resistant ecosystem to track provenance.
There is a vivid potential to make OPEN-RAN supply chains corner to corner secure, igniting further research and real-world deployment.
arXiv Detail & Related papers (2024-02-27T15:58:32Z) - zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms [0.0]
This paper introduces the zk-IoT framework, a novel approach to enhancing the security of Internet of Things (IoT) ecosystems.
Our framework ensures the integrity of firmware execution and data processing in potentially compromised IoT devices.
arXiv Detail & Related papers (2024-02-13T09:34:23Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Blockchain-based Zero Trust on the Edge [5.323279718522213]
This paper proposes a novel approach based on Zero Trust Architecture (ZTA) extended with blockchain to further enhance security.
The blockchain component serves as an immutable database for storing users' requests and is used to verify trustworthiness by analyzing and identifying potentially malicious user activities.
We discuss the framework, processes of the approach, and the experiments carried out on a testbed to validate its feasibility and applicability in the smart city context.
arXiv Detail & Related papers (2023-11-28T12:43:21Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - FedSecurity: Benchmarking Attacks and Defenses in Federated Learning and Federated LLMs [43.47381610566354]
FedSecurity is an end-to-end benchmark for adversarial attacks and corresponding defense mechanisms in Federated Learning (FL)
It eliminates the need for implementing the fundamental FL procedures, e.g., FL training and data loading, from scratch.
It contains two key components, including FedAttacker that conducts a variety of attacks during FL training, and FedDefender that implements defensive mechanisms to counteract these attacks.
arXiv Detail & Related papers (2023-06-08T06:21:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.